Rivest, "The MD5 Message-Digest Algorithm", http://andrew2.andrew.cmu.edu/rfc/rfc1321.html, 25 pages, Apr. 1992. |
Freier et al., "The SSL Protocol Version 3.0," http://home.netscape.com/eng/ss13/ss;-toc.html, 3 pages, Mar. 1996. |
"Netscape Data Security", http://cgi.netscape.com/newsref/ref/netscape-security.html, 4 pages, 1997. |
"Persistent Client State HTTP Cookies", http://cgi.netscape.com/newsref/std/cookie.sub.- spec.html, 5 pages, 1997. |
"Basic HTTP as defined in 1992", http://www.w3.org/pub/WWW/Protocols/HTTP/HTTP2.html, 31 pages, 1992. |
Berners-Lee, "Hypertext Transfer Protocol--HTTP/1.0", http://ds.internic.net/rfc/rfc1945.txt, 53 pages, May 1996. |
Fielding, "Hypertext Transfer Protocol--HTTP/1.1", http://www.w3.org/pub/WWW/Protocols/rfc2068/rfc2068, 143 pages, Jan. 1997. |
Netscape's DDE Implementation, http://www.netscape.com/newsref/std/ddeapi.html, Mar. 1995, 14 pages. |
Mitch Wagner, Tracking service helps companies get a handle on Internet problems, Oct. 7, 1996, Computerworld, vol. 30, No. 41, pp.69,77. |
Eamonn Sullivan, Too Many Cooks Spoil Web Server, Jul. 29, 1996, PCWeek, vol. 13 Issue 30, p. N3. |
Stephen Cobb, Secure Your Online Data Projects, April 1997, Databased Web Advisor, pp. 70-75. |
WebEye's Watching, Feb. 3, 1997 Communications Week, p. 57. |
Internet Resources Group, Sep. 11, 1995, M2 PressWire. |
Jeff Moad, Overheated Web, Sep. 16, 1996, PC Week, vol. 13, No. 37, p. 49. |
How to tell if users can access your Web pages, Oct. 1995, Electronic Documents, vol. 4, No. 10 pp.22-23. |