what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 76 - 100 of 161 RSS Feed

Files Date: 1999-10-01 to 1999-10-02

klein.ps
Posted Oct 1, 1999

Foiling the Cracker: A Survey of, and Improvements to, Password Security: Demonstrates the ease with which most passwords can be guessed by a motivated attacker

tags | paper
SHA-256 | 0a147e4aaa5a55b5df22688b5b2910670bc78fe97752153c82e53ff6193a664a
layman.ps
Posted Oct 1, 1999

A Layman's Guide to a Subset of ASN1, BER, and DER.

tags | paper
SHA-256 | 011be717822753b63474c613bc2f461e8f5973c1c6e5cd45db993dc338331960
libel.txt
Posted Oct 1, 1999

Internet Libel: Is the Provider Responsible? An examination of the Cubby v Compuserve case as it applies to Internet service providers

tags | paper
SHA-256 | 3f1fc9cd91edbfecea62ca8d635e4e171a2ed03c48abf63cdd11e859f7311c62
longjobs.ps
Posted Oct 1, 1999

Long Running Jobs in an Authenticated Environment: A system for running batch jobs in an environment in which users must have tokens or tickets to run

tags | paper
SHA-256 | 318e02294793e84335a35f7f00564fefb4035d4b30041468148f2ae40d640458
mailpriv.txt
Posted Oct 1, 1999

Computer Electronic Mail and Privacy: A discussion of the Electronic Communications Privacy Act as it applies to electronic mail

tags | paper
SHA-256 | fc3a14a4ff033ee33bde5cc7413a548ab3588f83c81ec24d380a0b9c97c0c25e
mallogic.ps
Posted Oct 1, 1999

An Overview of Computer Viruses in a Research Environment: An examination of computer viruses as malicious logic in a research and development environment and current techniques in controlling the threats of viruses and other malicious logic programs

tags | paper, virus
SHA-256 | 0d4fd86ba91ab95156476f18d275bae8d226bb68ef7aff97b000018727d3f480
mgtguide.ps
Posted Oct 1, 1999

Computer Viruses and Related Threats: A Management Guide: Guidelines for preventing, deterring, containing, and recovering from attacks of viruses and related threats A report from the US National Institute of Standards and Technology

tags | paper, virus
SHA-256 | 87c8afcd6d9d623f45edd83119016001c48473a5d562e1c35f62a181abc6f91e
mgtguide.txt
Posted Oct 1, 1999

Management Guide to the Protection of Information Resources: A US National Institute of Standards and Technology publication.

tags | paper
SHA-256 | ac88c14c65a9229c3b46e6c8b0b7bc351320745adbadd478554bf3d539b49539
mit.ps
Posted Oct 1, 1999

With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988: A detailed description of the events of the Internet Worm of November 2, 1988 from one of the teams of people who combatted it

tags | paper, worm, virus
SHA-256 | 44d4224d79222ad2ef47daf229f207f80e3d78def17c4108c0f665a3714a19ef
musings.ps
Posted Oct 1, 1999

Some Musings on Ethics and Computer Break-Ins: A discussion of ethics and responsibility, particularly as they pertain to the Internet Worm of November, 1988

tags | paper, worm
SHA-256 | 421d437d5fd1ec0e1a4a1a40b1be9773191e9d448b1d687274e5bdc9e7ce584d
neke.ps
Posted Oct 1, 1999

Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks: A combination of public- and private-key cryptography that allows two parties sharing a common password to exchange confidential and authenticated information over an insecure network The protocol is secure against active attack, and also against off-line "dictionary" attacks.

tags | paper, protocol
SHA-256 | 0c355749e149e01824a8809f6373d53c0bc19f36d30b9e76b0ebb60d256de1b2
netcash1.ps
Posted Oct 1, 1999

Electronic Currency for the Internet: A framework for electronic currency for the Internet that provides a real-time electronic payment system

tags | paper
SHA-256 | 649018270068ee7873a0ebb6ac1a7da36294f08a30f7a8377802656361232e81
netcash2.ps
Posted Oct 1, 1999

