This site does not infringe any Copyrights. It only lists through Freedom of Information Act what is listed on Search Engines. We do not host any files or promote the long term use of them. Please read User Agreement.


Link To Us And Get Listed In the Sidebar!!

==>>Why Some Server Administrators Make Mistakes With Their Parent Directories?<<==

It happened because somebody just dropped a server on their network without fully considering the consequences of their action. They didn't bother to properly design a server access control list, and because it is available on the public internet, it gets listed on search engines. Quite often a server administrator is very upset at his mistake, and is looking to "pursue each ISP in attempts to track down the guilty parties". Some may even try to convince others that they're breaking some laws. Unfortunately, he is ignoring the person who had the most power to prevent this situation. Themself. Live, learn, realize that you made a mistake configuring your server, and get back to working. Unless your business is that of hunting PD Searchers, it really will not be worth your while to waste money and time chasing ISPs and shadows of people you have no legal right to pursue in the first place. Simply buck up to your mistake and be glad that there is a blog that lets people know if thier directory is open to the public.



Site Map

Preview Directory Of The Month | 29 Childrens Animal Encyclopedias | Academics | Actual Tests Cisco & Others | Ajax | Algorithim | Animation | Anit-Spam | Apple & OSX | Artificial Intelligence | Asbestos Cancer & Mesthelioma | ASP | Assembly Language | Astronomy | Bluetooth | Book Of The Month | Business Management | C++ Ebooks | Chemistry | Christian / Evangelism Ebooks | Cisco | Computer Forensics | Computer Mix | Computer Mix 2 | Computer Mix 3 | Computer Mix 4 | Computer Mix 5 | Computer Security | Conspiracy | Conspiracy 2 | Cryptography | Data Mining | Dating & Sex | Dictionaries | Digital Photography | DNA Biology | Electronics | Elementry Go Theory | Energy Conversion | Engineering | Engineering 2 | Facial Expression Recognition | Fitness & Bodybuilding | Flash | Fluid Mechanics | For Dummies | For Dummies 2 | FreeBSD | Free Ebooks Section | Free Energy | Gaming Strategy | General Programming | General Programming 2 | General Programming 3 | Genomics | GNU Debugging | Google Ebooks | Guitar Ebooks & Manuals | Hacking | Hacking 2 | Home Improvement | HowTo's & Tutorials | HowTo's & Tutorials 2 | Internet Security | Investing | Java | Java 2 | Job Interview | Law Enforcement | Linux | Linux 2 | Magic & Hypnosis | Malicious Code | Manga Comics | Martial Arts | Mathematics | McGraw Hill | Medical | Microprocessors | Microsoft Press | Military Training | Money Management | More Programming | More Programming 2 | MySql | Network Analysis | Neurology | Non-IT Ebooks | Novels - Various Authors | Novels - Various Authors 2 | Object Recovery | Online Unleashed | Operating Systems | Oracle 9i & 10g | Oreilly | O'Reilly & Others | O'Reilly & Others 2 | O'Reilly & Others 3 | Origami | Patenting & Inventing | Perl | PHP | Physics | Photography | PhotoShop | Poker | Political | Programming Mix | Programming Mix #2 | Project Management | Psychology Texts & Ebooks | Python Ebooks | Random Mix | Random Mix 2 | Random Mix 3 | RapidShare Links | RapidShare Links 2 | RapidShare Links 3 | Real Estate | Recipes | Resevoir Engineering | Robotics | Sam's TeachYourself | Science | Scrambled Mixes | Self Help | Software Testing | Stock Trading | Telecommunication | Various Software | VHDL | VOIP | Web Design | Web Marketing | Wicca & Occult | Windows Server Os | Wireless | Writing & Grammar | XML & Feed Syndication |

Sunday, August 3, 2008

Anti-Spam

Get Downloads Here

index of parent directory
0wning Antivirus.ppt 60K
A Memory Symptom-based Virus Detection Approach.pdf 167K
A Model for Detecting the Existence of Unknown Computer Viruses in Real-Time.pdf 164K
A Short Visit to the Bot Zoo.pdf 742K
A Theoretical Superworm.pdf 310K
A Tour of the Worm.pdf 70K
API Win32 ancestrales pour Chevaux de Troie hyper furtifs.pdf 408K
Accurately Detecting Source Code of Attacks That Increase Privilege.pdf 139K
An Overview of Unix Rootkits.pdf 403K
An Undetectable Computer Virus.pdf 33K
Analysis of Web Application Worms and Viruses.pdf 589K
Anomalous Payload-based Network Intrusion Detection.pdf 285K
Anomalous Payload-based Worm Detection and Signature Generation.pdf 279K
Anonymous and Malicious.pdf 248K
Anti-Disassembly using Cryptographic Hash Functions.pdf 52K
Anti-Spyware Coalition Definitions and Supporting Documents.pdf 274K
Antivirus update reaction times of major antivirus vendors.pdf 232K
Automated Defense from Rootkit Attacks.pdf 193K
Avoiding Windows Rootkit Detection.pdf 106K
Backdoors et rootkits avancés [SLIDES].pdf 302K
Backdoors et rootkits avancés.pdf 248K
Becoming Positive.pdf 74K
Botnetsand Applications.pdf 679K
Computer Virus Propagation Models.pdf 291K
Computer Viruses, Epidemiology, and Worms.pdf 595K
Computer Worms: Past, Present, and Future.pdf 136K
Concepts for the Stealth Windows Rootkit (The Chameleon Project).pdf 225K
Contagion on the Internet.pdf 118K
Countering NetworkWorms Through Automatic Patch Generation.pdf 150K
Creating a Secure Computer Virus Laboratory.pdf 54K
Data Mining Methods for Detection of New Malicious Executables.pdf 158K
Database Rootkits.pdf 721K
Des IDS et des vers... Détection par l'analyse statistique : de la théorie à la pratique ?.pdf 295K
Detecting Kernel-Level Rootkits Through Binary Analysis.pdf 788K
Detecting Malicious Code by Model Checking.pdf 700K
Detecting Malicious Network Traffic Using Inverse Distributions of Packet Contents.pdf 833K
Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses.pdf 248K
Detecting Unknown Massive Mailing Viruses Using Proactive Methods.pdf 251K
Detecting Viral Propagations Using Email Behavior Profiles.pdf 1.3M
Detecting Windows Server Compromises with Patchfinder 2.pdf 187K
Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code.pdf 230K
Distributive immunization of networks against viruses using the `honey-pot' architecture.pdf 889K
Efficient Static Analysis of Executables For Detecting Malicious Behaviors.pdf 536K
Ethereal, un analyseur réseau à usages multiples ou comment détecter virus et vers par analyse réseau.pdf 499K
Fighting EPO Viruses.pdf 369K
Finding Malware on Compromised Windows Machines.pdf 102K
Hidden Rootkits in Windows.pdf 397K
HoneyStat: Local Worm Detection Using Honeypots.pdf 258K
Honeypots against Worms 101.pdf 809K
Implementing and Detecting an ACPI BIOS Rootkit.pdf 373K
Implications of Peer-to-Peer Networks on Worm Attacks and Defenses.pdf 558K
JAB, une backdoor pour reseau Win32 inconnu - Presentation SSTIC.pdf 255K
JAB, une backdoor pour reseau Win32 inconnu.pdf 75K
La "mobilité" du code malveillant.pdf 233K
Malicious Cryptography - Exposing Cryptovirology.pdf 29M
Malware Normalization.pdf 312K
Malware Phylogeny Generation using Permutations of Code.pdf 217K
Malware analysis for windows administrators.pdf 73K
Malware in Popular Networks.pdf 133K
Malware.pdf 47K
Modeling Botnet Propagation Using Time Zones.pdf 528K
Modular Worms.pdf 108K
New thoughts in ring3 NT rootkit.pdf 260K
Nimda Worm Shows You Can't Always Patch Fast Enough.pdf 24K
Old Win32 Code for a Modern Super-stealth Trojan.pdf 352K
On Effectiveness of Defense Systems against Active Worms.pdf 1.2M
On Instant Messaging Worms, Analysis and Countermeasures [slides].pdf 313K
Open Problems in Computer Virus Research.pdf 42K
Rootkit Hunting vs. Compromise Detection.pdf 340K
Rootkits - The new wave of invisible malware is here.pdf 30K
Rootkits Analysis and Detection.pdf 190K
Sandbox Technology Inside AV Scanners.pdf 241K
Securing Instant Messaging.pdf 207K
Shadow Walker - Raising The Bar For Rootkit Detection.pdf 557K
Spyware & Rootkits.pdf 71K
Spyware and Rootkits - The Future Convergence.pdf 94K
Static Analysis of Binary Code to Isolate Malicious Behaviors.pdf 68K
SweetBait: Zero-Hour Worm Detection and Containment Using Honeypots.pdf 210K
System Virginity Verifier - Defining the Roadmap for Malware Detection on Windows System.ppt 552K
TTAnalyze A Tool for Analyzing Malware.pdf 371K
The Art of File Format Fuzzing.pdf 1.1M
The Art of Rootkits 2nd Edition.doc 40K
The Brains Behind the Operation.pdf 21K
The Effect of DNS Delays on Worm Propagation in an IPv6 Internet.pdf 175K
The Internet Worm Incident.pdf 100K
The More Things Change....pdf 73K
The New Apple of Malware's Eye: Is Mac OS X the Next Windows?.pdf 145K
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets.pdf 212K
Thoughts about Cross-View based Rootkit Detection.pdf 99K
Timing Rootkits.pdf 60K
Tools for Finding and Removing Rootkits.pdf 418K
Toward an abstract computer virology.pdf 189K
Towards Automated Defense from Rootkit Attacks.pdf 164K
Towards Viable Worm Defenses.ppt 2.1M
Trends of Spyware, Viruses and Exploits.pdf 78K
Trojan White Paper.pdf 1.8M
Using Code Normalization for Fighting Self-Mutating Malware.pdf 121K
VT Integrity Services for Networking.pdf 608K
Virus Detection System - VDS.pdf 575K
When Malware Meets Rootkits.pdf 493K
Where Windows Malware Hides.doc 348K
Windows Rootkit Overview.pdf 95K
Windows Rootkits.pdf 146K

