the Scanner Tarpit HOWTO: Planninghttp://www.impsec.org/linux/security/scanner-tarpit-3.html
512 rexec (weak authentication) 513 rlogin (cracking weak passwords) 514 rsh (weak authentication) 515 LPD (BO flaws) 635 NFS mounts 1433 Microsoft SQL server (default install has
Butler W. Lampsonhttp://bwlampson.site/
This is the 1983 paper. Authentication in Distributed Systems: Theory and Practice . Usable Security—How to Get It Computer Security in the Real World . Alto and Ethernet Software
https://www.rfc-editor.org/rfc/rfc2839.txthttps://www.rfc-editor.org/rfc/rfc2839.txt
of supported Telnet authentication and encryption option negotiations, plus significant functional benefits. While this document describes a new service for the Internet, the clie
https://www.rfc-editor.org/rfc/rfc5894.txthttps://www.rfc-editor.org/rfc/rfc5894.txt
identification and authentication protocols. Several elements of IDNA2008 give interpretations to strings prohibited under IDNA2003 or prohibit strings that IDNA2003 permitted. Th
Develop an Applicationhttps://www.billdietrich.me/DevelopApplication.html
device and OS. Often authentication/login is done implicitly, using the ID of the phone. Varying, limited, intermittent, and maybe metered network connection. If applicable, expec
Strategies, tools, and languages for developing applications for personal computers and smartphones
Network Protocols and Standardshttps://lisans.cozum.info.tr/networking/7KATMANNetworkProtocolsandStandards.htm
encryption. Kerberos An authentication system, Kerberos is designed to enable two parties to exchange private information across an open network. It works by assigning a unique ke
simonsafar.comhttps://simonsafar.com/
( 2022/01/02 ) Authentication vs. Sybil Attacks ( 2021/12/30 ) Mounting is Outdated ( 2021/12/28 ) Programming Languages as Interfaces ( 2021/12/26 ) Life After Facebook: what is
About Anthony Thyssenhttps://antofthy.gitlab.io/anthony.html
Active Directory Authentication. Networking software: including Netscape, Secure Shell (SSh), etc.. PGP mail, Digital Signatures, and file encryption. Exim, Sendmail, Procmail mai
Windows Internet Kermit Service - User Guidehttps://www.kermitproject.org/wiksduser.html
clear-text or secure authentication methods. Here are the kinds of things that WIKSD can do (within your logged-in access rights): Transfer files to and from your Telnet client (i
Trends and the Future of Computing and the Internethttp://mrp3.com/trends.net.html
with Passport authentication, SOAP, and other built-in technologies, appears to be a method by which Microsoft could have leveraged the server side of the Internet, forcing them i
Linux WPA Supplicant (IEEE 802.1X, WPA, WPA2, WPA3, RSN, IEEE 802.11i)http://w1.fi/wpa_supplicant/
roaming and IEEE 802.11 authentication/association of the wlan driver. wpa_supplicant is designed to be a "daemon" program that runs in the background and acts as the backend comp
WPA Supplicant for Linux, BSD, and Windows (IEEE 802.1X, WPA, WPA2, WPA3, RSN, IEEE 802.11i)
jxself.orghttps://jxself.org/
turn off password authentication and require SSH keys. However, simply giving your computers standard SSH access creates a new vulnerability. If a machine is compromised, the malw
Find more...