Search results

Jump to navigation Jump to search

Page title matches

  • [[File:C-t-security-2018-4018837019030-894.jpg|300px]] | c't-Redaktion
    3 KB (394 words) - 07:50, 25 May 2020

Page text matches

  • [[File:C-t-security-2018-4018837019030-894.jpg|300px]] | c't-Redaktion
    3 KB (394 words) - 07:50, 25 May 2020
  • * Security binding to Datagram Transport Layer Security (DTLS) == Security Considerations ==
    13 KB (2,045 words) - 14:21, 9 April 2019
  • ...''Stephane Chazelas: The Man Who Found the Web's 'Most Dangerous' Internet Security Bug''], 2014. Retrieved December 17, 2023.</ref> ...n-weimer-bash-patches">Florian Weimer. [https://www.openwall.com/lists/oss-security/2014/09/25/32 ''Non-Upstream Patches for Bash''], 2014. Retrieved December
    22 KB (2,902 words) - 01:29, 8 January 2024
  • ...onference on Communication and Signal Processing (ICCSP), pages 1077–1082, 2018.</ref> A botnet is defined as a compromised network that infects other devi Internet. They settle into the system using security vulnerabilities in user devices. All
    19 KB (2,991 words) - 21:43, 8 January 2024
  • ...n of various attack scenarios, providing a comprehensive evaluation of USB security. === Security Threats ===
    10 KB (1,373 words) - 18:08, 4 March 2024
  • ...s all risks of the OWASP Top 10 Project. The application also offers three security levels (low/medium/high), where the user is perfectly prepared for penetrat ...al demonstration of bWAPP the SQL injection is elected. There are possible security lacks in a SQL database where an attacker can inject the database queries t
    21 KB (2,939 words) - 16:25, 5 January 2023
  • ...Micro sd card, 1x USB Micro SD card writer, 1x case, 1x clip|elviscategory=Security/Crypto}} ...n of various attack scenarios, providing a comprehensive evaluation of USB security.
    10 KB (1,445 words) - 02:45, 3 March 2024
  • ...fidentiality, Integrity, Authenticity/Availability), which focuses on data security, to physical system safety. Stuxnet's origin remains unclear, although ther ...age of stolen certificates to legitimize to antivirus programs and Windows security.
    18 KB (2,774 words) - 21:16, 4 March 2024
  • * T. Mantoro and Y. Lazuardi. Sms based home appliance security approach using rot 13, rc4 and rsa algorithm. In 2017 International Confere ...International Conference on Trends in Electronics and Informatics (ICOEI), 2018
    16 KB (2,249 words) - 18:21, 20 December 2023
  • ...on May 13, 2018 and published it. The symposium was held on August 15-17, 2018. The researchers carry out attacks on email communication. The most importa ...ior access to emails before executing such attacks and that EFAIL is not a security threat which affects encryption, neither symmetric nor asymmetric encryptio
    21 KB (3,289 words) - 06:49, 8 January 2023
  • ...">&#9432; <b>Table 1</b>: Open Standards for Remote IoT Device Management: Security Assessment <sup>[[#References|[4]]]</sup></div> ...used again for illustration. Furthermore, the manufacturer may have taken security measures to prevent this interface from being exploited in the after-sales
    41 KB (5,744 words) - 12:19, 2 July 2020
  • ...for Sustainable Development (ICUE), 2018, pp. 1-6, doi: 10.23919/ICUE-GESD.2018.8635666.</ref>. In 2008 a study was published under the title Bitcoin: A Pe ...name=”RE2”>P. K. Kaushal, A. Bagga and R. Sobti, "Evolution of bitcoin and security risk in bitcoin wallets," 2017 International Conference on Computer, Commun
    35 KB (5,628 words) - 17:22, 8 January 2024
  • ==== 2018 ==== == Security ==
    25 KB (3,801 words) - 18:43, 3 January 2024
  • ...chnical knowledge to keep these devices up to date to protect them against security breaches and the like. In this examination a setup is examined which was us ...veillance, Alarm System and Smart Home. This allows a user to benefit from security, energy and comfort.<sup>[https://www.lupus-electronics.de/en/smart-home/]<
    101 KB (12,744 words) - 17:27, 12 March 2024
  • ...he usability, the “intelligence” and the efficiency of such tools, but the security and trustworthiness of these gadgets is still questioned, in order to deser ...e little knowledge of wireless networks to bypass considering and handling security options. To make use of the automated integration one must push the WPS-but
    112 KB (15,636 words) - 17:43, 12 March 2024
  • ...[https://www.tp-link.com/at/home-networking/wifi-router/tl-wr902ac/ IDC Q4/2018]]</sup> The TP-Link AC750 Wifi Travel Router (TL-WR902AC FW170828) transmit ...ntaining competitive prices, and thus remain the No.1 in the long term. In 2018, TP-Link sold 200 million devices worldwide, generating sales of around USD
    251 KB (33,059 words) - 17:25, 12 March 2024