Click Here For Web Link

index of parent directory
Detecting Backdoors_files/ 04-Sep-2006 20:30 -
F-Secure Corporation Data Security Summary for 2004_files/ 04-Sep-2006 20:31 -
Malware Evolution 2005 - Kapersky Labs_files/ 04-Sep-2006 20:34 -
Skoudis - Infosec's Worst Nightmares Nov 2002_files/ 04-Sep-2006 20:40 -
Why Hackers Are a Giant Threat to Microsoft's Future_files/ 04-Sep-2006 20:42 -
Worms Wreak Havoc on the Net in '03_files/ 04-Sep-2006 20:43 -
A Framework for Modelling Trojans and Computer Virus Infection (1999).pdf 26-Jun-2005 12:38 228k
A New Approach To Mobile Code.pdf 26-Jun-2005 12:38 422k
Advanced Windows 2000 Rootkit Detection - Execution Path Analysis.pdf 26-Jun-2005 12:38 196k
Advanced Windows Rootkit Detection.pdf 26-Jun-2005 12:38 119k
Attacking Malicious Code - A Report to the IRC.pdf 26-Jun-2005 12:38 61k
Attacking Malicious Code - A report to the Infosec Research Council.doc 18-Jun-2005 20:00 84k
Automated Techniques for Provably Safe Mobile Code.pdf 26-Jun-2005 12:38 266k
Beagle_Lessons.pdf 26-Jun-2005 12:38 296k
Blaster Worm - View From 10000 Feet.pdf 09-Oct-2006 13:15 831k
Cascade, Monoculture, Policy.pdf 26-Jun-2005 14:29 872k
Detecting 0-days Attacks With Learning Intrusion Detection Systems.pdf 26-Jun-2005 12:38 557k
Detecting Backdoors.htm 26-Jun-2005 12:38 79k
Detecting and Containing IRC-Controlled Trojans - When Firewalls, AV, and IDS Are Not Enough.htm 26-Jun-2005 12:38 15k
Evaluating Untrusted Software In a Controlled Environment.pdf 26-Jun-2005 12:38 405k
Execution Monitoring of Security-Critical Programs in Distributed Systems - A Specification Based Approach.pdf 11-Jan-2006 11:25 1.1M
F-Secure Corporation Data Security Summary for 2004.htm 26-Jun-2005 12:38 56k
FTC Spyware Workshop - Monitoring Software on Your PC.pdf 26-Jun-2005 12:37 1.1M
Flexible Policy-Directed Code Safety.pdf 26-Jun-2005 12:38 93k
ICSA Labs 10th Annual Virus Prevalence Survey 2004.pdf 26-Jun-2005 12:38 964k
Intrusion Prevention - Security's Silver Bullet.pdf 26-Jun-2005 12:38 46k
MSRT Progress Made, Trends Observed.pdf 17-Jun-2006 19:05 843k
Malware Evolution 2005 - Kapersky Labs.htm 26-Jun-2005 12:38 57k
Meyers - Subversion The Neglected Aspect of Computer Security.pdf 26-Jun-2005 12:38 3.6M
Microsoft Portable Executable and Common Object File Format Specification.doc 26-Jun-2005 12:38 900k
Mobile Code Security.pdf 26-Jun-2005 12:38 135k
NISCC Briefing 082005 - Targeted Trojan attacks in the UK.pdf 26-Jun-2005 12:34 73k
NSA - The Case for Using Layered Defenses to Stop Worms.pdf 26-Jun-2005 12:38 174k
Network Magazine The Gathering DDoS Storm September 1, 2004.htm 26-Jun-2005 12:38 1k
Policy-Directed Code Safety.pdf 26-Jun-2005 12:38 376k
Polygraph - Automatically Generating Signatures for Polymorphic Worms.pdf 26-Jun-2005 12:37 171k
Polymorphic Macro Viruses.pdf 26-Jun-2005 12:38 93k
Proof Carrying Code.pdf 26-Jun-2005 12:38 316k
SANS ISC Report on Malicious BHOs.pdf 26-Jun-2005 12:38 42k
Safe, Untrusted Agents using Proof-Carrying Code.pdf 26-Jun-2005 12:38 377k
Sanbox II - Internet.pdf 26-Jun-2005 12:38 161k
Sentiri - Advances in Trojan Technology.pdf 26-Jun-2005 12:38 1.1M
Skoudis - Infosec's Worst Nightmares Nov 2002.htm 26-Jun-2005 12:38 40k
Strider GhostBuster - Why It´s A Bad Idea For Stealth Software To Hide Files.doc 26-Jun-2005 12:34 1.5M
The Complete Windows Trojans Paper.pdf 26-Jun-2005 12:38 62k
The Future of Fighting Viruses - A History and Analysis of the Digital Immune System.pdf 26-Jun-2005 12:38 241k
Viral Evolution - Infection vectors.pdf 26-Jun-2005 12:38 128k
Virus Bulletin June 2003 - The Scalable Stealth Trojan.pdf 26-Jun-2005 12:38 300k
Where There's Smoke There's Mirrors - The Truth about Trojan Horses on the Internet.htm 26-Jun-2005 12:38 86k
Why Hackers Are a Giant Threat to Microsoft's Future.htm 26-Jun-2005 12:38 35k
Worms Wreak Havoc on the Net in '03.htm 26-Jun-2005 12:38 102k
Zeltser - Reverse Engineering Malware.pdf 26-Jun-2005 12:38 241k
advanced-trojans.pdf 04-Sep-2006 21:05 1.1M
catching-malware-Detecting, Tracking, and Mitigating Botnets-BH-Japan-06.pdf 14-Oct-2006 12:23 2.8M
malicious_code.doc 19-Jun-2005 08:58 84k

