نتایج جستجو برای: ssh

تعداد نتایج: 1254  

2008
Matthew Burnside Mack Lu Angelos D. Keromytis

Tw o common tools in Linuxand UNIX-based environments are SSH for secure communications and sudo for performing administrative tasks. These are independent programs with substantially different purposes, but they are often used in conjunction. In this paper, we describe a weakness in their interaction and present our solution, public-key sudo. Public-key sudo1 is an extension to the sudo authen...

2006
T. Kohno

Researchers have discovered that the authenticated encryption portion of the current SSH Transport Protocol is vulnerable to several attacks. This document describes new symmetric encryption methods for the Secure Shell (SSH) Transport Protocol and gives specific recommendations on how frequently SSH implementations should rekey.

Journal: :Gynecologic and obstetric investigation 2012
Kidong Kim Sang-Il Park Beob-Jong Kim Moon-Hong Kim Seok-Cheol Choi Sang-Young Ryu Eui-Don Lee

BACKGROUND/AIMS We examined the association of fibrin sealant use with post-operative hemorrhage in patients who underwent a loop electrosurgical excision procedure (LEEP). METHODS We retrospectively collected clinicopathologic data of 344 patients who underwent LEEP at our institute between 2007 and 2009. We defined hemorrhage which occurred between 1 and 30 days after LEEP and required elec...

Journal: :Journal of animal science 2013
L Fonseca P C F Carvalho J C Mezzalira C Bremm J R Galli P Gregorini

To maximize herbage DMI, pregrazing sward surface height (SSH) and level of herbage depletion (HD) must be such that variables determining short-term herbage intake such as bite mass (BM) and bite rate (BR) are optimized. The objective of this study was to determine a SSH target and the level of HD as a proportion of the SSH that optimizes BM and BR of beef heifers grazing Sorghum bicolor sward...

Journal: :RFC 2006
Markus Friedl Niels Provos William Allen Simpson

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo describes a new key ex...

2013
Mohammed Al-Yahya Ramzi Mothana Mansour Al-Said Mohammed Al-Dosari Nawal Al-Musayeib Mohammed Al-Sohaibani Mohammad Khalid Parvez Syed Rafatullah

The present study was undertaken to investigate the possible protective effect of Saudi Sidr honey (SSH) on carbon tetrachloride (CCl4) induced oxidative stress and liver and kidney damage in rat. Moreover, the antioxidant activity and the phenolic and flavonoidal contents were determined. The hepatorenal protective activity of the SSH was determined by assessing biochemical, hematological, and...

2010
Heather M. Larrieu

Widespread use of the SSH protocol greatly reduces the risk of remote computer access by encoding the transmission of clear text usernames and passwords. Prior to the use of SSH, packet sniffing, which allows malicious users to watch for the login process in the clear text packet traffic on a network segment, was an easy method for a malicious user to gain unauthorized access to a machine. Unfo...

2009
Yusuke Kosuda Ryôichi Sasaki

Technology called Ajax gives web applications the functionality and operability of desktop applications. In this study, we propose and implement a Secure Shell (SSH) client system using Ajax, independent of the OS or Java execution environment. In this system, SSH packets are generated on a web browser by using JavaScript and a web server works as a proxy in communication with an SSH server to ...

Journal: :Cell 2002
Ryusuke Niwa Kyoko Nagata-Ohashi Masatoshi Takeichi Kensaku Mizuno Tadashi Uemura

The ADF (actin-depolymerizing factor)/cofilin family is a stimulus-responsive mediator of actin dynamics. In contrast to the mechanisms of inactivation of ADF/cofilin by kinases such as LIM-kinase 1 (LIMK1), much less is known about its reactivation through dephosphorylation. Here we report Slingshot (SSH), a family of phosphatases that have the property of F actin binding. In Drosophila, loss ...

2015
Idan Morad Asaf Shabtai

the source, destination and nature of an attack. This can be done by enabling SSH tunneling to act as a proxy through which the malicious traffic is transmitted (e.g., leaking sensitive data, or command and control communications). As a case in point, the Flame virus detected in 2012 used SSL and SSH for stealing sensitive information and the Duqu virus detected in 2011 used SSH port forwarding...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید