Search results

From Helpful
Jump to: navigation, search

Page title matches

  • ...tual login, you could redirect back to HTTP {{comment|(note that there are security gotchas to the latter)}}. The above is for bother and security. '''If you care about crawler reaction you probably want to use
    24 KB (3,704 words) - 13:21, 3 April 2020
  • ...assword reuse. Since you do not really know the quality of any one site's security, you should assume likeliness of a particular site being hacked as likely t : may be a false sense of security
    5 KB (757 words) - 16:44, 7 July 2020
  • ===Security truisms=== * security is only as good as its weakest link.
    15 KB (2,492 words) - 13:46, 8 October 2019
  • ...n.wikipedia.org/wiki/Same-origin_policy '''same-origin policy'''], a basic security model that says that these resources ''must'' come from the same origin. ...>Origin</tt> {{comment|(you can't even touch it via scripting, for obvious security reasons)}}
    18 KB (2,882 words) - 22:21, 11 February 2020
  • ...t is, the thing/person that wants to act, and as such has to deal with the security system. In computer security, what you actually check is "is this login valid",
    35 KB (5,709 words) - 15:40, 8 October 2019
  • If the security center shows antivirus and firewall as disabled, and reports similar errors
    707 B (100 words) - 18:08, 6 January 2014
  • * some processes have their own logic that change security. ...icted user and some processes may be run in a chroot jail but all of these security methods are discretionary.
    10 KB (1,673 words) - 14:46, 8 October 2019
  • Security implications vary along. ...tring of this and that' is assistance and/or normalization - and ''not'' a security feature until you can prove that it is.
    21 KB (3,505 words) - 16:37, 16 October 2019
  • ...system that magically makes everything good. None. Largely because decent security is inconvenient, so both people and systems compromise.--> The public-private key system's additional security is based on the fact that given the public key of someone's (public,private
    4 KB (722 words) - 16:16, 11 February 2017
  • * '''Trusted Computing''' - refers to hardware-assisted security present in newer computers Sometimes sort of imitates security agency / military style, and can be modeled off it if you want.
    6 KB (950 words) - 13:47, 30 May 2020

Page text matches

  • : OSes ''may'' deny user programs to listen to these ports, for security reasons {{comment|(e.g. arbitrary programs hosting common services to assis http://www.linuxhowtos.org/Security/iptables.htm
    40 KB (6,227 words) - 13:23, 16 July 2019
  • * some security-aware things like [[sudo]] and [[cron]] specifically avoid sourcing any of : have system environment stripped for security reasons {{verify}}
    39 KB (6,049 words) - 12:47, 28 May 2020
  • #redirect [[Apache config and .htaccess - security#AllowOverride]]
    66 B (8 words) - 17:41, 26 March 2015
  • ...sing SSH server) || Good (draw commands, small lag for encryption) || Security (auth and encryption) is already handled. Some SSH servers disable X by def ...as to support doing this, and it has to be enabled. It may be disabled for security/leanness reasons. If so, change your sshd config . Note that filenames tend
    19 KB (3,022 words) - 14:25, 26 July 2020
  • Start it without any security. '''WARNING:''' At this point people could connect and steal, pillage, plun * MySQL security prevents you from connecting
    46 KB (7,626 words) - 13:57, 26 February 2018
  • If you're lazy and don't care for security you can use postgres for everything. You want this only when you understand the security implications,
    129 KB (20,712 words) - 13:39, 14 May 2020
  • ...tual login, you could redirect back to HTTP {{comment|(note that there are security gotchas to the latter)}}. The above is for bother and security. '''If you care about crawler reaction you probably want to use
    24 KB (3,704 words) - 13:21, 3 April 2020
  • 31 B (5 words) - 15:48, 11 September 2012
  • : can only be set ''by'' root / through sudo (for obvious security reasons) and if it's about high security then SELinux's MAC style is stronger than this DAC style.
    64 KB (10,427 words) - 15:03, 9 July 2020
  • ...enabled/*.conf&nbsp;</tt> {{comment|(config files for general stuff like security, charset)}} ** mostly a separation of some common shared setup (security, charset, and such)
    19 KB (2,935 words) - 13:21, 3 April 2020
  • ...l (i.e. basic firewalling, or unix-sockets-only), that is usually the only security you need. Source IPs should be enough authentication; if you can't assume t
    66 KB (10,865 words) - 15:34, 5 December 2019
  • It's also great for security in that you can't just read all memory contents. * {{comment|(for stability/security reasons we want to protect the kernel from accesses, so)}} there is a kerne
    92 KB (15,388 words) - 14:52, 28 July 2020
  • ...here in your filesystem {{comment|(which can be handy if you have anything security-sensitive, such hardcoded database logins in a <tt>config.py</tt>, that you
    69 KB (11,148 words) - 13:34, 12 March 2013
  • * may provides security and sessions by SSL and SSH ...nd well to IP subnets (layer 3), because this usually makes management and security sense.
    71 KB (11,538 words) - 17:53, 27 November 2019
  • Security is mostly the filesystem permissions to that socket file. It allows flexibility in management, helps security a bit, assists traffic monitoring/limiting, lets you limit the scope of bro
    59 KB (9,327 words) - 18:13, 16 December 2019
  • {{comment|(In accordance with general security rules, you may want to be relatively vague in your login failure errors. Fo
    9 KB (1,447 words) - 17:18, 10 May 2016
  • : for security reasons, it is '''ignored at runtime''' for executables that have [[setuid]
    24 KB (3,974 words) - 17:56, 11 November 2019
  • * node for for backend, because it's not due to the browser security
    26 KB (3,485 words) - 00:23, 27 June 2020
  • If it's an effective-user thing ''only'', e.g. for security reasons,
    8 KB (1,180 words) - 17:33, 17 April 2019
  • * security (object)
    24 KB (3,660 words) - 14:40, 18 June 2012

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)