equal
deleted
inserted
replaced
7 |
7 |
8 %% the expectation is that anything encrypted today, will be |
8 %% the expectation is that anything encrypted today, will be |
9 %% decrypted in 20 years time |
9 %% decrypted in 20 years time |
10 |
10 |
11 %http://www.net.in.tum.de/fileadmin/TUM/teaching/netzsicherheit/ws1516/07_PKI.pdf |
11 %http://www.net.in.tum.de/fileadmin/TUM/teaching/netzsicherheit/ws1516/07_PKI.pdf |
|
12 |
|
13 %wifi-pumkin (real man-in-the-middle attacks) |
|
14 %http://www.hackingarticles.in/hack-password-using-rogue-wi-fi-access-point-attack-wifi-pumpkin/ |
|
15 %https://github.com/P0cL4bs/WiFi-Pumpkin |
12 |
16 |
13 \section*{Handout 5 (Protocols)} |
17 \section*{Handout 5 (Protocols)} |
14 |
18 |
15 Protocols are the computer science equivalent to fractals and |
19 Protocols are the computer science equivalent to fractals and |
16 the Mandelbrot set in mathematics. With the latter two you |
20 the Mandelbrot set in mathematics. With the latter two you |