Click Here For Web Link

index of parent directory
A.LVQ.based.Neural.Network.AntiSpam.Email.Approach.pdf 01-Nov-2005 13:09 381K
A.Neural.Network.Based.Approach.to.Automated.Email.Classification.pdf 01-Nov-2005 14:40 225K
A.Novel.Kernel.Method.for.Clustering.pdf 26-Oct-2005 08:55 416K
A.Parallel.Computing.Approach.to.Creating.Engineering.Concept.Spaces.for.Semantic.Retrieval.pdf 26-Oct-2005 09:05 1.6M
A.Short.Visit.to.the.Bot.Zoo.pdf 26-Oct-2005 08:58 742K
A.Simple.KNN.Algorithm.for.Text.Categorization.pdf 01-Nov-2005 14:22 310K
A.Tutorial.on.Support.Vector.Machines.pdf 01-Nov-2005 13:34 355K
AGILE.Adaptive.Indexing.for.Context.Aware.Information.Filters.pdf 01-Nov-2005 13:05 616K
Abnormality.Metrics.to.Detect.and.Protect.Against.Network.Attacks.pdf 01-Nov-2005 14:37 764K
Accuracy.Improvement.of.Automatic.Text.Classification.Based.On.Feature.Translation.pdf 01-Nov-2005 14:05 134K
Active.Electronic.Mail.pdf 01-Nov-2005 13:01 520K
Active.Learning.with.Simplified.SVMs.for.Spam.Categorization.pdf 01-Nov-2005 14:24 407K
Adaptive.Filtering.of.Spam.pdf 01-Nov-2005 14:24 573K
Adversarial.Classification.pdf 01-Nov-2005 12:59 210K
An.Email.Classification.Theory.Based.on.Rough.Set.Theory.pdf 01-Nov-2005 14:34 328K
An.Empirical.Performance.Comparison.of.Machine.Learning.Methods.for.Spam.Email.Categorization.pdf 01-Nov-2005 14:38 98K
An.Empirical.Study.of.Spam.Traffic.and.the.Use.of.DNS.Blacklists.pdf 01-Nov-2005 12:57 72K
An.Evaluation.of.Statistical.Spam.Filtering.Techniques.pdf 01-Nov-2005 12:58 336K
An.Experimental.Comparison.of.Naive.Bayesian.and.Keyword.Based.Anti.Spam.Filtering.with.Personal.Email.Messages.pdf 01-Nov-2005 13:10 792K
An.Interactive.Hybrid.System.for.Identifying.and.Filtering.Unsolicited.Email.pdf 01-Nov-2005 14:35 160K
An.Introduction.to.Kernel.Based.Learning.Algorithms.pdf 01-Nov-2005 13:36 1.7M
An.Malicious.Email.Detection.Method.Based.on.Support.Vector.Machines.pdf 01-Nov-2005 14:32 205K
An.Optimized.Approach.for.KNN.Text.Categorization.using.P.Trees.pdf 01-Nov-2005 13:45 199K
Anti.Spam.Filtering.A.Centroid.Based.Classification.Approach.pdf 01-Nov-2005 14:30 323K
AntiSpam.System.Another.Way.of.Preventing.Spam.pdf 26-Oct-2005 08:36 442K
Boosting.for.Document.Routing.pdf 01-Nov-2005 13:47 257K
Bot.Software.Spreads.Causes.New.Worries.pdf 26-Oct-2005 08:51 178K
Bursty.and.Hierarchical.Structures.in.Streams.pdf 01-Nov-2005 13:41 1.2M
CRM114_Revealed_20050929.pdf 03-Nov-2005 05:49 1.7M
Characterizing.A.Spam.Traffic.pdf 01-Nov-2005 13:45 960K
Combining.Email.Models.for.False.Positive.Reduction.pdf 01-Nov-2005 13:08 474K
Context.Sensitive.Learning.Methods.for.Text.Categorization.pdf 01-Nov-2005 14:11 251K
Cotraining.with.a.Single.Natural.Feature.Set.Applied.to.Email.Classification.pdf 01-Nov-2005 14:36 96K
Data.Mining.Methods.for.Detection.of.New.Malicious.Executables.pdf 26-Oct-2005 09:37 1.1M
Differentiating.Data.and.Text.Mining.Terminology.pdf 01-Nov-2005 14:07 118K
Document.Comparison.with.a.Weighted.Topic.Hierarchy.pdf 26-Oct-2005 09:28 89K
Email.Classification.with.Co.Training.pdf 01-Nov-2005 13:44 223K
