13%
20.03.2014
cleartext protocols, attackers could sniff HTTP packets if they're on the same network as the victim (or between the victim and web server).
To identify this flaw in your own application, you can use Cookie
13%
09.01.2013
S services or buffering failure of the network infrastructure. Thanks to high-availability features, downtime can be minimized from the perspective of the end user, and you can largely rule out the loss
13%
17.02.2015
Communication needs privacy. It forms the basis for confidential and binding exchange. A typical email does not offer any privacy as it passes through the network in cleartext. Anyone who reads
13%
09.08.2015
, so you can determine which detection methods are used (e.g., Bayesian filtering, the network test, or the whitelist). SpamAssassin comes with simple text files containing a standard set of rules. Both
13%
09.08.2015
applications include all kinds of social networks (who with whom, when, and where). The storing of groups, documents, or project structures also benefits from flexible mapping of complex dependencies and cross
13%
03.12.2015
won't be able to access the data on the server.
Additionally, you have to consider moving data from the network interface to PM via the filesystem. With PM, you have extremely fast storage, and the I
13%
14.01.2016
.
Additionally, you have to consider moving data from the network interface to PM via the filesystem. With PM, you have extremely fast storage, and the I/O bottleneck might just have moved to the network interface
13%
03.12.2015
attackers to find them and attempt to gain access to an organization's internal network by compromising weak credentials through malware and phishing attacks. This module uses the content of the domains
13%
11.04.2016
-defined network (SDN) implementations are often responsible for latency that is significantly above that of Ethernet.
From version 1.3 on, MaxScale supports persistent database connections to its back ends. Max
13%
19.05.2016
The situation seems paradoxical: Ceph started life more than 10 years ago as a network filesystem. Sage Weil, the inventor of the solution, was looking into distributed filesystems at the time in the scope of his