DNS hijacking

Results: 60



#Item
31Networks / Distributed data storage / Internet privacy / Domain name system / Content delivery network / Streaming / Proxy server / Load balancing / DNS hijacking / Computing / Concurrent computing / Internet

AT&T TECHNICAL DOCUMENT TD-52AMHL 1 On the Use and Performance of Content Distribution Networks

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2006-04-11 12:53:12
32Network architecture / Domain Name System Security Extensions / Stop Online Piracy Act / Dan Kaminsky / Name server / DNS hijacking / BIND / Domain name system / Internet / Computing

December 9th, 2011 The Honorable Patrick Leahy U.S. Senate Chairman, Committee on the Judiciary 224 Dirksen Senate Office Building Washington, DC 20510

Add to Reading List

Source URL: www.circleid.com

Language: English - Date: 2011-12-11 18:54:21
33Networks / Distributed data storage / Internet privacy / Domain name system / Content delivery network / Streaming / Proxy server / DNS hijacking / Load balancing / Computing / Concurrent computing / Distributed computing

ACM SIGCOMM INTERNET MEASUREMENT WORKSHOP[removed]On the Use and Performance of Content Distribution Networks

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2006-04-11 12:51:58
34Network architecture / Whois / Domain name / Uniform Domain-Name Dispute-Resolution Policy / Email / DNS zone / Domain hijacking / RegisterFly / Domain name system / Internet / Computing

Cover Letter Proof of Domain Name Ownership ! To: !(mt) Media Temple ! !

Add to Reading List

Source URL: mediatemple.net

Language: English - Date: 2015-02-05 14:35:05
35Routing / Internet standards / Internet protocols / Border Gateway Protocol / Multihoming / Router / Classless Inter-Domain Routing / IP address / IP hijacking / Network architecture / Internet / Computing

BGPDNS Using BGP topology information for DNS RR sorting a scalable way of multi-homing André Oppermann

Add to Reading List

Source URL: www.nrg4u.com

Language: English - Date: 2002-01-15 12:08:41
36Network architecture / Computing / Internet standards / Whois / Domain name / Name server / Computer network security / DNS hijacking / Google Public DNS / Domain name system / Internet / Internet protocols

DNS as a Control Point for Cyber Risk DR . PAU L V I X I E February 3, 2015 FARSIGHT SECURITY, INC. - COMPANY CONFIDENTIAL © 2015

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2015-02-06 11:01:10
37Avast! / Sandbox / Spyware / Real-time protection / Multiscanning / Software / Antivirus software / System software

Avast Pro Antivirus 2015 Avast Pro Antivirus 2015 supplies essential security plus additional protection against DNS hijacking and a test space for suspicious files. We start with the most-trusted security in the world a

Add to Reading List

Source URL: files.avast.com

Language: English - Date: 2014-11-05 05:23:34
38Malware / Computing / DNS hijacking / Cybercrime / Preet Bharara / Computer virus / Spyware / Computer network security / Internet fraud / Internet

UNITED STATES ATTORNEY’S OFFICE Southern District of New York U.S. ATTORNEY PREET BHARARA FOR IMMEDIATE RELEASE Friday, October 31, 2014 http://www.justice.gov/usao/nys

Add to Reading List

Source URL: oig.nasa.gov

Language: English - Date: 2014-11-07 13:48:00
39Domain name system / Internet ethics / Internet privacy / Privacy / Censorship of YouTube / Internet censorship / DNS hijacking / Proxy server / OpenDNS / Internet / Computing / Computer network security

A Look at the Consequences of Internet Censorship Through an ISP Lens Sheharbano Khattak1 , Mobin Javed2 , Syed Ali Khayam3 , Zartash Afzal Uzmi4 , Vern Paxson2,5 1 University of Cambridge, 2 UC Berkeley, 3 PLUMgrid, 4

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-09-18 14:16:36
40Network architecture / Domain registration / Domain name / ICANN / Whois / Email spam / .co / DNS hijacking / Botnet / Internet / Domain name system / Computing

Radix – Acceptable Use and Anti-Abuse Policy 1. General Provisions 1. Radix FZC and its subsidiaries (“Radix”) arecommitted to the stable and secure operation of its top-level domains (“TLDs”). Abusive use of d

Add to Reading List

Source URL: radixregistry.com

Language: English - Date: 2014-08-25 07:03:33
UPDATE