171 private links
A helper tool to transfer sniffer data from ConBee USB dongle to a Wireshark instance.
Overviews of protocols involved in Internet of Things devices and applications. Help clarify with IoT layer technology stack graphics and head-to-head comparisons.
An implementation of the Chromecast CASTV2 protocol - thibauts/node-castv2
The OASIS Cyber Threat Intelligence (CTI) TC supports automated information sharing for cybersecurity situational awareness, real-time network defense, and sophisticated threat analysis. STIX and TAXII.
This page contains citations and references to information about Kerberos and related systems.
Papers and Documentation Describing Kerberos V5
Tutorials
Papers
Protocol Specifications
Proposed Protocol Extensions
Application Programming Interface
Using Kerberos for Authorization
Papers and Documentation Describing Kerberos V4
Tutorials
Papers
Protocol Specifications
Discussion and Critiques of Kerberos
Variants and Derivatives of Kerberos
This dialogue provides a fictitious account of the design of an open-network authentication system called "Charon." As the dialogue progresses, the characters Athena and Euripides discover the problems of security inherent in an open network environment. Each problem must be addressed in the design of Charon, and the design evolves accordingly. Athena and Euripides don't complete their work until the dialogue's close.
When they finish designing the system, Athena changes the system's name to "Kerberos," the name, coincidentally enough, of the authentication system that was designed and implemented at MIT's Project Athena. The dialogue's "Kerberos" system bears a striking resemblence to the system described in Kerberos: An Authentication Service for Open Network Systems presented at the Winter USENIX 1988, at Dallas, Texas.
Welcome to the biggest and most updated BGP Looking Glass and Traceroute list in internet You´ll find out 1073 Looking Glass Servers updated at 02/14/2017. If you find a broken link, or you want to announce a new looking glass site, please feel free to send us an email to info@bgplookingglass.com.
This document describes the basic concepts of Secure Sockets Layer (SSL) protocol and provides a sample transaction and packet capture.
Dans bien des cas, il peut être intéressant de visualiser les échanges entre un client et un serveur à l’aide d’outils open source comme Wireshark qui permet de capturer le trafic réseau d’un ordinateur aussi bien sous Windows, Linux ou mac.
FrameIP, le site de partage des connaissances du monde TCP / IP
mot clé : réseau Ipv6 Voip Vpn informatique Ipv4 TcpIp voip securite ipv4 tcpip ipv6 IP ip vpn
sslh accepts connections on specified ports, and forwards them further based on tests performed on the first data packet sent by the remote client.