Firewall software

Results: 818



#Item
301Computer network security / Computing / Application security / Application firewall / Penetration test / Web application security / Vulnerability / Cross-site scripting / SQL injection / Computer security / Cyberwarfare / Software testing

Source Code Analysis Made Easy The Web AppSec How-to: The Defenders’ Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to dis

Add to Reading List

Source URL: www.checkmarx.com

Language: English - Date: 2014-12-31 05:13:21
302Cross-platform software / Software testing / Cross-site scripting / JavaScript / HTTP cookie / Vulnerability / Form / Java / Application firewall / Computing / Computer security / Cyberwarfare

SPECTRE: A Tool for Inferring, Specifying and Enforcing Web-Security Policies David Scott and Richard Sharp Computer Laboratory, University of Cambridge, William Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, UK

Add to Reading List

Source URL: dave.recoil.org

Language: English - Date: 2014-05-31 17:38:32
303Cyberwarfare / Network architecture / Internet privacy / Content-control software / Privacy / Internet censorship / Denial-of-service attack / WikiLeaks / Firewall / Computing / Internet / Computer network security

Censorship and Co-option of the Internet Infrastructure Michael Bailey Electrical Engineering and Computer Science Department University of Michigan, Ann Arbor, MI[removed]removed]

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2014-08-05 13:28:18
304System software / Secure Shell / Port knocking / Firewall / Nmap / Vulnerability / OpenSSH / Exploit / Stateful firewall / Software / Computer network security / Computing

Advances In Single Packet Authorization Michael Rash Enterasys Networks, Inc. http://www.cipherdyne.org/ ShmooCon

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:38:56
305Internet / Cross-platform software / Firebird / Port / Computer networking / Stateful firewall / Direct Client-to-Client / Computing / Software / Computer network security

Firebird Conference Prague 2005 The Power of Firebird Events

Add to Reading List

Source URL: www.intitec.com

Language: English - Date: 2012-05-10 06:13:43
306Computer network security / Iptables / Discontinued software / Ipchains / Network address translation / Firewall / PF / Internet protocol suite / Netfilter / System software / Software / Computing

IP Masquerading using iptables Eli Billauer eli [removed] IP Masquerading using iptables – p.1

Add to Reading List

Source URL: www.billauer.co.il

Language: English - Date: 2003-10-21 12:11:05
307Hyper-V / Windows Server / Hypervisor / Proxy server / VM / Trusted Computing / Embedded hypervisor / Virtual firewall / System software / Software / Computer networking

“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten Schwan Georgia Tech Information Security Center & Center for Expe

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-09 17:34:04
308System software / Internet / Data security / Firewall / Internet censorship / Great Firewall of China / Ping / Router / Google China / Computer network security / Computing / Cyberwarfare

This paper will appear at the 14th ACM Conference on Computer and Communications Security, Oct. 29-Nov. 2, 2007 ConceptDoppler: A Weather Tracker for Internet Censorship Jedidiah R. Crandall

Add to Reading List

Source URL: www.cs.unm.edu

Language: English - Date: 2007-09-12 11:58:26
309Content delivery network / Akamai Technologies / Application firewall / Software as a service / Customer relationship management / Speedera Networks / Aryaka / Computing / Cloud computing / Internet

PDF Document

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2010-04-09 03:38:07
310Computer network security / Nmap / Gordon Lyon / Transmission Control Protocol / Ping / Firewall / Stateful firewall / Idle scan / Cracking of wireless networks / Software / System software / Computing

Insecure.Org Nmap: Scanning the Internet by Fyodor Black Hat Briefings USA – August 6, 2008; 10AM

Add to Reading List

Source URL: nmap.org

Language: English - Date: 2013-04-12 14:15:31
UPDATE