The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
One of the modern MitM-attacks on HTTPS is attacks using SSLstrip and SSLstrip+ utilities, the latter of which uses a DNS-spoofing type attack. Currently, there are several ways to protect against replacing DNS responses, but there is no available and simple tool for detecting a DNS-spoofing attack. The utility designed for this is called DNSwitch and was described in this article.
The Internet is one of the most rapidly developing technologies. New protocols for the Internet are always developing. This article focuses on the way to simplify development process of new protocols and modeling of network devices. In this paper there is presented general solution architecture and main functional blocks are described. The main objective of this work was to create a general-purpose...
Artificial neural networks have occupied significant niche in IT world, but the general concept still has some unresolved issues. This paper is devoted to Bayesian network, which is the probabilistic model organized in acyclic graph. Providing brief introduction in the world of artificial neural networks and Bayesian approach in particular we then move to the proof of the idea that Bayesian networks...
Cloud services have occupied a huge niche in today's IT world, however there are still some reasons why it is necessary to stop using remote data storage in some cases. In particular, one of such reasons is lack of confidence to cloud service provider. This article describes a way of interaction with the cloud storage where it is possible to conceal information stored in files and protect metadata...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.