Email.Data.Cleaning.pdf 01-Nov-2005 13:10 599K
Extending.the.Coverage.of.a.CCG.System.pdf 01-Nov-2005 14:50 235K
Hierarchical.Data.Classification.with.Support.Vector.Machines.pdf 01-Nov-2005 13:17 243K
Identification.of.Deliberately.Doctored.Text.Documents.Using.Frequent.Keyword.Chain.FKC.Model.pdf 01-Nov-2005 14:29 607K
Identifying.Junk.Electronic.Mail.in.Microsoft.Outlook.With.a.Support.Vector.Machine.pdf 26-Oct-2005 08:58 426K
In.Vivo.Spam.Filtering.a.challenge.problem.for.KDD.pdf 01-Nov-2005 12:56 255K
Knowledge.Discovery.from.Data.pdf 26-Oct-2005 08:50 228K
Learning.to.Detect.Malicious.Executables.in.the.Wild.pdf 01-Nov-2005 13:41 211K
Leveraging.Social.Networks.to.Fight.Spam.pdf 26-Oct-2005 08:24 379K
Machine.Learning.Methods.for.Spam.Email.Categorization.pdf 26-Oct-2005 08:17 98K
Malicious.Bots.Threaten.Network.Security.pdf 26-Oct-2005 08:56 150K
Mining.Email.Content.for.Author.Identification.Forensics.pdf 01-Nov-2005 13:58 932K
Needles.and.Haystacks.A.Search.Engine.for.Personal.Information.Collections.pdf 26-Oct-2005 09:20 100K
On.Combining.Classifier.Mass.Functions.for.Text.Categorization.pdf 01-Nov-2005 14:23 759K
On.the.Algorithmic.Implementation.of.Multiclass.Kernel.based.Vector.machines.pdf 01-Nov-2005 13:20 271K
Ontology.Based.Semantic.Similarity.Comparison.of.Documents.pdf 26-Oct-2005 09:27 311K
Parameter.Free.Bursty.Events.Detection.in.Text.Streams.pdf 01-Nov-2005 14:00 1.0M
Phonetic.String.Matching.Lessons.from.Information.Retrieval.pdf 01-Nov-2005 14:12 765K
Separating.the.Swarm.Categorization.Methods.for.User.Sessions.on.the.web.pdf 01-Nov-2005 13:15 452K
Social.Networks.Applied.pdf 26-Oct-2005 09:38 524K
Some.Empirical.Results.on.Two.Spam.Detection.Methods.pdf 01-Nov-2005 14:33 430K
Spam.Concept.pdf 29-Oct-2005 06:50 183K
Spam.Concept.vsd 29-Oct-2005 06:49 1.7M
Spam.Deobfuscation.with.a.Hidden.Markov.Model.pdf 03-Nov-2005 05:42 525K
Spam.Filtering.Using.Spam.Mail.Communities.pdf 26-Oct-2005 08:39 99K
Spam.Filtering.using.a.Markov.Random.Field.Model.with.Variable.Weighting.Schemas.pdf 26-Oct-2005 08:41 143K
Spam.Spam.Spam.the.FTC.and.Spam.pdf 01-Nov-2005 13:05 1.2M
Spam.and.the.Social.Technical.Gap.pdf 26-Oct-2005 08:38 356K
Spam Analysis.mmap 03-Nov-2005 12:23 25K
Style.Mining.of.Electronic.Messages.for.Multiple.Authorship.Discrimination.pdf 01-Nov-2005 13:42 152K
Supervised.Clustering.Algorithms.and.Benefits.pdf 26-Oct-2005 08:46 85K
Support.Vector.Machines.Classification.with.a.Very.Large.Scale.Taxonomy.pdf 01-Nov-2005 14:03 1.2M
Support.Vector.Machines.for.Spam.Categorization.pdf 01-Nov-2005 14:30 127K
The.Making.of.a.Spam.Zombie.Army.pdf 26-Oct-2005 08:44 188K
Unsupervised.Document.Classification.using.Sequential.Information.Maximization.pdf 01-Nov-2005 14:09 231K
Using.Statistical.Analysis.and.Support.Vector.Machines.to.Detect.Complicated.Attacks.pdf 01-Nov-2005 14:20 549K
Using.a.Probable.Weight.Based.Bayesian.Approach.for.Spam.Filtering.pdf 01-Nov-2005 14:34 738K
Williarm Yerazunis.doc 03-Nov-2005 07:01 20K
look.into.dcc.txt 28-Oct-2005 04:30 862

