Skype protocol

Results: 85



#Item
21Computing / Skype protocol / Skype security / Software / Skype / Voice over IP

Silver Needle in the Skype

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:26
22Computing / Skype protocol / Skype security / Software / Skype / Voice over IP

Silver Needle in the Skype

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:26
23Videotelephony / Android software / Broadband / VoIP phone / Vishing / Caller ID spoofing / VoIP spam / Skype / Tru / Software / Voice over IP / Computing

VoIP Security Executive Summary Voice over Internet Protocol (VoIP) systems are attractive targets for cyber criminals and other actors with malicious intent. Yet they are regularly overlooked by defenders, especially s

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-04-18 20:00:33
24Videotelephony / Android software / Broadband / VoIP phone / Vishing / Caller ID spoofing / VoIP spam / Skype / Tru / Software / Voice over IP / Computing

G U I D E VoIP Security Executive Summary Voice over Internet Protocol (VoIP) systems are attractive targets for cyber criminals and other actors with malicious intent. Yet they are regularly overlooked by defenders, es

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-04-19 01:18:37
25Internet / Internet privacy / Computer network security / SOCKS / Skype protocol / Internet standards / Transmission Control Protocol / Password authentication protocol / Deep packet inspection / Computing / Internet protocols / Network architecture

arXiv:submit[removed]cs.CR] 14 May[removed]ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship Philipp Winter

Add to Reading List

Source URL: www.cs.kau.se

Language: English - Date: 2014-05-26 09:37:41
26Videotelephony / Skype / Internet standards / Cross-platform software / Portable software / Voice over IP / IP address / BitTorrent / Communications protocol / Software / Computing / Network architecture

I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users’ Privacy Stevens Le Blond∗ Chao Zhang† Arnaud Legout‡ Keith Ross† Walid Dabbous‡ ∗ MPI-SWS, Germany

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2011-10-16 12:32:37
27Segmentation / Skype / Transmission Control Protocol / THE multiprogramming system / Cluster analysis / Software / Computing / Image processing

Understanding Computer Usage Evolution David C. Anastasiu†1 , Al M. Rashid‡ , Andrea Tagarelli§ and George Karypis†2 † University of Minnesota, Twin Cities, MN 55455, U.S.A. ‡ Intel Corporation, 1900 Prairie C

Add to Reading List

Source URL: glaros.dtc.umn.edu

Language: English - Date: 2015-04-14 19:06:02
28Computer-mediated communication / Videotelephony / Internet protocols / Computer network security / Web 2.0 / Skype protocol / Port / User Datagram Protocol / Transmission Control Protocol / Software / Computing / Skype

NewTek TalkShow Advanced Network Tips

Add to Reading List

Source URL: newtek.com

Language: English - Date: 2015-02-10 19:51:26
29Skype / Videotelephony / Voice over IP / Supernode / SILK / Digium / Instant messaging / NAT traversal / Skype protocol / Software / Computing / Computer-mediated communication

IT Administrators Guide Skype™ for Windows® version 4.2 Version 2.0 Copyright © Skype Limited 2010

Add to Reading List

Source URL: az545221.vo.msecnd.net

Language: English - Date: 2014-02-28 12:08:05
30Internet standards / Transmission Control Protocol / Ip / Network packet / Password / Internet protocol suite / Internet protocols / TCP/IP / Skype protocol / Internet / Computing / Network architecture

NSE-OFFLINE DATA FEED Version: 1.1 Date: November 30, 2012 DOTEX INTERNATIONAL LIMITED

Add to Reading List

Source URL: www.nseindia.com

Language: English - Date: 2013-02-14 15:34:28
UPDATE