.. (לתיקייה המכילה) | ||
Rudimentary Treatise on the Construction of Locks, 1853 (excerpt) | |
קישור: Link: Ссылка: وصلة: | http://www.deter.com/unix/papers/treatise_locks.html |
Pseudo-, Quasi-, and Real Random Numbers on Linux | |
קישור: Link: Ссылка: وصلة: | http://www.haifux.org/lectures/79/random.pdf |
RFC 1750 - Randomness Recommendations for Security | |
קישור: Link: Ссылка: وصلة: | http://www.faqs.org/rfc/rfc1750.txt |
Stuid Demistified | |
"Setuid Demystified" Chen, Wagner and Dean |
Cross Site Scripting | |
מחבר: Author: Автор: مؤلف: | Michael Hendrickx |
הוצאה לאור: Published by: Издательство: دار نشر: | Scanit Middle East |
"XSS.pdf" This file contain explanation about Cross Site Scripting: Roughly speaking, XSS is the ability of injecting HTML tags in the input of a web application. A "web application" can be many things, going from a web based e-mail client to 'online forums' to e-shopping malls. This list is only limited due human creativity. |
RFC 1994 - CHAP | |
CHAP provides protection against playback attack by the peer through the use of an incrementally changing identifier and a variable challenge value. The use of repeated challenges is intended to limit the time of exposure to any single attack. The authenticator is in control of the frequency and timing of the challenges | |
קישור: Link: Ссылка: وصلة: | http://www.faqs.org/rfcs/rfc1994.html |
RFC 2284 - EAP | |
The PPP Extensible Authentication Protocol (EAP) is a general protocol for PPP authentication which supports multiple authentication mechanisms. EAP does not select a specific authentication mechanism at Link Control Phase, but rather postpones this until the Authentication Phase. This allows the authenticator to request more information before determining the specific authentication mechanism. This also permits the use of a "back-end" server which actually implements the various mechanisms while the PPP authenticator merely passes through the authentication exchange. | |
קישור: Link: Ссылка: وصلة: | http://www.faqs.org/rfcs/rfc2284.html |
RFC 1700 - port and protocol | |
This RFC is a snapshot of the ongoing process of the assignment of protocol parameters for the Internet protocol suite | |
קישור: Link: Ссылка: وصلة: | http://www.faqs.org/rfcs/rfc1700.html |
RFC 1938 - One-time passwords. | |
One form of attack on networked computing systems is eavesdropping on network connections to obtain authentication information such as the login IDs and passwords of legitimate users. Once this information is captured, it can be used at a later time to gain access to the system. One-time password systems are designed to counter this type of attack, called a "replay attack" | |
קישור: Link: Ссылка: وصلة: | http://www.faqs.org/rfcs/rfc1938.html |
The "mizrachi verdict" | |
This verdict was the first rulling of an Israeli court regarding breaking to another computer | |
קישור: Link: Ссылка: وصلة: | "mizrachi verdict" http://law.co.il/computer-law/mizrachi.pdf |
The Internet Worm Program: An Analysis | |
מחבר: Author: Автор: مؤلف: | Eugene H. Spafford |
הוצאה לאור: Published by: Издательство: دار نشر: | Purdue University |
קישור: Link: Ссылка: وصلة: | The Morris Worm http://homes.cerias.purdue.edu/~spaf/tech-reps/823.pdf |
Kerberos: An Authentication Service for Computer Networks | |
מחבר: Author: Автор: مؤلف: | B. Clifford Neuman and Theodore Ts'o |
קישור: Link: Ссылка: وصلة: | http://gost.isi.edu/publications/kerberos-neuman-tso.html |
RFC 4120 - The Kerberos Network Authentication Service (V5) | |
קישור: Link: Ссылка: وصلة: | http://www.ietf.org/rfc/rfc4120.txt |
The evolution of Kerberos Authentication Service | |
מחבר: Author: Автор: مؤلف: | John T. Kohl |
קישור: Link: Ссылка: وصلة: | http://isi.edu/div7/publication_files/rs-94-412.pdf |
New Directions in Cryptography | |
מחבר: Author: Автор: مؤلف: | Whitfield Diffie and Martin E. Hellman |
Introducing Public Key Cryptography | |
קישור: Link: Ссылка: وصلة: | http://www-ee.stanford.edu/~hellman/publications/24.pdf |
PKI: It's Not Dead, Just Resting | |
מחבר: Author: Автор: مؤلف: | Peter Gutmann |
A good source for learning about X.509-style PKI, and some of its drawbacks | |
קישור: Link: Ссылка: وصلة: | http://www.cs.auckland.ac.nz/~pgut001/pubs/notdead.pdf |