Skip to main content

Home/ Information Security/ Contents contributed and discussions participated by wolf hesse

Contents contributed and discussions participated by wolf hesse

3More

Denial of service denial | Science Blog - 3 views

  • However, current filters usually rely on the computer being attacked to check whether or not incoming information requests are legitimate or not. This consumes its resources and in the case of a massive DDoS can compound the problem.
  • The user's computer has to present a filter value for the server to do a quick check. The filter value is a one-time secret that needs to be presented with the pseudo ID. The pseudo ID is also one-time use. Attackers cannot forge either of these values correctly and so attack packets are filtered out.
  • Indeed, the IPACF takes just 6 nanoseconds to reject a non-legitimate information packet associated with the DoS attack.
1More

Extreme Security -- Do It Securely or Not at all !: Use default password, get hijacked - 0 views

  •  
    Countermeasures against DNSChanger:
1More

http://blog.washingtonpost.com/securityfix/zlobpass.txt - 0 views

  •  
    sample
1More

default password list - 0 views

  • Default Password List
1 - 0 of 0
Showing 20 items per page