Click Here For Web Link

index of parent directory
Webservio_Mail_Archiving_Solutions.pdf 20-Oct-2005 09:58 232K
Whitepaper- Mail bagging & Anti Spam solutions.pdf 10-Jan-2006 14:36 181K

Click Here For Web Link

index of parent directory
PDF-draft-ietf-ASVP-Anti-spam-Verification-Protocol-00.txt.pdf 04-Jul-2007 22:05 50k
TXT-draft-ietf-ASVP-Anti-spam-Verification-Protocol-00.txt 04-Jul-2007 22:09 46k
WORD-draft-ietf-ASVP-Anti-spam-Verification-Protocol-00.txt.doc 04-Jul-2007 22:04 148k
X_ASVP_Executive_Summary_20070725.ppt 26-Jul-2007 14:30 812k
X_ASVP_Technical_Overview_20070722.ppt 23-Jul-2007 15:32 814k
diagrams/ 05-Jul-2007 22:35 -
link-to-example-meta-document.htm 20-Jul-2007 13:20 1k
meta-document-entities.txt 15-Jul-2007 18:45 5k

Click Here For Web Link

index of parent directory
Newsletter/ 2006-Aug-04 14:54:05 - Directory
003_new_features_kav_60_fs_eng.pdf 2007-Jun-14 11:44:25 120.1K application/pdf
007_leaflet_kav-win-fs_60_eng.pdf 2007-Jun-14 11:33:03 149.7K application/pdf
KL products for Windows 02 06 eng.pdf 2006-Mar-16 18:24:18 1.3M application/pdf
KL products for Windows 12 05 ru.pdf 2005-Dec-28 12:37:18 1.9M application/pdf
Kaspersky Administration Kit 5.0 white paper eng.pdf 2005-Sep-26 23:25:35 103.8K application/pdf
Kaspersky Administration Kit 5.0 white paper ru.pdf 2005-Jul-19 12:02:49 137.7K application/pdf
Kaspersky Administration Kit 6.0 Leaflet_eng.pdf 2007-Jun-13 13:15:13 225.8K application/pdf
Kaspersky Administration Kit 6.0 Leaflet_ru.pdf 2007-Jun-13 13:21:44 192.6K application/pdf
Kaspersky Administration Kit datasheet eng.pdf 2006-Jan-22 23:07:42 226.0K application/pdf
Kaspersky Administration Kit datasheet ru.pdf 2006-Jan-22 23:02:04 222.2K application/pdf
Kaspersky Anti-Hacker 1.5 white paper eng.pdf 2005-Jun-27 16:59:05 189.2K application/pdf
Kaspersky Anti-Hacker 1.5 white paper ru.pdf 2005-Jun-27 17:19:44 234.3K application/pdf
Kaspersky Anti-Hacker datasheet eng.pdf 2005-Jun-27 16:58:39 1.0M application/pdf
Kaspersky Anti-Hacker datasheet ru.pdf 2005-Sep-26 23:48:25 584.3K application/pdf
Kaspersky Anti-Spam 2.0 datasheet eng.pdf 2005-Sep-20 18:05:23 118.3K application/pdf
Kaspersky Anti-Spam 2.0 datasheet ru.pdf 2005-Sep-20 17:59:37 128.2K application/pdf
Kaspersky Anti-Spam 3.0 datasheet eng.pdf 2006-Sep-05 17:12:44 287.0K application/pdf
Kaspersky Anti-Spam 3.0 datasheet ru.pdf 2006-Sep-12 15:42:11 277.0K application/pdf
Kaspersky Anti-Spam 3.0 whitepaper ru.pdf 2006-Dec-11 14:14:43 262.2K application/pdf
Kaspersky Anti-Spam ISP Edition 2.0 white paper eng.pdf 2005-Sep-20 18:06:02 213.4K application/pdf
Kaspersky Anti-Spam ISP edition 2.0 datasheet eng p1.pdf 2005-Sep-20 18:07:13 946.3K application/pdf
Kaspersky Anti-Spam ISP edition 2.0 datasheet eng p2.pdf 2005-Sep-20 18:07:07 1.0M application/pdf
Kaspersky Anti-Spam ISP edition 2.0 leaflet eng.pdf 2005-Sep-20 18:06:23 180.7K application/pdf
Kaspersky Anti-Spam Personal 1.0 white paper eng.pdf 2005-Jun-28 14:20:54 129.0K application/pdf
Kaspersky Anti-Spam Personal datasheet eng.pdf 2005-Jun-28 14:22:38 476.9K application/pdf
Kaspersky Anti-Spam Personal datasheet ru.pdf 2005-Jun-28 14:22:57 1.9M application/pdf
Kaspersky Anti-Virus 4.5 for CheckPoint Firewall-1 datasheet eng.pdf 2006-Feb-24 16:15:21 584.5K application/pdf
Kaspersky Anti-Virus 4.5 for CheckPoint Firewall-1 datasheet ru.pdf 2006-Feb-24 16:17:54 602.4K application/pdf
Kaspersky Anti-Virus 5.0 for Samba Server datasheet eng.pdf 2006-Apr-21 15:09:35 585.7K application/pdf
Kaspersky Anti-Virus 5.0 for Samba Server white paper ru.pdf 2006-Apr-21 14:50:15 259.2K application/pdf
Kaspersky Anti-Virus 5.0 for Windows File Server white paper ru.pdf 2005-Nov-14 19:08:49 213.0K application/pdf
Kaspersky Anti-Virus 5.0 for Windows Workstations white paper eng.pdf 2005-Apr-28 15:16:41 181.6K application/pdf
Kaspersky Anti-Virus 5.0 for Windows Workstations white paper ru.pdf 2005-Jul-20 15:04:16 222.1K application/pdf
