Search


PDF Archive search engine
Last database update: 25 October at 15:41 - Around 76000 files indexed.


Show results per page

Results for «authentication»:


Total: 500 results - 0.081 seconds

57143695-Improving-Enterprise-Access-Security-Using-RFID 100%

Consequently, any good access control solution should be designed in such a manner that key information cannot be retrieved without proper authentication.

https://www.pdf-archive.com/2011/09/14/57143695-improving-enterprise-access-security-using-rfid/

14/09/2011 www.pdf-archive.com

Renegotiating TLS 98%

In particular, practical attacks against HTTPS client certificate authentication have been demonstrated against recent versions of both Microsoft IIS and Apache httpd on a variety of platforms and in conjunction with a variety of client applications.

https://www.pdf-archive.com/2013/09/29/renegotiating-tls/

29/09/2013 www.pdf-archive.com

SSH Session Structure 98%

It handles the details of the ssh connection, user-authentication and runs the remote shell.

https://www.pdf-archive.com/2018/02/05/ssh-session-structure/

05/02/2018 www.pdf-archive.com

Web Application Penetration Test 97%

Penetration​ ​Test​ ​Report Issue​ ​Tracker Patrick​ ​Eugene​ ​Porche´​​ ​Jr Security​ ​Analyst 415.610.1712 PENETRATION​ ​TEST​ ​REPORT​ ​-​ ​PATRICK​ ​PORCHE´ Table​ ​Of​ ​Contents Table​ ​of​ ​Contents​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​1 Summary​ ​of​ ​Results​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​2 Broken​ ​Authentication​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​3 Sensitive​ ​Data​ ​Exposure​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​7 Broken​ ​Access​ ​Control​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​9 Security​ ​Misconfiguration​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​13 Cross-Site​ ​Scripting​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​14 Conclusion​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​18 Resources​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​ ​19 1 PENETRATION​ ​TEST​ ​REPORT​ ​-​ ​PATRICK​ ​PORCHE´ Summary​ ​of​ ​Results After​ ​performing​ ​manual​ ​penetration​ ​testing​ ​of​ ​the​ ​issue​ ​reporter​ ​application​ ​located​ ​at​ ​the​ ​web address​ ​http://ec2-34-226-201-187.compute-1.amazonaws.com/issues​​ ​I​ ​found​ ​several opportunities​ ​for​ ​increased​ ​security​ ​measures.​ ​Below​ ​is​ ​an​ ​abbreviated​ ​outline​ ​of​ ​the vulnerabilities.

https://www.pdf-archive.com/2017/11/29/web-application-penetration-test/

29/11/2017 www.pdf-archive.com

Design BNSS 97%

To ensure that functionality, a two-factor authentication is used, thanks to the company’s mobile phones.

https://www.pdf-archive.com/2017/02/07/design-bnss/

07/02/2017 www.pdf-archive.com

PID4631333 97%

A Semi-Fragile Watermarking Method Using Slant Transform and LU Decomposition for Image Authentication Imran Sikder1, Pranab Kumar Dhar*1, and Tetsuya Shimamura2 1 Department of Computer Science and Engineering, Chittagong University of Engineering and Technology (CUET), Chittagong-4349, Bangladesh 2 Department of Information and Computer Sciences, Saitama University, Saitama 338-8570, Japan Email:

https://www.pdf-archive.com/2017/04/06/pid4631333/

06/04/2017 www.pdf-archive.com

Tequila jf048637f 95%

J. Agric. Food Chem.

https://www.pdf-archive.com/2014/11/14/tequila-jf048637f/

14/11/2014 www.pdf-archive.com

ZOC SSH Features 91%

4 Authentication .......................................................................................................................................

https://www.pdf-archive.com/2018/02/05/zoc-ssh-features/

05/02/2018 www.pdf-archive.com

hitachi-id-password-manager 91%

They sign in using security questions, biometrics, a smart card, a one-time password token or mobile phone authentication and can reset passwords or clear lockouts without calling the help desk.

