wiby  
Settings



the Scanner Tarpit HOWTO: Planning

http://www.impsec.org/linux/security/scanner-tarpit-3.html

512 rexec (weak authentication) 513 rlogin (cracking weak passwords) 514 rsh (weak authentication) 515 LPD (BO flaws) 635 NFS mounts 1433 Microsoft SQL server (default install has

Butler W. Lampson

http://bwlampson.site/

This is the 1983 paper. Authentication in Distributed Systems: Theory and Practice . Usable Security—How to Get It Computer Security in the Real World . Alto and Ethernet Software

https://www.rfc-editor.org/rfc/rfc2839.txt

https://www.rfc-editor.org/rfc/rfc2839.txt

of supported Telnet authentication and encryption option negotiations, plus significant functional benefits. While this document describes a new service for the Internet, the clie

https://www.rfc-editor.org/rfc/rfc5894.txt

https://www.rfc-editor.org/rfc/rfc5894.txt

identification and authentication protocols. Several elements of IDNA2008 give interpretations to strings prohibited under IDNA2003 or prohibit strings that IDNA2003 permitted. Th

Develop an Application

https://www.billdietrich.me/DevelopApplication.html

device and OS. Often authentication/login is done implicitly, using the ID of the phone. Varying, limited, intermittent, and maybe metered network connection. If applicable, expec
Strategies, tools, and languages for developing applications for personal computers and smartphones

Network Protocols and Standards

https://lisans.cozum.info.tr/networking/7KATMANNetworkProtocolsandStandards.htm

encryption. Kerberos An authentication system, Kerberos is designed to enable two parties to exchange private information across an open network. It works by assigning a unique ke

simonsafar.com

https://simonsafar.com/

( 2022/01/02 ) Authentication vs. Sybil Attacks ( 2021/12/30 ) Mounting is Outdated ( 2021/12/28 ) Programming Languages as Interfaces ( 2021/12/26 ) Life After Facebook: what is

About Anthony Thyssen

https://antofthy.gitlab.io/anthony.html

Active Directory Authentication. Networking software: including Netscape, Secure Shell (SSh), etc.. PGP mail, Digital Signatures, and file encryption. Exim, Sendmail, Procmail mai

Windows Internet Kermit Service - User Guide

https://www.kermitproject.org/wiksduser.html

clear-text or secure authentication methods. Here are the kinds of things that WIKSD can do (within your logged-in access rights): Transfer files to and from your Telnet client (i

Trends and the Future of Computing and the Internet

http://mrp3.com/trends.net.html

with Passport authentication, SOAP, and other built-in technologies, appears to be a method by which Microsoft could have leveraged the server side of the Internet, forcing them i

Linux WPA Supplicant (IEEE 802.1X, WPA, WPA2, WPA3, RSN, IEEE 802.11i)

http://w1.fi/wpa_supplicant/

roaming and IEEE 802.11 authentication/association of the wlan driver. wpa_supplicant is designed to be a "daemon" program that runs in the background and acts as the backend comp
WPA Supplicant for Linux, BSD, and Windows (IEEE 802.1X, WPA, WPA2, WPA3, RSN, IEEE 802.11i)

jxself.org

https://jxself.org/

turn off password authentication and require SSH keys. However, simply giving your computers standard SSH access creates a new vulnerability. If a machine is compromised, the malw


Find more...