exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 26 - 38 of 38 RSS Feed

Files

cable.html
Posted Aug 30, 2000
Authored by r1tual | Site subterrain.net

This paper is the culmination of research that describes the DOCSIS standard and related information for the purpose of explaining exactly how cable networks (@home, RoadRunner, Mediaone) are implemented from the service provider to the home. This includes details on the cryptography used, the frequencies data is transmitted on, and hardware explanations. A recommended read for anyone interested in cable-modem networks.

tags | paper
SHA-256 | a51266d77a22f525901cc0fb9b1e1e1f03cceb95d47d9b1cece1ab5b319bfd5d
ctcpec1.ps
Posted Oct 1, 1999

Canadian Trusted Computer Product Evaluation Criteria, Part 1: The Canadian "Orange Book."

tags | paper
SHA-256 | e7eef484cb4f6e9dc60e3465b7e0205788d5564ee62054ecd2ad1e62d522ef30
ctcpec2.ps
Posted Oct 1, 1999

Canadian Trusted Computer Product Evaluation Criteria, Part 2: The Canadian "Orange Book."

tags | paper
SHA-256 | 730cf84da861126ccbb59ed2c0591dab6753f778d3d69043325d26086be9acb3
exeguide.txt
Posted Oct 1, 1999

Executive Guide to the Protection of Information Resources: A US National Institute of Standards and Technology publication.

tags | paper
SHA-256 | 8c18f982563edf57ad7c8358a091442a6ca8fae049d17ca031cd814a1c6e9112
fcvol1.ps
Posted Oct 1, 1999

Federal Criteria for Information Technology Security, Volume 1: The new "Orange Book"

tags | paper
SHA-256 | 91d70ede5e19abceb9d75f03f29ea485a6b0afbf947519ed1d199ecfad42c2a1
fcvol2.ps
Posted Oct 1, 1999

Federal Criteria for Information Technology Security, Volume 2: The new "Orange Book"

tags | paper
SHA-256 | b3e165a8eff1c6bde007885ac8f90edf9fafb8ca178214c906aed823f2abd8b8
greenbk.txt
Posted Oct 1, 1999

Green Book on the Security of Information Systems: A document that sets out the development of a consistent approach to Information Security in Europe, taking into account common interests with other countries.

tags | paper
SHA-256 | 6bba7e535a52a3ed4bd2e857d3e04ef255318bcaf6861df330b237ed20bf63fb
horses.ps
Posted Oct 1, 1999

Horses and Barn Doors: Evolution of Corporate Guidelines for Internet Usage: A description of how Intel Corp's Internet usage policies were developed.

tags | paper
SHA-256 | 0c9cf01eae7b116a04dad028cc5069300632ba32ec63eeecf157dff031d6f4b9
internet.txt
Posted Oct 1, 1999

Guidelines for the Secure Operation of the Internet - RFC 1281: Provides a set of guidelines to aid in the secure operation of the Internet.

tags | paper
SHA-256 | 5d0a6db1a5cde0c7608453b7a8f8107a1edbb8805e5fffa26f876ce9b2f5f224
itsec.txt
Posted Oct 1, 1999

Information Technology Security Evaluation Criteria: The European "Orange Book".

tags | paper
SHA-256 | 47b4843b69ff9cbc8f110c8acbd01ed2fc796a597b79577798c555d2b280ca4e
mgtguide.txt
Posted Oct 1, 1999

Management Guide to the Protection of Information Resources: A US National Institute of Standards and Technology publication.

tags | paper
SHA-256 | ac88c14c65a9229c3b46e6c8b0b7bc351320745adbadd478554bf3d539b49539
psfos.ps
Posted Oct 1, 1999

Protection and Security Issues for Future Systems: An examination of the problems of protection and security as applied to future computer systems.

tags | paper
SHA-256 | 5d6fe182ed9630d4b08244ee3c447b81ee3f428b1b77d2410486bd92dcce2886
tcsec.txt
Posted Oct 1, 1999

Department of Defense Trusted Computer System Evaluation Criteria: The "Orange Book".

tags | paper
SHA-256 | ab2a71cadee430cb28d88ec068aa0f4fd43b77904b25a6f238647b21543756c1
Page 2 of 2
Back12Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Life Imitates xkcd Comic As Florida Gang Beats Crypto Password From Retiree
Posted Sep 20, 2024

tags | headline, cybercrime, data loss, cryptography
1 In 10 Orgs Dumping Their Security Vendors After CrowdStrike Outage
Posted Sep 20, 2024

tags | headline, denial of service
Cyber Crooks Strut Away With Haute Couture Harvey Nichols Data
Posted Sep 20, 2024

tags | headline, hacker, privacy, britain, cybercrime, data loss, fraud
Noise Storms: Massive Amounts Of Spoofed Web Traffic Linked To China
Posted Sep 20, 2024

tags | headline, china
Tor Network Denies Report That Anonymity Is Completely Canceled
Posted Sep 20, 2024

tags | headline, government, privacy, cryptography
Marko Polo Hackers Found To Be Running Dozens Of Scams
Posted Sep 20, 2024

tags | headline, hacker, cybercrime, fraud, phish, cryptography
Re-Opened Three Mile Island Will Power AI Datacenters Under New Deal
Posted Sep 20, 2024

tags | headline, microsoft, botnet
Social Media Users Lack Control Over Data Used By AI, US FTC Says
Posted Sep 19, 2024

tags | headline, government, privacy, usa, data loss, botnet
Hackers Demand $6 Million From Seattle Airport Operators
Posted Sep 19, 2024

tags | headline, hacker, cybercrime, data loss, fraud, cryptography
Recent WhatsUp Gold Vulnerabilities Possibly Exploited In Ransomware Attacks
Posted Sep 19, 2024

tags | headline, malware, cybercrime, flaw, cryptography
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close