1.
Secure Multicast Network Configuration Guide
Do you really want to use these examples in your production network? ... Specific configuration examples will be documented in-line using HTML's ...
2.
kuro5hin.org || technology and culture, from the trenches
Jan 2, 2004 ... This is the unicast IP address that, at least as of this writing, is associated with the hostname www.kuro5hin.org. ...
3.
Botnets, detection and mitigation: DNSbased techniques
File Format: PDF/Adobe Acrobat - View as HTML Maintain blacklist of botnet c&c host names. •. Watch DNS query logs in realtime. •. Use sampling function to reduce false positives ...
4.
Cisco's Control Plane Policing (CoPP) Implementation Notes
This document was written in order to share some implementation experience and configuration examples with Cisco's new Control Plane Policing (CoPP) feature ...
5.
Cisco's Control Plane Policing (CoPP) Implementation Notes
This document was written in order to share some implementation experience and configuration examples with Cisco's new Control Plane Policing (CoPP) feature ...
6.
kuro5hin.org || technology and culture, from the trenches
Jan 2, 2004 ... This is the unicast IP address that, at least as of this writing, is associated with the hostname www.kuro5hin.org. ...
7.
John Kristoff at Northwestern University
John Kristoff at Northwestern University. ... John Kristoff. Northwestern University Evanston, IL USA email: jtk@northwestern.edu voice: +1 847 467-5878 ...
8.
Secure Multicast Network Configuration Guide
... remark rwhod deny 224.0.1.3 remark nis+ deny 224.0.1.8 remark srvloc deny 224.0.1.22 remark microsoft-ds deny 224.0.1.24 remark nbc-pro deny 224.0.1.25 ...
9.
#!/usr/bin/perl -wT # # $Id: sshdict,v 1.1 2007/10/19 18:05:13 jtk ...
... caching of locked account attempts # added 05-09 based on latest OpenSSH auth.c ... User h4x0r not allowed because # account is locked if ($line =~ /(? ...
10.
The Software Signature Page
Info for Software Maintainers Info for Software Users Software Sig Page End ... You should obtain the MD5 signature for software from a different place than ...