Search results

Jump to navigation Jump to search

Page title matches

  • The disk is still fully accessible, if you care about strong security you should ''assume'' it's still readable, which are good at live security for CPU-cheap. ...
    30 KB (5,181 words) - 00:20, 22 April 2024
  • If anything, it loosens security. ...>Origin</tt> {{comment|(you can't even touch it via scripting, for obvious security reasons)}} ...
    31 KB (4,961 words) - 00:20, 22 April 2024
  • * '''Trusted Computing''' - refers to hardware-assisted security present in newer computers Sometimes sort of imitates security agency / military style, and can be modeled off it if you want. ...
    31 KB (5,091 words) - 16:54, 20 April 2024
  • In security context, a nonce is something that is exchanged and used once (...as part o ==GSSAPI notes== ...
    9 KB (1,439 words) - 23:17, 20 April 2024
  • ===Security truisms=== * security is only as good as its weakest link. ...
    10 KB (1,555 words) - 00:20, 22 April 2024
  • 157 bytes (20 words) - 00:20, 22 April 2024
  • so is preferred for the security-sensitive operations (that often makes up a small subset of all things bein * AMD Platform Security Processor (PSP), officially known as AMD Secure Technology=== ...
    24 KB (4,119 words) - 11:31, 24 April 2024
  • 101 bytes (9 words) - 00:20, 22 April 2024
  • ...henticate" which is vague about what it is, and how good it is in terms of security. but they can have very different security implications, ...
    4 KB (630 words) - 00:20, 22 April 2024
  • Security nerds can get very technical about Yes, in the sense that it is the most fragile part of your personal security. ...
    6 KB (1,055 words) - 00:20, 22 April 2024
  • =Basic notes on some common attacks/exploits= Security implications vary along. ...
    25 KB (4,259 words) - 13:16, 16 January 2024
  • When you read [[Security_notes_/_Hashing_notes|notes on hash functions]], you might find notes that the hash function is hard to reverse - it's hard to guess the message ...
    16 KB (2,661 words) - 00:28, 21 April 2024
  • ...ey are different purposes, and have practicalities different enough in the security and privacy implications, and how to use them well for those purposes. For a practical view, see [[Security notes - security for the everyday person]] ...
    15 KB (2,498 words) - 00:27, 21 April 2024
  • 2 KB (376 words) - 00:20, 22 April 2024
  • ...at on the internet we often... sort of ignore at our own peril. See [[LARP security]]), ...
    4 KB (563 words) - 14:02, 8 May 2024
  • ...many distinct uses for hashing, many of which not particularly related to security, This is obviously a ''bad'' idea to longer-term security, because if someone gets (local or remote) access to the computer that stor ...
    50 KB (7,780 words) - 23:15, 21 April 2024
  • #REDIRECT [[Security notes / some flaw/exploit notes]] ...
    54 bytes (7 words) - 15:31, 11 January 2024
  • * some processes have their own logic that change security. ...icted user and some processes may be run in a chroot jail but all of these security methods are discretionary. ...
    10 KB (1,736 words) - 15:05, 4 February 2024

Page text matches

  • #redirect [[Security notes / some flaw/exploit notes#CSRF:_Cross_Site_Request_Forgery]] ...
    87 bytes (12 words) - 16:54, 20 January 2024
  • #redirect [[Security notes / Hashing notes#Checksum_files]] ...
    59 bytes (7 words) - 12:46, 13 May 2022
  • #redirect [[Security notes / Message signing notes]] ...
    52 bytes (6 words) - 14:26, 1 March 2022
  • #redirect [[Security notes / Message signing notes]] ...
    52 bytes (6 words) - 14:27, 1 March 2022
  • #REDIRECT [[Security notes / some flaw/exploit notes]] ...
    54 bytes (7 words) - 15:31, 11 January 2024
  • #redirect [[Security notes / Hashing notes#Some_notes_on_CRC]] ...
    62 bytes (9 words) - 18:13, 1 December 2021
  • #redirect [[Security notes / Message signing notes]] ...
    52 bytes (6 words) - 14:26, 1 March 2022
  • #redirect [[Security notes / Hashing notes]] ...
    44 bytes (5 words) - 18:13, 1 December 2021
  • #redirect [[Security notes / Hashing notes]] ...
    44 bytes (5 words) - 18:13, 1 December 2021
  • #REDIRECT [[Security notes / Hashing notes]] ...
    44 bytes (5 words) - 20:05, 29 November 2021
  • #redirect [[Security notes / Hashing notes]] ...
    44 bytes (5 words) - 18:12, 1 December 2021
  • #redirect [[Security notes / Glossary#Least_privilege_.28principle.29]] ...
    71 bytes (7 words) - 15:00, 30 September 2021
  • #redirect [[Security notes / Glossary#Mandatory_Access_Control_.28model.29]] ...
    76 bytes (8 words) - 15:25, 28 December 2020
  • #REDIRECT [[Security notes / Identification, authentication, authorization]] ...
    76 bytes (6 words) - 09:51, 3 May 2017
  • #redirect [[Security notes - encryption-supporting functionality]] ...
    66 bytes (6 words) - 12:20, 8 April 2024
  • #redirect [[Security notes / Glossary#Role-Based_Access_Control]] ...
    65 bytes (7 words) - 18:17, 8 February 2022
  • #redirect [[Security notes / Multi-Factor Authentication]] ...
    58 bytes (5 words) - 18:05, 27 February 2024
  • #redirect [[Security notes / Identification, authentication, authorization#Yubikey]] ...
    84 bytes (7 words) - 17:21, 17 February 2024
  • #redirect [[Security notes / Identification, authentication, authorization#Yubikey]] ...
    84 bytes (7 words) - 17:21, 17 February 2024
  • #redirect [[Linux admin notes - security enhanced linux]] ...
    57 bytes (8 words) - 16:50, 1 May 2012
  • Around security: ...atory Access Control''' is a model of how to enforce rules, see [[Security notes / Glossary#Mandatory_Access_Control_.28model.29]] ...
    531 bytes (73 words) - 14:10, 1 March 2022
  • Notes: ===Security=== ...
    3 KB (396 words) - 01:06, 24 April 2024
  • ===security notes=== ...but keep in mind that if the security flag mentioned above applies, it means access() calls for ''everything''. ...
    3 KB (533 words) - 23:42, 12 May 2022
  • : this only really matters when security or gambling are involved Notes: ...
    2 KB (325 words) - 17:13, 18 September 2017
  • In security context, a nonce is something that is exchanged and used once (...as part o ==GSSAPI notes== ...
    9 KB (1,439 words) - 23:17, 20 April 2024
  • {{notes}} * chroot is '''not a security tool''' against those with ill will ...
    5 KB (863 words) - 16:22, 20 April 2024
  • =====Data model notes===== =====Config notes===== ...
    14 KB (2,111 words) - 16:43, 2 January 2024
  • ...second-or-two of pause, and the animated checkmark seem to primarily be [[security theater]], Notes: ...
    3 KB (420 words) - 13:52, 29 April 2024
  • Security IDentifiers (SIDs) identify users, groups, accounts, and also domains thems Other notes conflict, noting that Domain SIDs are S-1-5-5-X-Y, where X is the 'domain R ...
    11 KB (1,805 words) - 12:08, 24 April 2024
  • ** adds security to v2 (and little else?) ==Lower level notes== ...
    4 KB (568 words) - 12:53, 16 July 2020
  • Notes: * pam_access - logdaemon style login access control, via <tt>/etc/security/access.conf</tt> ...
    13 KB (2,159 words) - 16:37, 20 April 2024
  • ...ey are different purposes, and have practicalities different enough in the security and privacy implications, and how to use them well for those purposes. For a practical view, see [[Security notes - security for the everyday person]] ...
    15 KB (2,498 words) - 00:27, 21 April 2024
  • =Other notes on background processes= * lsass.exe (local security, login. Perhaps see [[lsass.exe taking all cpu]]) ...
    9 KB (1,370 words) - 00:18, 22 April 2024
  • {{notes}} ::: have that SSH and tunnel connection live longer (see notes below) ...
    25 KB (4,146 words) - 16:37, 20 April 2024
  • * some processes have their own logic that change security. ...icted user and some processes may be run in a chroot jail but all of these security methods are discretionary. ...
    10 KB (1,736 words) - 15:05, 4 February 2024
  • If you really want to tie down security, there are many things to think about ...he easiest solution, because it requires minimal additional setup, and the security implications are fairly easily understood. ...
    14 KB (2,235 words) - 00:19, 22 April 2024
  • {{notes}} ===Extracting things from security logs=== ...
    10 KB (1,588 words) - 01:10, 24 April 2024
  • ...a. python-ldap) package is one of a few that allow interaction with [[LDAP notes|LDAP]] servers. It mostly wraps [http://www.openldap.org/ OpenLDAP 2]. ...ode are also secure, then securing the network connection does nothing for security. (Same goes for the server, but that's one central place under admin contro ...
    6 KB (981 words) - 12:32, 9 July 2023
  • When you read [[Security_notes_/_Hashing_notes|notes on hash functions]], you might find notes that the hash function is hard to reverse - it's hard to guess the message ...
    16 KB (2,661 words) - 00:28, 21 April 2024
  • * '''Trusted Computing''' - refers to hardware-assisted security present in newer computers Sometimes sort of imitates security agency / military style, and can be modeled off it if you want. ...
    31 KB (5,091 words) - 16:54, 20 April 2024
  • Details may deviate, though. For example, there are Apache-specific notes to SERVER_NAME<!-- [http://stackoverflow.com/questions/2297403/http-host-vs Notes: ...
    9 KB (1,438 words) - 23:12, 20 April 2024
  • {{notes}} ===NFS notes=== ...
    22 KB (3,359 words) - 12:02, 24 April 2024
  • * IPSec+ESP (Encapsulating Security Payloads) [http://en.wikipedia.org/wiki/Encapsulating_Security_Payload#Enca ** IPSec+SA (Security Association) [http://en.wikipedia.org/wiki/Security_association] ...
    27 KB (4,208 words) - 00:23, 21 April 2024
  • ...which case you may also want {{inlinecode|-b 4096}}) is only one, [http://security.stackexchange.com/questions/5096/rsa-vs-dsa-for-ssh-authentication-keys thi ...seless keys on multi-user systems''' if you don't fully trust the system's security, or administration. ...
    19 KB (3,177 words) - 23:09, 20 April 2024
  • {{notes}} Notes on standards and real-world implementations: ...
    7 KB (1,185 words) - 15:00, 16 January 2024
  • Notes: '''Notes that address both''' ...
    9 KB (1,369 words) - 23:19, 20 April 2024
  • ...things remotely, you ''can'' trust whatever happens on a LAN but it's bad security practice. ...sing SSH server) || Good (draw commands, small lag for encryption) || Security (auth and encryption) is already handled.<br/>Some SSH servers disable X by ...
    48 KB (7,830 words) - 00:23, 21 April 2024
  • Notes: Notes: ...
    19 KB (2,877 words) - 00:41, 24 February 2024
  • ...ot change who can interact with this information - unless people made the security mistake of allowing ''anyone'' to add code to their page. Notes: ...
    35 KB (5,837 words) - 00:33, 21 April 2024
  • ===nmap notes=== (assumption is use on home LAN. For security stuff, learn it properly) ...
    28 KB (4,195 words) - 15:12, 8 April 2024
  • * [http://www.gnuplot.info/ gnuplot] (script interface), see also [[Gnuplot notes]] ...system admin apps based on it ([[Linux admin notes#Statistics|Linux admin notes]]). ...
    21 KB (2,852 words) - 18:39, 9 May 2022
  • ...system that magically makes everything good. None. Largely because decent security is inconvenient, so both people and systems compromise. ==Public key encryption notes== ...
    55 KB (9,128 words) - 00:19, 22 April 2024
  • It's not a tool for security, it's purely to automate an interactive login automated that wouldn't work '''assume sshpass is bad security''' on the host you're running it ...
    37 KB (5,785 words) - 23:09, 20 April 2024
  • ===GPU-related notes=== Notes: ...
    31 KB (4,602 words) - 00:20, 2 April 2024
  • Notes: : WFP is a convenience feature, not a security feature. Once a program is allowed to write to the windows directory, it ca ...
    22 KB (3,547 words) - 00:21, 21 April 2024
  • =irssi notes= Notes: ...
    12 KB (1,957 words) - 16:25, 20 April 2024
  • {{electronics notes}} ...which may ''potentially'' be more interesting, but also more work. (see [[#Notes on IEC 62056-21]] for details) ...
    24 KB (3,909 words) - 16:24, 20 April 2024
  • {{notes}} The above is for bother and security. '''If you care about crawler reaction you probably want to use ...
    24 KB (3,772 words) - 23:09, 20 April 2024
  • Notes: The obvious comparison is to [[xargs]], so some notes: ...
    26 KB (4,188 words) - 00:33, 3 May 2024
  • : (it's also good for security, which is often part of the point) such as having full rights to trample over each other (meaning stability and security is impossible to guarantee), ...
    45 KB (7,398 words) - 19:08, 28 March 2024
  • Notes: Notes: ...
    26 KB (3,995 words) - 18:29, 12 April 2024
  • : does not use any features that are potential security features ==Technical notes== ...
    13 KB (2,019 words) - 00:28, 21 April 2024
  • #redirect [[SSH - loose notes]] ...
    31 bytes (5 words) - 15:48, 11 September 2012
  • ...many distinct uses for hashing, many of which not particularly related to security, This is obviously a ''bad'' idea to longer-term security, because if someone gets (local or remote) access to the computer that stor ...
    50 KB (7,780 words) - 23:15, 21 April 2024
  • One of the larger ones is that it was never designed for strict security. ...have a responsibilities be clear, e.g. relating to input (which was also a security issue). ...
    37 KB (5,898 words) - 11:57, 8 May 2024
  • ==Some result status notes== Notes: ...
    28 KB (4,403 words) - 00:52, 3 May 2024
  • Notes: ...e limit that feels like it's from the nineties, or just prefer the control/security/trust of hosting it yourself. ...
    19 KB (3,026 words) - 12:12, 30 January 2024
  • Notes: ====Daemon mode notes==== ...
    31 KB (4,966 words) - 12:54, 10 July 2023
  • ...more security, the thoroughness you forget will give you a false sense of security : which can give a false sense of security ...
    36 KB (5,922 words) - 00:13, 10 May 2024
  • {{comment|(In accordance with general security rules, you may want to be relatively vague in your login failure errors. Fo * [[Python-ldap notes]] ...
    9 KB (1,485 words) - 11:38, 3 April 2023
  • * some security-aware things like '''[[sudo]]''' and '''[[cron]]''' ''specifically avoid'' Misc notes: ...
    40 KB (6,118 words) - 13:21, 15 March 2024
  • ...generated DOM in a more isolated way (isolated in terms of structure, not security) : not a security feature, as some assume ...
    62 KB (9,591 words) - 17:53, 11 September 2023
  • {{notes}} Notes: ...
    14 KB (2,197 words) - 17:10, 14 July 2023
  • Notes: =On Samba security= ...
    78 KB (12,565 words) - 00:28, 21 April 2024
  • ...ervices, and OSes ''may'' deny user programs to listen to these ports, for security reasons {{comment|(e.g. making it a little harder to replace common service http://www.linuxhowtos.org/Security/iptables.htm ...
    32 KB (5,000 words) - 22:23, 1 February 2024
  • Notes: Seeing a plus sign, e.g. Notes: ...
    66 KB (10,740 words) - 10:40, 24 April 2024
  • =Notes on...= : by design, because the latter is a security risk ...
    35 KB (5,638 words) - 15:53, 26 December 2023
  • =Import related notes= {{comment|(For ElementTree you may want something fancier; see [[Python notes - XML#Lineage.2C_variants.2C_and_importing]])}} ...
    45 KB (6,973 words) - 15:05, 5 March 2024
  • Notes: Notes: ...
    53 KB (8,241 words) - 12:59, 7 May 2024
  • ...o/guide/en/elasticsearch/reference/current/security-settings.html advanced security]" (meaning? TLS for whatever connects directly to the service?) xpack.security.enabled (in elasticsearch.yml) ...
    75 KB (11,323 words) - 12:48, 6 May 2024
  • ===Other notes=== ==Distro summary/notes== ...
    44 KB (7,142 words) - 17:13, 14 February 2024
  • {{notes}} ===Other notes=== ...
    25 KB (3,814 words) - 00:41, 21 April 2024
  • {{notes}} Notes: ...
    25 KB (3,919 words) - 00:28, 21 April 2024
  • * node for for backend, because it's not due to the browser security =Qt and PyQt notes= ...
    30 KB (4,103 words) - 17:41, 11 September 2023
  • {{notes}} This is both a security issue and potentially a DoS issue. ...
    31 KB (5,039 words) - 13:06, 27 April 2024
  • ...independent, and not trample on other things {{comment|(and ''in theory'' security concerns but there are some footnotes)}}. ...efore Linux, though in that case for reasons of operational efficiency and security, whereas docker seems more focused at deploying [[microservice]] style thin ...
    91 KB (14,566 words) - 01:04, 24 April 2024
  • ==functools notes== :: helps security a little (but not hard guarantee) ...
    31 KB (4,682 words) - 00:15, 10 May 2024
  • * better security (how?) ** has some security implications when you also use no_root_squash {{verify}} ...
    24 KB (3,738 words) - 00:31, 21 April 2024
  • * _target {{comment|(slashed path to object in object tree. See notes below)}} Notes: ...
    24 KB (3,659 words) - 17:42, 11 September 2023
  • {{notes}} ===Notes on JPEG file structure=== ...
    45 KB (7,220 words) - 00:36, 21 April 2024
  • {{Electronics notes}} {{notes}} ...
    95 KB (15,820 words) - 23:06, 21 April 2024
  • It's just my own self-educational notes. Notes: ...
    25 KB (4,101 words) - 16:42, 28 March 2024
  • =Basic notes on some common attacks/exploits= Security implications vary along. ...
    25 KB (4,259 words) - 13:16, 16 January 2024
  • See also [[General RDBMS use and speed tweaking notes]] See [[Relational database and SQL notes#Memory_configuration]] ...
    47 KB (7,644 words) - 15:55, 26 February 2024
  • Notes ...out standardizing exactly what happens immediately after a TRIM, there are security issues and even data corruption issues. ...
    28 KB (4,726 words) - 12:02, 24 April 2024
  • ...I%2C_SCGI%2C_WSGI%2C_servlets_and_such#WSGI]], [[mod_wsgi notes]] and some notes elsewhere (e.g. those on the [[CherryPy]] page) ==Framework and tool notes== ...
    55 KB (8,019 words) - 18:58, 9 July 2023
  • These here are notes for myself. Notes: ...
    28 KB (4,281 words) - 11:59, 1 February 2024
  • ...routing, For hardware interconnects, see [[Electronics project notes/Audio notes - Digital sound communication]] ===Chromecast notes=== ...
    59 KB (9,172 words) - 00:42, 21 April 2024
  • See also [[MPI notes]] : meant for integration of that environment - and security between sessions ...
    88 KB (13,801 words) - 01:58, 6 April 2024
  • {{Electronics notes}} ...starting as little more "I am tag with this number" - no real protocol, no security. ...
    108 KB (16,976 words) - 17:01, 29 April 2024
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)