NetCash: A Design for Practical Electronic Currency on the Internet: A framework for electronic currency for the Internet that provides a real-time electronic payment system

tags | paper
SHA-256 | 677fbc5787ad2f697c0f15bedb28cdc29551c488ef3402045f09d934ceecbb49
nis.ps
Posted Oct 1, 1999

A Unix Network Protocol Security Study: Network Information Service: A discussion of the security weaknesses in the Network Information Service (Yellow Pages) protocol from Sun Microsystems

tags | paper, protocol
systems | unix
SHA-256 | b8ad47dda397e9dcf1072368149a030ca633bc8476c3d6fd98aa7e08b67c44c8
nist.txt
Posted Oct 1, 1999

Computer User's Guide to the Protection of Information Resources: A report from the US National Institute of Standards and Technology

tags | paper
SHA-256 | 2e2f793b0022a5aac1dbc4eec93d2d824f1111cb1c22ca71ba5fb9dcafea5bb6
noroot.ps
Posted Oct 1, 1999

Life Without Root: A method for authorizing users to perform certain system administration tasks without giving them the super-user password

tags | paper, root
systems | unix
SHA-256 | 1eb687167cf38607327b0dffdfffb201603cdecff0fd3e279a5d2693e9c543cc
ntn.ps
Posted Oct 1, 1999

A Note on the Use of Timestamps as Nonces: A note on the use of timestamps in authentication protocols

tags | paper, protocol
SHA-256 | e6f85f06e87a1bb205c6bb6687f1311cc7f5a4333ecb8efea64805dae8cacb28
ntp.ps
Posted Oct 1, 1999

A Security Analysis of the NTP Protocol: A security analysis of the Network Time Protocol (NTP)

tags | paper, protocol
SHA-256 | ec8639acd43b244a8efc26452148d54498ee12988421cff5295777ff7bd1415d
oak93.ps
Posted Oct 1, 1999

Protocol Design for Integrity Protection: A design method for message integrity protection

tags | paper, protocol
SHA-256 | 6e2b6777656242dcb2c7e48d2e0fc6dbc6ac1ef9e176412ffce4396e558a5263
observe.ps
Posted Oct 1, 1999

Observing Reusable Password Choices: A method for observing password choices made by users, and how to protect it from being compromised

tags | paper
SHA-256 | c6f1afcd834b4c7d297d03eaa61d696bc81d6a11c24f131ec1bf3cda70d79cbe
opus.ps
Posted Oct 1, 1999

OPUS: Preventing Weak Password Choices. A system that uses Bloom filters to implement a constant-time dictionary lookup, regardless of dictionary size, to check a user's password choice for " goodness"

tags | paper
SHA-256 | 6b57074b96c811eaf86668faadb884f7bd2f8f172c78c23487e7c896d94214f0
overview.ps
Posted Oct 1, 1999

An Overview of the PKCS Standards.

tags | paper
SHA-256 | 122d86a835e3e7cf4292a749552545e6fa85fc74f5328af98e996548cddb13ae
packets.ps
Posted Oct 1, 1999

Packets Found on an Internet: A description of the types of packets, particularly the anomalous ones, that appeared at the AT&T firewall

tags | paper
SHA-256 | 0782bb46cc3a2d49f5caee720db3b3e9152c6c3aca33321facefa33fd87a67ec
part1.ps
Posted Oct 1, 1999

An Introduction to Computer Security: The NIST Handbook: A publication of the US National Institute of Standards and Technology. Draft Copy. Part I.

tags | paper
SHA-256 | 38926bbf6a97481be69b5520e5f02a16acbea2e40a661787cf76917c65a92dea
part1.ps
Posted Oct 1, 1999

Access Control and Policy Enforcement in Internetworks. Methods of controlling access policy between different administrative domains of an internetwork. Part I

tags | paper, protocol
SHA-256 | 92f9a57a4c56eb54a240bed0d4c028f1b23aa9b83537e36f8a63e8ad912dd649
Page 4 of 7
Back23456Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close