Search results

Jump to navigation Jump to search
  • Around security: ...atory Access Control''' is a model of how to enforce rules, see [[Security notes / Glossary#Mandatory_Access_Control_.28model.29]] ...
    531 bytes (73 words) - 14:10, 1 March 2022
  • Notes: ===Security=== ...
    3 KB (396 words) - 01:06, 24 April 2024
  • ===security notes=== ...but keep in mind that if the security flag mentioned above applies, it means access() calls for ''everything''. ...
    3 KB (533 words) - 23:42, 12 May 2022
  • : this only really matters when security or gambling are involved Notes: ...
    2 KB (325 words) - 17:13, 18 September 2017
  • In security context, a nonce is something that is exchanged and used once (...as part o ==GSSAPI notes== ...
    9 KB (1,439 words) - 23:17, 20 April 2024
  • {{notes}} * chroot is '''not a security tool''' against those with ill will ...
    5 KB (863 words) - 16:22, 20 April 2024
  • =====Data model notes===== =====Config notes===== ...
    14 KB (2,111 words) - 16:43, 2 January 2024
  • ...second-or-two of pause, and the animated checkmark seem to primarily be [[security theater]], Notes: ...
    3 KB (420 words) - 13:52, 29 April 2024
  • Security IDentifiers (SIDs) identify users, groups, accounts, and also domains thems Other notes conflict, noting that Domain SIDs are S-1-5-5-X-Y, where X is the 'domain R ...
    11 KB (1,805 words) - 12:08, 24 April 2024
  • ** adds security to v2 (and little else?) ==Lower level notes== ...
    4 KB (568 words) - 12:53, 16 July 2020
  • Notes: * pam_access - logdaemon style login access control, via <tt>/etc/security/access.conf</tt> ...
    13 KB (2,159 words) - 16:37, 20 April 2024
  • ...ey are different purposes, and have practicalities different enough in the security and privacy implications, and how to use them well for those purposes. For a practical view, see [[Security notes - security for the everyday person]] ...
    15 KB (2,498 words) - 00:27, 21 April 2024
  • =Other notes on background processes= * lsass.exe (local security, login. Perhaps see [[lsass.exe taking all cpu]]) ...
    9 KB (1,370 words) - 00:18, 22 April 2024
  • {{notes}} ::: have that SSH and tunnel connection live longer (see notes below) ...
    25 KB (4,146 words) - 16:37, 20 April 2024
  • * some processes have their own logic that change security. ...icted user and some processes may be run in a chroot jail but all of these security methods are discretionary. ...
    10 KB (1,736 words) - 15:05, 4 February 2024
  • If you really want to tie down security, there are many things to think about ...he easiest solution, because it requires minimal additional setup, and the security implications are fairly easily understood. ...
    14 KB (2,235 words) - 00:19, 22 April 2024
  • {{notes}} ===Extracting things from security logs=== ...
    10 KB (1,588 words) - 01:10, 24 April 2024
  • ...a. python-ldap) package is one of a few that allow interaction with [[LDAP notes|LDAP]] servers. It mostly wraps [http://www.openldap.org/ OpenLDAP 2]. ...ode are also secure, then securing the network connection does nothing for security. (Same goes for the server, but that's one central place under admin contro ...
    6 KB (981 words) - 12:32, 9 July 2023
  • When you read [[Security_notes_/_Hashing_notes|notes on hash functions]], you might find notes that the hash function is hard to reverse - it's hard to guess the message ...
    16 KB (2,661 words) - 00:28, 21 April 2024
  • * '''Trusted Computing''' - refers to hardware-assisted security present in newer computers Sometimes sort of imitates security agency / military style, and can be modeled off it if you want. ...
    31 KB (5,091 words) - 16:54, 20 April 2024
View ( | ) (20 | 50 | 100 | 250 | 500)