Kaspersky Anti-Virus 5.5 for IBM Lotus Domino datasheet eng.pdf 2006-Jun-27 14:23:44 174.0K application/pdf
Kaspersky Anti-Virus 5.5 for IBM Lotus Domino datasheet ru.pdf 2006-Jun-27 14:22:23 77.8K application/pdf
Kaspersky Anti-Virus 5.5 for MS ISA Server 2004 Enterprise Edition datasheet eng.pdf 2005-Dec-28 12:58:45 120.5K application/pdf
Kaspersky Anti-Virus 5.5 for MS ISA Server 2004 Enterprise Edition datasheet ru.pdf 2005-Dec-28 12:32:57 147.1K application/pdf
Kaspersky Anti-Virus 5.5 for MS ISA Server 2004 Standard Edition datasheet eng.pdf 2006-May-19 18:07:45 111.3K application/pdf
Kaspersky Anti-Virus 5.5 for MS ISA Server 2004 Standard Edition datasheet ru.pdf 2006-May-19 18:03:22 111.0K application/pdf
Kaspersky Anti-Virus 5.6 for MS ISA Server 2000 Enterprise Edition datasheet eng.pdf 2005-Oct-05 18:11:19 151.6K application/pdf
Kaspersky Anti-Virus 5.6 for MS ISA Server 2000 Enterprise Edition datasheet ru.pdf 2005-Oct-05 18:15:56 262.4K application/pdf
Kaspersky Anti-Virus 5.6 for Novell NetWare white paper eng.pdf 2005-Aug-15 21:45:45 110.8K application/pdf
Kaspersky Anti-Virus 5.6 for Novell NetWare white paper ru.pdf 2005-Aug-15 21:44:09 172.9K application/pdf
Kaspersky Anti-Virus 5.6 for Sendmail with Milter API datasheet eng.pdf 2006-Feb-22 13:26:48 68.8K application/pdf
Kaspersky Anti-Virus 5.6 for Sendmail with Milter API datasheet ru.pdf 2006-Feb-22 13:41:03 78.1K application/pdf
Kaspersky Anti-Virus 6.0 Comparison.pdf 2006-Sep-27 14:20:39 42.6K application/pdf
Kaspersky Anti-Virus 6.0 datasheet eng.pdf 2006-Sep-12 17:01:40 1.7M application/pdf
Kaspersky Anti-Virus 6.0 datasheet ru.pdf 2006-Sep-13 16:40:40 2.3M application/pdf
Kaspersky Anti-Virus Personal 5.0 datasheet eng.pdf 2005-Sep-26 22:57:19 337.6K application/pdf
Kaspersky Anti-Virus Personal 5.0 datasheet ru.pdf 2005-Jun-28 17:57:20 293.2K application/pdf
Kaspersky Anti-Virus Personal 5.0 white paper eng.pdf 2005-Jun-28 17:55:42 143.6K application/pdf
Kaspersky Anti-Virus Personal 5.0 white paper ru.pdf 2005-Jun-28 17:56:32 290.6K application/pdf
Kaspersky Anti-Virus Personal Pro 5.0 datasheet eng.pdf 2005-Jun-28 12:53:41 549.1K application/pdf
Kaspersky Anti-Virus Personal Pro 5.0 datasheet ru.pdf 2005-Jun-28 12:41:40 975.7K application/pdf
Kaspersky Anti-Virus Personal Pro 5.0 white paper eng.pdf 2005-Jun-27 15:36:26 222.1K application/pdf
Kaspersky Anti-Virus Personal Pro 5.0 white paper ru.pdf 2005-Jun-28 12:46:29 217.2K application/pdf
Kaspersky Anti-Virus for Linux FreeBSD OpenBSD Mailservers datasheet eng.pdf 2005-Sep-26 23:18:35 706.1K application/pdf
Kaspersky Anti-Virus for Linux FreeBSD OpenBSD Mailservers datasheet ru.pdf 2005-Aug-09 00:42:30 577.8K application/pdf
Kaspersky Anti-Virus for Linux Workstations & Linux FreeBSD OpenBSD Fileservers datasheet eng.pdf 2005-Sep-26 23:12:28 841.4K application/pdf
Kaspersky Anti-Virus for Linux Workstations & Linux FreeBSD OpenBSD Fileservers datasheet ru.pdf 2005-Aug-05 13:58:26 902.9K application/pdf
Kaspersky Anti-Virus for Microsoft Exchange Server datasheet eng.pdf 2005-Sep-26 23:17:01 628.3K application/pdf
Kaspersky Anti-Virus for Microsoft Exchange Server datasheet ru.pdf 2005-Aug-04 14:46:31 708.0K application/pdf
Kaspersky Anti-Virus for Novell NetWare datasheet eng.pdf 2005-Sep-26 23:23:07 127.1K application/pdf
Kaspersky Anti-Virus for Novell NetWare datasheet ru.pdf 2005-Aug-15 21:44:01 123.3K application/pdf
Kaspersky Anti-Virus for Windows File Server datasheet eng.pdf 2006-Jul-06 17:55:27 145.3K application/pdf
Kaspersky Anti-Virus for Windows File Server datasheet ru.pdf 2006-Jul-06 17:52:52 266.2K application/pdf
Kaspersky Anti-Virus for Windows Workstations datasheet eng.pdf 2007-May-11 17:48:51 272.8K application/pdf
Kaspersky Anti-Virus for Windows Workstations datasheet ru.pdf 2007-May-11 17:50:46 315.6K application/pdf
