To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

In computer networking, TCP Stealth is a proposed modification of the Transmission Control Protocol (TCP) to hide open ports of some TCP services from the public, in order to impede port scans. It is somewhat similar to the port knocking technique.[1][2] As of May 2015 it is an IETF Internet Draft specification.[3]

The proposal modifies the TCP three-way handshake by only accepting connections from clients that transmit a proof of knowledge of a shared secret. If the connection attempt does not use TCP Stealth, or if authentication fails, the server acts as if no service was listening on the port number.[4]

The project and initial Internet Draft specification was announced on 15 August 2014,[3] following the revelations about the GCHQ project HACIENDA, which uses port scanning to find vulnerable systems for Five Eyes intelligence agencies.[1][5] The draft was written by researchers from the Technische Universität München, Jacob Appelbaum of the Tor Project and Holger Kenn from Microsoft.

References

  1. ^ a b David Meyer (15 August 2014). "New "TCP Stealth" tool aims to help sysadmins block spies from exploiting their systems". GigaOM.
  2. ^ "TCP Stealth software prevents cyber attacks". BGR Media. 18 August 2014.
  3. ^ a b TCP Stealth. 17 January 2015. I-D draft-kirsch-ietf-tcp-stealth-01.
  4. ^ "TUM researchers develop defense software "TCP Stealth"". Technische Universität München. 15 August 2014.
  5. ^ "NSA/GCHQ: The HACIENDA Program for Internet Colonization". 15 August 2014.

External links


This page was last edited on 20 March 2024, at 02:26
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.