wiby  
Settings



Free Haven's Selected Papers in Anonymity

https://www.freehaven.net/anonbib/topic.html

) · Hiding Routing Information ( PDF ,  gzipped PS )   (Cached:  PDF ,  gzipped PS ) by David M. Goldschlag, Michael G. Reed, and Paul F. Syve

Linux parancsok, kezdőknek

http://www.letix.hu/#csomag/

gjelenítése (Routing table) route add -net 192.168.10.0 netmask 255.255.255.0 eth0 # A 192.168.10.0-s hálózatra menő csomagokat az eth0-ra irányítja a rendszer # A hálót így már lá
Linux parancsok kezdőknek

The Roswell Ray Gun

https://the-wanderling.com/roswell_raygun.html

sort of manifest or routing slip together with what a bowling team buddy told him from information he had received from security guarding the trucks. If the cargo was top secret m

UltraTechnology Homepage, Forth, Chips, F21, Jeff Fox, Charles Moore, Video Theater

http://www.ultratechnology.com/

a smart network routing processor allowing the Forth CPU to execute remote proceedure calls over the network with a one microsecond latency, a real-time clock, parallel port, time
UltraTechnology homepage, Minimal Instruction Set Computers,MuP21 and F21 processors designed by the inventor of Forth, Chuck Moore,articles, specs, tools, chips, videos, online st

37/ZMTP | ZeroMQ RFC

https://rfc.zeromq.org/spec/37/

metadata (e.g routing-id or group) must be attached to the message. Socket types that are part of the thread-safe family: CLIENT SERVER RADIO DISH SCATTER GATHER PEER CHANNEL Mult
37

Resume of Eugene E Kashpureff

https://kashpureff.org/ekashp/resume.html

control lists and routing policies in wide area, local, and storage networks. Experienced with secure systems configuration, monitoring, and auditing in large diverse environments

Stuart Cheshire

https://stuartcheshire.org/

classless — each routing table entry includes a subnet mask. RFC 3397 DHCPv4 Domain Search Option , November 2002 Category: Standards Track Abstract: This document defines a

Electt: Running Auditable and Verifiable Elections in Untrusted Environments - Kirill's journal

https://kirill.korins.ky/articles/electt-running-auditable-and-verifiable-elections-in-untrusted-environments/

are encrypted by onion routing, which has a layer with the key of the election instance, so it’s impossible for a quorum to decode the results before they have announced the
We present a system for running auditable and verifiable elections in untrusted environments. Votes are anonymous since the order of candidates on a ballot sheet is random. Tellers

The Heroic Age: Lucius Artorius Castus

https://www.heroicage.org/issues/2/ha2lac.htm

to be having success in routing the Caledonii. Whatever the case, continue Castus did. The Caledonii turned to face the Sarmatians at York (Nennius's "city of the legions"; Field
Even though Lucius Artorius Castus lived in the second century, his biography provides a number of parallels with King Arthur. In this part of the series, I present the parallels


Find more...