Kaspersky Internet Security 6.0 Comparison.pdf 2006-Sep-27 14:18:40 45.9K application/pdf
Kaspersky Internet Security 6.0 datasheet eng.pdf 2006-Sep-12 17:04:59 1.7M application/pdf
Kaspersky Internet Security 6.0 datasheet ru.pdf 2006-Sep-28 12:15:34 2.3M application/pdf
Kaspersky Lab Products for Linux Unix 02 2006 eng.pdf 2006-Mar-16 18:26:06 927.0K application/pdf
Kaspersky Lab Products for Linux Unix 08 2005 eng.pdf 2006-Feb-22 13:55:20 977.4K application/pdf
Kaspersky Lab Products for Linux Unix 08 2005 ru.pdf 2006-Feb-22 13:51:58 1.1M application/pdf
Kaspersky Lab Products for Linux Unix 08 2006 eng.pdf 2006-Sep-08 16:14:15 626.2K application/pdf
Kaspersky Lab Products for Linux Unix 08 2006 ru.pdf 2006-Sep-06 18:56:50 845.8K application/pdf
Kaspersky Lab Technologies SOHO and Home 2006 eng.pdf 2006-Nov-19 00:55:35 205.7K application/pdf
Kaspersky Mail Gateway 5.5 datasheet eng.pdf 2006-Jul-21 18:01:33 151.3K application/pdf
Kaspersky Mail Gateway 5.5 datasheet ru.pdf 2006-Jul-21 17:51:52 179.1K application/pdf
Kaspersky Personal Security Suite datasheet eng.pdf 2005-Sep-26 22:56:28 140.2K application/pdf
Kaspersky Personal Security Suite datasheet ru.pdf 2005-Sep-26 23:32:37 187.1K application/pdf
Kaspersky Products and Services for ISP eng.pdf 2005-Sep-20 18:01:40 107.1K application/pdf
Kaspersky SMTP-Gateway 5.5 for LinuxUNIX datasheet eng.pdf 2005-Sep-26 23:25:05 145.7K application/pdf
Kaspersky SMTP-Gateway 5.5 for LinuxUNIX datasheet ru.pdf 2005-Aug-16 12:26:59 158.3K application/pdf
Kaspersky SMTP-Gateway 5.5 for LinuxUNIX white paper eng.pdf 2005-Sep-26 23:23:25 142.5K application/pdf
Kaspersky SMTP-Gateway 5.5 for LinuxUNIX white paper ru.pdf 2005-Aug-16 12:27:08 178.7K application/pdf
Kaspersky Security 5.5 for Microsoft Exchange Server 2003 datasheet eng.pdf 2005-Dec-16 16:26:29 212.2K application/pdf
Kaspersky Security 5.5 for Microsoft Exchange Server 2003 datasheet ru.pdf 2005-Dec-16 13:43:12 231.1K application/pdf
New Features - Kaspersky Anti-Virus 6.0 for Windows Workstations eng.pdf 2007-May-11 17:48:46 206.3K application/pdf
New Features - Kaspersky Anti-Virus 6.0 for Windows Workstations rus.pdf 2007-May-11 17:50:54 367.1K application/pdf
New Products from Kaspersky Lab 2005.pdf 2005-Aug-16 12:28:24 98.4K application/pdf
PC Professionell AV Comparison April 2005 eng.pdf 2005-Aug-04 14:22:54 1.6M application/pdf
PC Professionell AV Comparison April 2005 ger.pdf 2005-Aug-04 14:24:42 1.5M application/pdf
Testing in IBM Innovation Center report eng.pdf 2006-Jul-06 18:07:09 25.7K application/pdf
What's new in KAV 5.0 for Windows eng.pdf 2005-Jul-20 14:13:05 581.1K application/pdf
What's new in KAV 5.0 for Windows.pdf 2005-Jul-20 14:13:05 581.1K application/pdf
What's new in KAdminKit 6.0_eng.pdf 2007-Jun-13 13:26:02 102.4K application/pdf
What's new in KAdminKit 6.0_rus.pdf 2007-Jun-13 13:23:20 214.9K application/pdf
corp_clients_rus.pdf 2007-Jun-13 13:40:27 1.2M application/pdf
kav_for_mimesweeper.pdf 2007-Jul-10 13:31:51 178.8K application/pdf
leaflet_kav-mobile_rus_print.pdf 2007-Jun-14 16:23:02 2.3M application/pdf
leaflet_kav-novell-netware_57_eng.pdf 2007-Jul-09 12:48:03 63.3K application/pdf
leaflet_kav-proxy_55_eng.pdf 2007-Jul-10 12:27:19 188.6K application/pdf
leaflet_kav-proxy_55_rus.pdf 2007-Jul-10 12:27:46 161.9K application/pdf
leaflet_kav-win-fs_60_mp2_rus_site.pdf 2007-Jun-14 11:37:45 159.0K application/pdf
leaflet_kav_for_isa_2006-2006_ee_rus.pdf 2007-Jun-14 15:42:04 208.6K application/pdf
leaflet_kav_for_mimesweeper_en.pdf 2007-Jul-10 13:31:14 198.1K application/pdf
leaflet_kav_mobile_en.pdf 2007-Jun-14 13:16:04 1.7M application/pdf
leaflet_kav_novell_57_rus.pdf 2007-Jul-09 12:50:23 178.1K application/pdf
new_features_kav_60_fs_mp2_rus.pdf 2007-Jun-14 11:41:05 239.6K application/pdf
sales_reference_isa_2004-2006_ee_56_eng.pdf 2007-Jun-14 15:40:31 232.8K application/pdf

Click Here For Web Link

0 Comments:

Post a Comment

<< Home