نتایج جستجو برای: unauthorized exploiters

تعداد نتایج: 4344  

2012
U. J. Raju K. G. Revathi K. Raghava Rao

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. HTTP is not only used for communication purpose, it is also used for file/data transfer, chatting, etc. The HTTPS protocol to guarantee privacy and security in transactions ranging from home banking...

2012
Kuljeet Kaur

Inbuilt physical security in wireless networks is not obtainable and unfortunately these are more prone to attacks from intruders. Resources are easily accessible, once an unauthorized access is gained. Paper elucidates numerous attacks which an intruder could use to detect and connect to the wireless network. Focus of the paper is on two technologies Wired Equivalent Privacy (WEP) and IEEE 802...

2017
Jelmer Brouwer Maartje van der Woude Joanne van der Leun

In this article we examine whether the proposal to criminalize illegal stay in the Netherlands was preceded by increased negative media attention for unauthorized immigrants. Using a corpus linguistics approach, we carried out a quantitative discourse analysis of all newspaper articles on unauthorized migrants over a period of 15 years. Our results show that the amount of media coverage actuall...

Background & Aims of the Study: Risky driving behaviors are a set of actions that put drivers at the risk of death or injuries which are caused by the violations of legal standards. These kinds of behaviors are the key factor leading to a higher risk of traffic crashes and injuries. The present study aimed to investigate the situation of some high-risk traffic behaviors and the related factors ...

Journal: :Issue brief 2003
Mila Kofman Kevin Lucia Eliza Bangit

T he United States is experiencing an unprecedented influx of unauthorized insurers selling phony health insurance.The last time this occurred, more than a decade ago, nearly 400,000 people were left with $123 million in unpaid medical bills. Unauthorized health insurance companies intentionally fail to comply with state and federal law regarding insurance regulation; they collect premiums for ...

2011
Georgios Portokalidis Angelos D. Keromytis

Instruction-set randomization (ISR) obfuscates the “language” understood by a system to protect against code-injection attacks by presenting an ever-changing target. ISR was originally motivated by code injection through buffer overflow vulnerabilities. However, Stuxnet demonstrated that attackers can exploit other vectors to place malicious binaries into a victim’s filesystem and successfully ...

2004
Haidong Xia José Carlos Brustoloni

Academic and commercial 802.11 hotspots often use an SSLsecured captive portal to authenticate clients. Captive portals provide good usability and interoperability, but poor security. After a captive portal has authenticated a client, session hijacking and freeloading allow attackers to capture or use the client’s session. Freeloading does not require special tools and, surprisingly, is strengt...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید