Otsingu tulemused

Allikas: KakuWiki
Mine navigeerimisribaleMine otsikasti

Vasted lehekülje pealkirjades

Vasted lehekülje tekstides

  • # [[Social software, social engineering]] (not so much security but social aspects of manipulation)
    3 KB (381 sõna) - 8. aprill 2008, kell 07:19
  • == Security in operating systems == Tanenbaum defines the overall goals of OS security as
    13 KB (2069 sõna) - 3. märts 2014, kell 08:51
  • ...ecurity to the channel would likely have had adverse effect - the sense of security would probably have resulted in an even more open talk that the real "leak" ...thing as privacy...). The result is constant struggle between freedom and security instead of them cooperating to find a point of balance.
    7 KB (1120 sõna) - 2. veebruar 2014, kell 21:25
  • ...n the nerves of the social engineer usually works (are they contacting the security? Or police?) * security questions - including fake ones (e.g. "I can only tell the number to people
    10 KB (1747 sõna) - 7. aprill 2014, kell 08:36
  • ...ul enough to carry a wide variety of services (Internet, TV, radio, phone, security, health care for elderly people etc). * Information security infrastructure: safety and reliability for everyone. Includes clear hierarc
    9 KB (1308 sõna) - 7. märts 2007, kell 19:22
  • ...g Internet Explorer, Outlook etc, even if they know that they have lots of security problems? Because they are familiar with these programs, have paid for them ..."a hacker system", something that is incomprehensible for "normal people". Security is seldom debated - Linux has strong reputation in it. Affordability cannot
    20 KB (3504 sõna) - 8. aprill 2008, kell 07:13
  • # [[Nobody's child - the problem with ordinary computer users]] (security of ordinary users or lack thereof)
    3 KB (445 sõna) - 16. juuni 2015, kell 11:32
  • [[Category:Security]]
    2 KB (278 sõna) - 2. veebruar 2014, kell 21:11
  • ...t Morris, a student at Cornell University. The worm made use of some known security holes as well as exploited weak passwords. ...ctually openly presented at the DEFCON security event, to show the lack of security in Windows 98 (as early Windowses really did not have any). However, it soo
    22 KB (3590 sõna) - 8. aprill 2008, kell 07:13
  • Yet, his privacy and security was addressed by nobody. The outcome can be seen from e.g. here: http://w ...t one or two, later the full classroom sets. Training users (especially in security and privacy issues) was neglected.
    13 KB (2211 sõna) - 31. jaanuar 2014, kell 08:27
  • ;;[[Security and Privacy in a Networked World]]
    3 KB (416 sõna) - 16. juuni 2015, kell 11:20
  • Yet, his privacy and security was addressed by nobody. The outcome can be seen from e.g. here: http://w ...t one or two, later the full classroom sets. Training users (especially in security and privacy issues) was neglected.
    13 KB (2190 sõna) - 18. august 2015, kell 13:30
  • ...became widespread only two decades later). It used a combination of known security holes and exploitation of weak passwords to propagate. The author was a Cor ...ended privilege escalation cases (this was one of the many "flexibility vs security" dilemmas that Microsoft got wrong).
    20 KB (3211 sõna) - 19. aprill 2014, kell 17:23
  • ...murai', 'freelancers' or 'grey hats'). Hackers proper have participated in security projects, but various 'twilight zone' activities have mostly been performed
    9 KB (1382 sõna) - 8. aprill 2008, kell 07:18
  • * "The biggest security risk is always located between the keyboard and the chair“ - an IT maxim In fact, security is known to make some twists in history. Paradoxically, Estonians must than
    17 KB (2779 sõna) - 14. märts 2020, kell 07:28
  • ...hijacking the users' computers by using various known vulnerabilities and security holes which tend to exist in all operating systems (even though the top pic ...ries of the same machine - however, in some cases, misconfiguration and/or security hole allow a script to influence another website. An example: [http://www.f
    20 KB (3223 sõna) - 8. aprill 2008, kell 07:12
  • Yet, none of them were concerned of his security. He was able to buy all the technology without learning how to use it. ...the emergence of IBM PCs and the omnipresent, easy-to-use (at the cost of security) Microsoft software in the 80s, and even more so with the emergence of the
    15 KB (2446 sõna) - 26. mai 2012, kell 11:26
  • * surveillance - security in such a network depends on constant surveying of the activities. Perhaps the greatest threat to privacy and security is comfort. Locking a door, setting a car alarm, entering a computer passw
    9 KB (1473 sõna) - 31. jaanuar 2014, kell 08:38
  • ...hijacking the users' computers by using various known vulnerabilities and security holes which tend to exist in all operating systems (even though the top pic ...ries of the same machine - however, in some cases, misconfiguration and/or security hole allow a script to influence another website. An example: in July 2006,
    20 KB (3236 sõna) - 23. mai 2012, kell 13:38
  • ...former employee of Canadian CSE ([http://www.cse-cst.gc.ca/ Communication Security Establishment]) Mike Frost wrote a book titled ''Spyworld'' in 1994 which a While the treaty had five sides, the United States' National Security Agency played the main role from early on. When the United States went to w
    35 KB (5413 sõna) - 21. veebruar 2007, kell 20:03
Näita ( | ) (20 | 50 | 100 | 250 | 500)