Latest threads in Networking Firewallsshow only best voted threads

Subject Author Posted Replies
 
My new encryption software
For critiques and comments I should be very grateful. M. K. Shen Due to its length, the present code is separated into 2 parts, the 2nd part is in the next following post of this thread. Code: Select...
 
pop3 spam filter firewall or hosted service
Hello I am trying to find a services that will retrieve email from a pop3 m ailbox and have a web interface to manage spam. I only found 2 options so far. I believe the barracuda email firewall has a...
 
Firewall Appliance With Eight Segments
It's been a while since I have looked at firewall appliances. I am looking for 1U or 2U appliance that has at least six separate ethernet segments. I'm not looking for six ports on a single segment....
13
13
 
barracuda 300 pop3 filtering question
Hello I am try to filter spam that gets to my pop3 mail boxes. I believe ba rracuda has a pop3 proxy that cleans spam. Can I use the appliance to clean pop3 mail boxes from spam? Will the barracuda...
 
CFP: 9th International Conference on Critical Infor mation Infrastructures Security (CRITIS 2014)
** Apologies for multiple copies ** CRITIS 2014 9th International Conference on Critical Information Infrastructures Security October 13-15, 2014 Limassol, Cyprus Modern society relies on the...
 
Re: Why is the Tor Project publishing exit nodes?
Their site, their rules. Maybe someone has been using Tor and hacking at their webserver.
 
What's the status of WPS on wireless routers these days?
Hello/Greetings/Hi! My client has one of those Samsung SmartCam that requires WPS for wireless connections with routers. And then, I re(member/call) WPS being a big issue last year and so. Is this a...
8
8
 
Sonicwall L2TP Problem
Hi, hoping someone can help me.. I have a NSA 2400, I set up a L2TP VPN and my client connect fine. My only problem: I cannot reach any LAN hosts until I set my client to "send all traffic to VPN...
2
2
 
Defense against nmap tcp synchronise scans
Assuming that a host does not require a Telnet service running in it, is it possible to create a fake telenet process that listens to the Telnet port and blocks all IP that tries to make a connection...
2
2
 
NEOCLASSIC, An encryption scheme based largely on use of well-known classical crypto techniques
# NEOCLASSIC, A simple versatile encryption scheme (with authentication) based # largely on the straightforward use of well-known classical crypto techniques. # Prologue: # Having during the years...
2
2
 
Remailers and similar systems are not secure
As I argued recently elsewhere, the security of remailers is poor for the following rather straightforward reason: If one sends an email through a chain of remailer nodes, the email of course has to...
 
JADE-S, a block cipher with authentication (integrity check) based on use of permutation polynomials mod 2**n
JADE-S is a successor of JADE. It employs the same PRN generation scheme as JADE but implements a novel idea of block encryption processing which is inspired by the iterative solution of systems of...
 
Create A Proxy Application
You have to tell your router to forward port 80 to 192.168.x.y
1
1
 
[LAST CALL]: 8th International Workshop on Critical  Information Infrastructures Security (CRITIS 2013)
** Apologies for multiple copies ** C a l l     F o r     P a p e r s 8th International Workshop on  Critical Information Infrastructures Security (CRITIS 2013) Amsterdam, The Netherlands...
 
[Extended deadline - Deadline Approaching]: 8th Inte rnational Workshop on Critical Information Infrastructures Security (CRITIS 2013)
Amsterdam, The Netherlands September 16-18, 2013 Important Dates Extended deadline for submission of papers: June 15, 2013 Notification to authors: June 30, 2013 Camera-ready papers: August 16, 2013