120 results on '"COMPUTER network protocols"'
Search Results
2. iDoorCam lets you see who's at the front door through your smartphone.
3. Why your next smart bulb might have Bluetooth inside: Bluetooth and Zigbee might have a complimentary future rather than a competitive one.
4. Mullvad vs. NordVPN: Two popular VPNs do battle: We compare these two highly rated VPNs, feature by feature.
5. WPA3 is coming to Wi-Fi routers in 2018, with better encryption and login management.
6. KRACK Wi-Fi attack threatens all networks: How to stay safe and what you need to know.
7. KRACK Wi-Fi attacks shouldn't harm updated Windows PCs.
8. This tool can help you discover Cisco Smart Install protocol abuse.
9. InfiniBand will reach 200-gigabit speed next year.
10. TLS 1.3 gets early adoption boost through CloudFlare.
11. 100 best practices for keeping big data secure.
12. Microsoft, Samba Badlock flaw not critical, but serious enough.
13. Prepare to patch a critical flaw in Windows and Samba file sharing in 3 weeks.
14. Symantec partners with hosting providers to offer free TLS certificates to website owners.
15. Latest attack against TLS shows the pitfalls of intentionally weakening encryption.
16. ZigBee and Thread act to make their IoT smarts stack up.
17. Millions of embedded devices use the same hard-coded SSH and TLS private keys.
18. Researchers warn computer clocks can be easily scrambled.
19. Nest aims for central role in connected homes, enticing developers to integrate.
20. Gaming services, hosting companies hit with new type of DDoS attack.
21. BitTorrent programs can be abused to amplify distributed denial-of-service attacks.
22. Qualcomm joins Thread as IoT dance heats up.
23. Qualcomm joins Thread as IoT dance heats up.
24. OpenSSL fixes serious flaw that could enable man-in-the-middle attacks.
25. OpenSSL tells users to prepare for a high severity flaw.
26. Attackers abuse legacy routing protocol to amplify distributed denial-of-service attacks.
27. As open source code, Apple's Swift language could take flight.
28. The future is now: You may already be using IPv6.
29. The future is now: You may already be using IPv6.
30. Wider use of HTTPS could have prevented attack against GitHub.
31. Over 100,000 devices can be used to amplify DDoS attacks via multicast DNS.
32. In Pictures: The things end users do that drive IT teams crazy.
33. FREAK is another serious flaw in the Web's encryption.
34. Why computers still struggle to tell the time.
35. Microsoft adds HTTP Strict Transport Security support to Internet Explorer.
36. Cisco posts revenue gains, vows to beat VMware's network software.
37. Intel delays part for high-speed silicon photonic networking.
38. Critical Java updates fix 19 vulnerabilities, disable SSL 3.0.
39. OpenSSL patches eight new vulnerabilities.
40. Exploits for dangerous network time protocol vulnerabilities can compromise systems.
41. Google to kill off SSL 3.0 in Chrome 40.
42. Google extends two-factor authentication with physical USB keys.
43. Google extends two-factor authentication with physical USB keys.
44. Emerging networking technology used by Apple, Cisco will frustrate firewalls.
45. Carriers' remote control software continues to put some mobile devices at risk.
46. Web acceleration protocol nears completion.
47. Critical design flaw in Active Directory could allow for a password change.
48. FCC approves plan to spend $1B a year on school Wi-Fi.
49. Free Wi-Fi networks in SF, San Jose join hands through Hotspot 2.0.
50. No more excuses, time to roll out IPv6, says registry boss.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.