Latest threads in Networking Firewallsshow only best voted threads

Subject Author Posted Replies
 
Application Firewalls That Inspect Protocols?
It has been a long time since I have needed a new firewall, and I would like some pointers on developing a short list for the following requirements: * Firewall should not only support rule-based...
2
2
 
PERMPOLYPRNG, a simple PRNG based on permutation polynomials mod 2**n
Python code available at: M. K. Shen
1
1
 
m0n0wall Project Ends
Probably anyone who cares about BSD has heard this news already: It's possible someone will pick it up or fork it; hope so as there isn't anything else quite like it - most of the alternatives...
1
1
 
A novel simple manual linguistic steganography scheme for embedding bit sequences into texts
LINGUISTICSTEGANOGRAPHY is a novel extremely simple manual linguistic steganography scheme for embedding bit sequences into texts, e.g. email message body. Description and a code to verify by computer...
 
German Researchers Discover a Flaw That Could Let Anyone Listen to Your Cell Calls
http://www.washingtonpost.com/blogs/the-switch/wp/2014/12/18/german-researchers-discover-a-flaw-that-could-let-anyone-listen-to-your-cell-calls-and-read-your-texts/
 
Follow-up (minor) on pfSense Firewall
Just a little insight for any others that may have also looked at the pfSense firewall software: 1. I'm not versed in the latest incantations of Linux or any other Unix derivatives. It's been over 40...
 
PROVABLEPRIME Version 1.1.1 released
PROVABLEPRIME Version 1.1.1 has been released. It is a minor new version, containing modifications of code lines of Example 3 such that it can encrypt either a plaintext string or a byte sequence. M....
1
1
 
A Python implementation of encryption with prefix codes
PREFIXCODING, Version 2.0, available at: is an encryption scheme (with authentication) with pseudo-random prefix codes substitution and pseudo-random transposition. It has two kinds of processing...
1
1
 
sonicwall as a network switch?
I have a secondhand Sonicwall TZ 190 and i would like to know if i can use it as a basic network switch. this is what i would like my network to look like; Comcast Xfinity box> sonic wall (as a...
1
1
 
Implementaton of Maurer's algorithm of provable primes generation (with RSA etc.)
I have implemented Maurer's algorithm of provable primes generation in Python: (with illustrative coding of RSA encryption (with authentication) and digital signature for sequences of fixed-sized...
2
2
 
What could be done against the total surveillance on the Internet?
Yesterday I heard a lecture by Peter Schaar, who had worked 10 years as chief of a German governmental institution responsible for issues of Datenschutz und die Informationsfreiheit), on the question...
1
1
 
Mac's firewall software to block outbounds...
Hello. What do you guys use if you use one? I heard good thing about Little Snitch. Are there any more like it, but freeware and simple/light to customize (e.g., Kerio Personal Firewall, Outpost...
5
5
 
On Risks and Vulnerabilities of Digital Signatures
Recently I was asked by some acquaintances about the potential security risks of digital signatures. The following is a sketch of what I answered with my very humble knowledge. Hopefully experts in...
3
3
 
A new encryption software of mine
I have written a new encryption software: For critiques and comments I should be very grateful. M. K. Shen Code: Select all...
5
5
 
IPtables flagging packets invalid, no access
Hi all, Looking to get some help on an issue I'm having, preventing me from getting a certain new location going. New datacenter, connecting the feed they're providing me to L3 switch. Have not been...