Zobrazeno 1 - 5
of 5
pro vyhledávání: '"F. M. Lauria"'
Autor:
F. M. Lauria, A. De Vita
Publikováno v:
IIT-04/2022, 2022
The activities concerning the administration of several Debian-based servers, closely related to the activities concerning the administration of networking and firewalling infrastructures of the Research Area of the CNR of Pisa, allowed us to experim
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=cnr_________::a8427a9c55dfb2060c89b356b409759a
http://www.cnr.it/prodotto/i/467879
http://www.cnr.it/prodotto/i/467879
Publikováno v:
IIT TR-02/2022, 2022
This document presents a technical-practical methodology for updating and replanning complex telematic infrastructures. In detail, the methodology covers all the aspects related to maintenance of network closets, specifying how and when to perform th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=cnr_________::4bbc0c96f6580c5156ca82742e5eb169
https://publications.cnr.it/doc/463472
https://publications.cnr.it/doc/463472
Publikováno v:
IIT TR-26/2020, 2020
The easiest and widely used authentication method to access Internet services is based on username and password. When users can create their own accounts on services that require online self-registration procedure, email addresses are usually used as
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=cnr_________::960ea8a41df118090519a2822bb41de2
https://publications.cnr.it/doc/442020
https://publications.cnr.it/doc/442020
Autor:
F. M. Lauria
Publikováno v:
IIT TR-03/2018, 2018
When connecting to the Internet a new device (e.g. a computer, a server, a consumer IoT device, etc.) that publicly exposes - i.e. uses a public IPv4 address - any service on any given TCP port (e.g. TELNET on port TCP/23, etc.), the new connected no
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=cnr_________::4799aaed0cfea03797a0ef87d8fb0c08
http://www.cnr.it/prodotto/i/389043
http://www.cnr.it/prodotto/i/389043
Autor:
F. M. Lauria, A. Oliveri
Publikováno v:
IIT TR-01/2018, 2018
In order to prevent and/or mitigate the exploitation of stack-based buffer overflow vulnerabilities in executable binary files, several security defenses have been proposed in the last few decades. Some of these have been deployed mostly on operative
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=cnr_________::a30403cbf385df01a6ca1b8a9efe110b
http://www.cnr.it/prodotto/i/389044
http://www.cnr.it/prodotto/i/389044