Hijacking

Results: 635



#Item
181Domain name / .se / .org / Domain / Domain hijacking / Domain name registrar / Domain name system / Internet / Network architecture

TERMS AND CONDITIONS OF REGISTRATION Applicable for the top-level domain .se from February 15, 2011 (The Swedish version of the Terms and Conditions of Registration shall prevail) 1

Add to Reading List

Source URL: www.iis.se

Language: English - Date: 2013-09-02 04:03:17
182Mobile telecommunications / Internet protocols / Open standards / Provisioning / Telecommunications / SMS / Proxy server / Open Mobile Alliance / Push Access Protocol / Technology / Mobile technology / Wireless

Hijacking Mobile Data Connections Cristofaro Mune Roberto Gassira’ Roberto Piccirillo

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
183Computing / Internet standards / Routing / Internet protocols / Border Gateway Protocol / Resource Public Key Infrastructure / Autonomous system / IP hijacking / BGP confederation / Network architecture / Internet / Routing protocols

Effects of RPKI Deployment on BGP Security Alexandru Ștefănescu

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-04 18:39:47
184Routing / Internet standards / Internet protocols / Border Gateway Protocol / IP hijacking / Route filtering / Router / Classless Inter-Domain Routing / Route Views / Network architecture / Internet / Computing

Pretty Good BGP: Protecting BGP by Cautiously Selecting Routes Josh Karlin University of New Mexico Stephanie Forrest University of New Mexico

Add to Reading List

Source URL: www.cs.unm.edu

Language: English - Date: 2005-10-27 19:53:22
185HTTP / Internet privacy / HTTP cookie / Session fixation / Cross-site scripting / Cross-site request forgery / Session hijacking / Session / HTTP header injection / Cyberwarfare / Computer security / Computing

Session Fixation – the Forgotten Vulnerability? Michael Schrank1 1 Bastian Braun2

Add to Reading List

Source URL: web.sec.uni-passau.de

Language: English - Date: 2015-02-24 12:13:25
186MOT test / Road transport / Aircraft hijacking / Transport / Land transport / Hijacking

Microsoft Word - NHPA HIJACK PREVENTION GUIDELINES

Add to Reading List

Source URL: www.jumpjet.info

Language: English - Date: 2010-08-25 00:45:18
187.com / Domain / .au / Email / Domain hijacking / Internet / Domain name system / Domain name

Domain Transfer of Ownership Form Domain If you would like to transfer the ownership of your domain name to another party please fill out the following application form and

Add to Reading List

Source URL: www.crazydomains.com.au

Language: English - Date: 2015-05-20 14:41:09
188HTTP / Network protocols / Session poisoning / Computer network security / Session fixation / Cryptographic protocols / Secure communication / HTTP cookie / Session hijacking / Computing / Cyberwarfare / Computer security

Abusing Locality in Shared Web Hosting Nick Nikiforakis, Wouter Joosen Martin Johns DistriNet, Katholieke Universiteit Leuven

Add to Reading List

Source URL: lirias.kuleuven.be

Language: English
189Cross-site request forgery / HTTP / Computer network security / Cross-site scripting / Session hijacking / HTTP cookie / Session fixation / Password / JavaScript / Computer security / Cyberwarfare / Computing

A User-level Authentication Scheme to Mitigate Web Session-Based Vulnerabilities 1 1

Add to Reading List

Source URL: web.sec.uni-passau.de

Language: English - Date: 2015-02-24 12:13:25
190Bail / Canadian criminal law / Chargesheet / Criminal Procedure Code / Law / Criminal law / Criminal procedure

1 CHAPTER IX THE ANTI-HIJACKING ACT, 1982

Add to Reading List

Source URL: dgca.nic.in

Language: English - Date: 2004-08-02 05:24:08
UPDATE