Back to Results
First PageMeta Content
Computer network security / Hacking / Password / Denial-of-service attack / Hacker / Exploit / Social engineering / Vulnerability / Password cracking / Computing / Computer security / Cyberwarfare


Technical Report CS-TR-790 (March[removed]School of Computing Science University of Newcastle upon Tyne
Add to Reading List

Document Date: 2003-07-11 10:15:19


Open Document

File Size: 78,21 KB

Share Result on Facebook

City

Newcastle upon Tyne / Routing / /

Company

Intrusion Detection Systems / Cracking Computer Systems / Google / Network Solutions / /

Event

Reorganization / /

Facility

Computing Science University of Newcastle / SANS Institute / /

IndustryTerm

everyday computing life / e.g. web defacement / concrete solution / secure systems / internet using various tools / software bugs / free software / secondary server / embedded logic chip / packet-filtering routers / client software / bogus internet address information / untrusted internet users / Internet Numbers / shared file systems / banking / e.g. web server / security products / computing / client applications / healthcare / target systems / automated discovery tools / bug-free software / access control devices / security solutions / given manufacturer / web services / /

Movie

David and Goliath / /

OperatingSystem

UNIX / DoS / /

Organization

Software Reliability School / Coordination Center / SANS Institute / MIT / Computer-Based Systems Security Budi Arief and Denis Besnard Centre / University of Newcastle / /

Person

Here / Richard Stallman / /

Position

system administrator / field service technician / Administrator / Security Accounts Manager / /

Technology

Encryption / embedded logic chip / cryptography / DNS / packet-filtering routers / firewall / UNIX / http / operating system / operating systems / web server / /

URL

www.networksolutions.com / http /

SocialTag