TITLE

Anonymous Remailer

PUB. DATE
March 2007
SOURCE
Network Dictionary;2007, p36
SOURCE TYPE
Book
DOC. TYPE
Reference Entry
ABSTRACT
An encyclopedia entry for "Anonymous Remailer" is presented. In computer security, this term refers to a server computer that receives e-mails and forwards them without revealing the original source of the letter. Anonymous remailers are classified according to their policies and the type of attack on e-mail anonymity that they can resist. Types of anonymous remailers include Cyperphunk, Mixmaster, and nym servers.
ACCESSION #
31663724

 

Related Articles

  • Deploy Exchange 2007 on a Single Server. Dizdarevic, Damir // Windows IT Pro;Aug2008, Vol. 14 Issue 8, p59 

    The article offers tips for deploying Microsoft Exchange Server 2007 in a single-server environment. To do this, one must install three crucial server roles, namely Hub Transport, Client Access and Mailbox, on one machine, without installing the Edge Transport role at all. Instead, the Hub...

  • Site Certificate.  // Network Dictionary;2007, p445 

    A definition of the term "Site Certificate" used in relation to computer security is presented. Also known as a server certificate, a site certificate is a certificate authority (CA) certificate that aims to authenticate a server when a client communicates with the server using a web browser or...

  • Zombie.  // Network Dictionary;2007, p541 

    An encyclopedia entry for the computer security term "zombie" is presented. It is an insecure computer on which malicious people have placed code that, when triggered at the same time as other zombie servers, will launch an overwhelming number of requests toward an attack site. According to the...

  • DISTRIBUTED COMMUNICATION SYSTEMS MONITORING AND PROACTIVE SECURITY. STEFAN, CRISTIAN; JURIAN, MARIANA // Analele Universitatii Maritime Constanta;2012, Vol. 13 Issue 17, p185 

    As more and more services are moving into the cloud, the complex infrastructures that administrators have to handle each day go far beyond the number of physical servers that are used. This large scale architecture has the same security issues as traditional clusters, but risks reach for a whole...

  • Use LDAP over SSL to Lock Down Active Directory Traffic. De Clercq, Jan // Windows IT Pro;Jan2012, Vol. 18 Issue 1, p29 

    The article focuses on Active Directory (AD) LDAP, which can be secured by using the Secure Sockets Layer/Transport Layer Security (SSL/TLS) protocols. LDAPS certificate is issued by a Certification Authority (CA) and trust is established by configuring clients and the server to trust the...

  • A Lightweight RFID Authentication Protocol for Mobile Reader. He Jialiang; Ouyang Dantong; Bai Tian; Zhang Liming // International Journal of Digital Content Technology & its Applic;Apr2012, Vol. 6 Issue 6, p80 

    Special physical character and strictly limited resources in tags make RFID systems being confronted with many security problems, mobile reader brings higher design requirements for RFID protocols. In this paper, a lightweight RFID authentication protocol for mobile reader is proposed, this...

  • Decoding the future's signals. Coffee, Peter // eWeek;1/8/2007, Vol. 24 Issue 1, p47 

    The author reflects on the importance of cost and value among enterprise technologists who wish for better computer security systems. He says that extra spending on server hardware and software licenses does not mean better performance is expected. According to him, public networks are more cost...

  • TREND MICRO INTEGRATES WITH MICROSOFT AZURE.  // Computer Security Update;Jan2016, Vol. 17 Issue 1, p6 

    The article reports on the move by Trend Micro Inc. to integrate Trend Micro Deep Security into the Microsoft Azure Security Center. Topics covered include the integration allowing customers to have access to a single view of all Azure subscriptions and live workload monitoring capabilities,...

  • Master Key.  // Network Dictionary;2007, p301 

    A definition of the term "Master Key" used in relation to computer security is presented. It refers to a key used by the client and server for generating session keys, such the client-read key, the client-write key, the server-read key and the server-write key. A master key can be exported as a...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics