wiby  
Settings



ImperialViolet - Posts index - ImperialViolet.org

https://www.imperialviolet.org/posts-index.html

2005 » Decoupling authentication and IP addresses 27 Jun 2005 » MGM vs. Grokster 25 Jun 2005 » We apologise for this short interruption of service... 22 Jun 2005

I'm not really Stanley Lieber.

http://stanleylieber.com/

switched to local-only authentication. This measure was purely practical but had political ramifications. Somwhere high above the dictator gazed down from his office. Disintereste

the Scanner Tarpit HOWTO: Planning

http://www.impsec.org/linux/security/scanner-tarpit-3.html

512 rexec (weak authentication) 513 rlogin (cracking weak passwords) 514 rsh (weak authentication) 515 LPD (BO flaws) 635 NFS mounts 1433 Microsoft SQL server (default install has

Cryptocurrency

https://www.billdietrich.me/Cryptocurrency.html

with two-factor authentication". I do have a Spanish phone, but I said "skip for now". Got GDAX dashboard. But it turns out you can't go any further without giving a phone number;
Opening a cryptocurrency account and trading real money for less real money

Butler W. Lampson

http://bwlampson.site/

This is the 1983 paper. Authentication in Distributed Systems: Theory and Practice . Usable Security—How to Get It Computer Security in the Real World . Alto and Ethernet Software

https://www.rfc-editor.org/rfc/rfc2839.txt

https://www.rfc-editor.org/rfc/rfc2839.txt

of supported Telnet authentication and encryption option negotiations, plus significant functional benefits. While this document describes a new service for the Internet, the clie

https://www.kermitproject.org/ftp/kermit/ckermit/makefile

https://www.kermitproject.org/ftp/kermit/ckermit/makefile

(versions that support authentication and encryption) # are described after the following list. Search for ******* below. # # -------------------------- # Complete list (alphabeti

https://www.rfc-editor.org/rfc/rfc5894.txt

https://www.rfc-editor.org/rfc/rfc5894.txt

identification and authentication protocols. Several elements of IDNA2008 give interpretations to strings prohibited under IDNA2003 or prohibit strings that IDNA2003 permitted. Th

Develop an Application

https://www.billdietrich.me/DevelopApplication.html

device and OS. Often authentication/login is done implicitly, using the ID of the phone. Varying, limited, intermittent, and maybe metered network connection. If applicable, expec
Strategies, tools, and languages for developing applications for personal computers and smartphones

Network Protocols and Standards

https://lisans.cozum.info.tr/networking/7KATMANNetworkProtocolsandStandards.htm

encryption. Kerberos An authentication system, Kerberos is designed to enable two parties to exchange private information across an open network. It works by assigning a unique ke

simonsafar.com

https://simonsafar.com/

( 2022/01/02 ) Authentication vs. Sybil Attacks ( 2021/12/30 ) Mounting is Outdated ( 2021/12/28 ) Programming Languages as Interfaces ( 2021/12/26 ) Life After Facebook: what is

Trends and the Future of Computing and the Internet

http://mrp3.com/trends.net.html

with Passport authentication, SOAP, and other built-in technologies, appears to be a method by which Microsoft could have leveraged the server side of the Internet, forcing them i


Find more...