Research paper topics, free example research papers

Free research papers and essays on topics related to: spoofing

  • 4 results found, view research papers on page:
  • 1
  • Computer Hacking - 1,606 words
    Computer Hacking As the world becomes more and more reliant on computers the computer hacking industry is greatly rising. With people such as Kevin Mitnick, who is known as a computer terrorist (Kjochaiche 1), computerized information isn't safe any more. Kevin is known as the most high-profiled computer criminal and responsible for more havoc in the computer world today.(1) He considered this a fun and easy task. He got caught and thrown into prison, but once he got out nothing changed. Kevin stated that as long as the technology is there it just calls to people to break into it. Computer hackers usually start off young, thinking that it is nothing but a little harmless fun. But as they get ...
    Related: computer hacking, computer system, computer viruses, computer world, hacking
  • Network Design And Implementation Solution - 3,061 words
    ... as hardware accelerated compression and the chassis incorporates 1 or optionally 2 integrated 10/100 (Ethernet/Fast Ethernet) ports. The Cisco 3600 series shares network modules, WAN Interface Cards, and Voice Interface Cards with the Cisco 2600 series. The Cisco 3600 series shares WAN Interface Cards with the Cisco 1600 and Cisco 1700 series. Key Features and Benefits The Cisco 3660, Cisco 3640, and Cisco 3620 routers support the following network applications and services: Analog and digital voice services The voice/fax network modules for the Cisco 2600 and Cisco 3600 series multiservice access routers enable packet voice technologies including VoIP and VoFR. Cisco`s voice solutions ...
    Related: area network, implementation, network, network design, network management, network technology, private network
  • Tcpip Security - 5,299 words
    TCP/IP Security The TCP/IP protocols, the basis for today's Internet, lack even the most basic mechanisms for security, such as authentication or encryption. As usage of the Internet and TCP/IP protocols increases, their lack of built-in security has become more and more problematic. This paper describes a variety of basic flaws in TCP/IP protocols and their implementations, and discusses solutions and work-arounds to these problems. Also covered is the new IPv6, the next-generation Internet protocol that, among other goals, seeks to fix many of the current flaws in the current Internet IPv4 protocol. Security in protocols and applications not essential to TCP/IP (such as HTTP, FTP, and SMTP ...
    Related: present state, internet protocol, detailed description, performing, finite
  • Tcpip Security - 5,160 words
    ... s in DNS [RFC2065] 2.7. The lack of unique identifiers When the Internet was still young, back in the 1980's, one could use an IP address to safely identify and locate a host. Addresses were both spatially unique (no one else had an identical address) and temporally unique (addresses didn't change). However, this is no longer the case [RFC2101]. Today, IP addresses may exhibit seemly strange behavior that makes identifying and locating hosts much harder. The widespread use of protocols such as PPP/SLIP [RFC1990] and DHCP [RFC1541] allow a specific host's address to change over time: per-connection in the case of PPP/SLIP, while DHCP allows hosts to lease IP addresses for arbitrary length ...
    Related: over time, more work, third party, discounting, sake
  • 4 results found, view research papers on page:
  • 1