YURTSEVEN.ORG is completely for sale, including entire Databases and Domainname.    Price: USD 49.900,-    Phone: +49(176)74919078
     
     
Yurtseven.ORG
 Yurtseven.ORG
     
HOME host:www.securityfocus.com  Search for:  host:www.securityfocus.com
 
Sort by Sort by          Date Sort by       Alphabetical Sort by       Category Sort by

Showing  1 - 10  of total  26  results  [ 0.515  seconds ]  


 
   
  07-January-2012 
Article discussing the use of honeypot technology to combat attacks on wireless networks.


     [similar pages] 


 
   
  07-January-2012 
Mark Rasch writes that Gmail's targeted advertising based on text analysis "represents a disturbing conceptual paradigm -- the idea that computer analysis of communications is not a search. This is a dangerous legal precedent which both law enforcemen...


     [similar pages] 


 
   
  07-January-2012 
Article on hacker who broke Apple's iTunes authentication, allowing non iTunes clients to connect to the service.


     [similar pages] 


 
   
  07-January-2012 
Article discussing issues with Honeypot technology, focusing on dealing with the possibility of your Honeypot being detected (and potentially abused) by an attacker.


     [similar pages] 


 
   
  07-January-2012 
Offers current news and articles explaining key IT security concepts.


     [similar pages] 


 
   
  07-January-2012 
Article discussing how Microsoft have developed a series of Windows XP clients, dubbed "honeymonkeys", that crawl the Web finding sites that use unreported vulnerabilities to compromise unsuspecting users.


     [similar pages] 


 
   
  07-January-2012 
This paper discusses honeytokens, honeypots that are not computers, but rather digital entities that are stored in a restricted part of the network.


     [similar pages] 


 
   
  07-January-2012 
This article is about deploying and managing honeypots in large, distributed environments through the use of Honeypot Farms.


     [similar pages] 


 
   
  07-January-2012 
This paper evaluates the usefulness of using honeypots to fight spammers.


     [similar pages] 


 
   
  07-January-2012 
This paper evaluates the usefulness of using honeypots to fight Internet worms and perform counterattacks.


     [similar pages] 

1  2  3  Next »


Easy Web Admin


Add URL  |  My Sites  |  My Account  |  Login  |  Contact Us