Talk:Man-in-the-middle attack: Difference between revisions
imported>Howard C. Berkowitz (Starting comments) |
imported>Howard C. Berkowitz |
||
Line 8: | Line 8: | ||
[[User:Howard C. Berkowitz|Howard C. Berkowitz]] 10:59, 15 October 2008 (UTC) | [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 10:59, 15 October 2008 (UTC) | ||
==Looks pretty good== | |||
If we follow the principle of putting specific techniques/case study detail in subarticles, this is about ready other than flow and copy edit. [[User:Howard C. Berkowitz|Howard C. Berkowitz]] 08:22, 14 June 2010 (UTC) |
Revision as of 02:22, 14 June 2010
Some things needed
Definitely, some sourcing, and some specific examples, are needed. As the creator, you get to assign the language variant. A definition will be needed.
While it is possible to go to approval without all links being blue, it helps to minimize them. Definitely, the crypto-specific terms used in the definition, such as active attack, need definitions. You may want to have some graphics explaining the sequence; while the article itself is very much in draft, look at Domain Name System security for examples of showing how threats build up, or a simpler step-by-step in anycast -- they are in a PowerPoint file if you'd like it as a template.
Especially when devices such as ATM switches or routers are in the path, and themselves may not run any of the crypto, you need to show how the flow goes to a proxying man-in-the-middle box.
Howard C. Berkowitz 10:59, 15 October 2008 (UTC)
Looks pretty good
If we follow the principle of putting specific techniques/case study detail in subarticles, this is about ready other than flow and copy edit. Howard C. Berkowitz 08:22, 14 June 2010 (UTC)
- Article with Definition
- Developing Articles
- Nonstub Articles
- Internal Articles
- Mathematics Developing Articles
- Mathematics Nonstub Articles
- Mathematics Internal Articles
- Computers Developing Articles
- Computers Nonstub Articles
- Computers Internal Articles
- Military Developing Articles
- Military Nonstub Articles
- Military Internal Articles
- Mathematics Underlinked Articles
- Underlinked Articles
- Computers Underlinked Articles
- Military Underlinked Articles
- Military tag
- Security tag