Latest threads in Networking Firewallsshow only best voted threads
Subject | Author | Posted | Replies | |
---|---|---|---|---|
|
My new encryption software
For critiques and comments I should be very grateful. M. K. Shen Due to its length, the present code is separated into 2 parts, the 2nd part is in the next following post of this thread. Code: Select...
—
|
10 years ago
|
— | |
|
pop3 spam filter firewall or hosted service
Hello I am trying to find a services that will retrieve email from a pop3 m ailbox and have a web interface to manage spam. I only found 2 options so far. I believe the barracuda email firewall has a...
—
|
10 years ago
|
— | |
|
Firewall Appliance With Eight Segments
It's been a while since I have looked at firewall appliances. I am looking for 1U or 2U appliance that has at least six separate ethernet segments. I'm not looking for six ports on a single segment....
13
|
10 years ago
|
13 | |
|
barracuda 300 pop3 filtering question
Hello I am try to filter spam that gets to my pop3 mail boxes. I believe ba rracuda has a pop3 proxy that cleans spam. Can I use the appliance to clean pop3 mail boxes from spam? Will the barracuda...
—
|
10 years ago
|
— | |
|
CFP: 9th International Conference on Critical Infor mation Infrastructures Security (CRITIS 2014)
** Apologies for multiple copies ** CRITIS 2014 9th International Conference on Critical Information Infrastructures Security October 13-15, 2014 Limassol, Cyprus Modern society relies on the...
—
|
10 years ago
|
— | |
|
Re: Why is the Tor Project publishing exit nodes?
Their site, their rules. Maybe someone has been using Tor and hacking at their webserver.
—
|
10 years ago
|
— | |
|
What's the status of WPS on wireless routers these days?
Hello/Greetings/Hi! My client has one of those Samsung SmartCam that requires WPS for wireless connections with routers. And then, I re(member/call) WPS being a big issue last year and so. Is this a...
8
|
10 years ago
|
8 | |
|
Sonicwall L2TP Problem
Hi, hoping someone can help me.. I have a NSA 2400, I set up a L2TP VPN and my client connect fine. My only problem: I cannot reach any LAN hosts until I set my client to "send all traffic to VPN...
2
|
10 years ago
|
2 | |
|
Defense against nmap tcp synchronise scans
Assuming that a host does not require a Telnet service running in it, is it possible to create a fake telenet process that listens to the Telnet port and blocks all IP that tries to make a connection...
2
|
10 years ago
|
2 | |
|
NEOCLASSIC, An encryption scheme based largely on use of well-known classical crypto techniques
# NEOCLASSIC, A simple versatile encryption scheme (with authentication) based # largely on the straightforward use of well-known classical crypto techniques. # Prologue: # Having during the years...
2
|
10 years ago
|
2 | |
|
Remailers and similar systems are not secure
As I argued recently elsewhere, the security of remailers is poor for the following rather straightforward reason: If one sends an email through a chain of remailer nodes, the email of course has to...
—
|
10 years ago
|
— | |
|
JADE-S, a block cipher with authentication (integrity check) based on use of permutation polynomials mod 2**n
JADE-S is a successor of JADE. It employs the same PRN generation scheme as JADE but implements a novel idea of block encryption processing which is inspired by the iterative solution of systems of...
—
|
10 years ago
|
— | |
|
Create A Proxy Application
You have to tell your router to forward port 80 to 192.168.x.y
1
|
10 years ago
|
1 | |
|
[LAST CALL]: 8th International Workshop on Critical Information Infrastructures Security (CRITIS 2013)
** Apologies for multiple copies ** C a l l F o r P a p e r s 8th International Workshop on Critical Information Infrastructures Security (CRITIS 2013) Amsterdam, The Netherlands...
—
|
10 years ago
|
— | |
|
[Extended deadline - Deadline Approaching]: 8th Inte rnational Workshop on Critical Information Infrastructures Security (CRITIS 2013)
Amsterdam, The Netherlands September 16-18, 2013 Important Dates Extended deadline for submission of papers: June 15, 2013 Notification to authors: June 30, 2013 Camera-ready papers: August 16, 2013
—
|
10 years ago
|
— |