https://www.pdf-archive.com/2013/08/07/hitachi-id-password-manager/

06/08/2013 www.pdf-archive.com

IJEEE-10-14-Hand Vein Structure Authentication 90%

2348-4748, Volume 1, Issue 12, December 2014) Hand Vein Structure Authentication Based System Pavitra R Deepti Natawat Digital Communication and networking Pacific Institute of Technology Udaipur, India HOD, Asst.

https://www.pdf-archive.com/2014/12/26/ijeee-10-14-hand-vein-structure-authentication/

26/12/2014 www.pdf-archive.com

Thread Commissioning white paper v2 public 90%

8 Authentication and Key Agreement .......................................................................... ... 8 Authentication ......................................................................................................

https://www.pdf-archive.com/2015/11/18/thread-commissioning-white-paper-v2-public/

18/11/2015 www.pdf-archive.com

2ENDepliant 86%

COMPANY PROFILE NOFAKE Anti-Counterfeiting Systems is a partnership between international experts in the fields of authentication, brand protection, security printing, RFID and web-based traceability systems.

https://www.pdf-archive.com/2019/07/02/2endepliant/

02/07/2019 www.pdf-archive.com

Krew Life 84%

Dear Jahan and Yasmine!

https://www.pdf-archive.com/2016/09/08/krew-life/

07/09/2016 www.pdf-archive.com

VolunteerApplication NU General 83%

Volunteer Program Application Form *Required Fields Legal Name*:

https://www.pdf-archive.com/2017/12/30/volunteerapplication-nu-general/

30/12/2017 www.pdf-archive.com

Richard Artoul Resume 81%

  San Francisco, CA  (415)­308­3676  richardartoul@gmail.com  Richard Artoul  http://github.com/richardartoul  https://www.linkedin.com/in/richardartoul  http://richardartoul.github.io  Technical Skills  Strong:​  JavaScript, Node.js, Express, Angular, React, JQuery, SQL, NoSQL, TDD, Web Scraping  Experienced: ​ Backbone, Meteor, Python, Django, D3, Data Analysis    Relevant Experience  MakerSquare | Software Engineer & Fellow 2015­Current  ​ ● Created and taught a month­long, 5 days a week, 3 hours a night “MakerPrep” curriculum that introduces students to  web development and core programming concepts through JavaScript. The “MakerPrep” curriculum is now being  taught at three different campuses in SF, LA, and Austin with class sizes of up to 25 students per cohort.  ● Led instruction of 50+ students in CS and JavaScript, including Node, databases, and backend architecture.    Software Engineering Projects  CombustJS ​ | Lead Architect & Full­Stack Engineer | ​ https://github.com/crunch­crew/combustjs   CombustJS is a noBackend framework that mimics Firebase’s back­end abstraction and ease of use. It allows developers to build  real­time persistent CRUD applications, without a 3rd party, using only client­side code and any front­end framework of their choosing.  ● Designed the following systems: Object­Relational Mapping, real­time eventing, authentication, authorization,  automatically generated API, and the front­end library.  ● Created the initial prototype of the framework, including server architecture, client library, testing suite, and API  documentation.  nand2tetris ​ | Sole­Engineer | ​ https://github.com/richardartoul/nand2tetris    Creating a general purpose computer from first elements; starting from nand logic­gates all the way up to a functioning compiler.  ● Created a general purpose computer in HDL from NAND gates and DFFs only. This included making other logic  gates, an ALU, RAM, a CPU, and a “computer” chip that encapsulates the Von Neumann architecture.  ● Wrote an assembler and virtual machine translator in python, as well as full compiler in Clojure (in progress) for a  general purpose object­oriented language called Jack.  tvTourney ​ | Full­Stack Engineer​  ​ | ​ https://github.com/ChillerWhales/tvTourney​  | ​ http://tvtourney.herokuapp.com/     A web application that creates fantasy football­style leagues for any TV show.  ● Served as the back­end lead, architecting the server framework in Node / Express, including: authentication,  sessions, logging, a SQL database, a REST API, and a complete testing suite for the API.  ● Created many of the angular views and features, including client­side authentication and websocket integration.  Physician Kickbacks​  | Sole­Engineer (Full­Stack) | ​ http://www.physiciankickbacks.com​ .

https://www.pdf-archive.com/2015/11/09/richard-artoul-resume/

09/11/2015 www.pdf-archive.com