Search results

From Helpful
Jump to: navigation, search

Page title matches

  • ...tual login, you could redirect back to HTTP {{comment|(note that there are security gotchas to the latter)}}. The above is for bother and security. '''If you care about crawler reaction you probably want to use
    24 KB (3,704 words) - 12:21, 3 April 2020
  • ...assword reuse. Since you do not really know the quality of any one site's security, you should assume likeliness of a particular site being hacked as likely t To the bulk of us, there are more functional reasons than security reasons.
    8 KB (1,340 words) - 22:12, 1 October 2020
  • ===Security truisms=== * security is only as good as its weakest link.
    16 KB (2,570 words) - 22:26, 13 August 2020
  • ...n.wikipedia.org/wiki/Same-origin_policy '''same-origin policy'''], a basic security model that says that these resources ''must'' come from the same origin. ...>Origin</tt> {{comment|(you can't even touch it via scripting, for obvious security reasons)}}
    18 KB (2,882 words) - 23:29, 15 September 2020
  • ...t is, the thing/person that wants to act, and as such has to deal with the security system. In computer security, what you actually check is "is this login valid",
    35 KB (5,709 words) - 14:40, 8 October 2019
  • If the security center shows antivirus and firewall as disabled, and reports similar errors
    707 B (100 words) - 17:08, 6 January 2014
  • * some processes have their own logic that change security. ...icted user and some processes may be run in a chroot jail but all of these security methods are discretionary.
    10 KB (1,673 words) - 13:46, 8 October 2019
  • Security implications vary along. ...tring of this and that' is assistance and/or normalization - and ''not'' a security feature until you can prove that it is.
    21 KB (3,505 words) - 15:37, 16 October 2019
  • ...system that magically makes everything good. None. Largely because decent security is inconvenient, so both people and systems compromise.--> The public-private key system's additional security is based on the fact that given the public key of someone's (public,private
    4 KB (722 words) - 15:16, 11 February 2017
  • * '''Trusted Computing''' - refers to hardware-assisted security present in newer computers Sometimes sort of imitates security agency / military style, and can be modeled off it if you want.
    6 KB (950 words) - 12:47, 30 May 2020

Page text matches

  • : OSes ''may'' deny user programs to listen to these ports, for security reasons {{comment|(e.g. arbitrary programs hosting common services to assis http://www.linuxhowtos.org/Security/iptables.htm
    40 KB (6,227 words) - 12:23, 16 July 2019
  • * some security-aware things like [[sudo]] and [[cron]] specifically avoid sourcing any of : have system environment stripped for security reasons {{verify}}
    39 KB (6,049 words) - 11:47, 28 May 2020
  • #redirect [[Apache config and .htaccess - security#AllowOverride]]
    66 B (8 words) - 16:41, 26 March 2015
  • ...sing SSH server) || Good (draw commands, small lag for encryption) || Security (auth and encryption) is already handled. Some SSH servers disable X by def ...as to support doing this, and it has to be enabled. It may be disabled for security/leanness reasons. If so, change your sshd config . Note that filenames tend
    19 KB (3,022 words) - 13:25, 26 July 2020
  • Start it without any security. '''WARNING:''' At this point people could connect and steal, pillage, plun * MySQL security prevents you from connecting
    46 KB (7,626 words) - 12:57, 26 February 2018
  • If you're lazy and don't care for security you can use postgres for everything. You want this only when you understand the security implications,
    131 KB (21,069 words) - 13:58, 10 November 2020
  • ...tual login, you could redirect back to HTTP {{comment|(note that there are security gotchas to the latter)}}. The above is for bother and security. '''If you care about crawler reaction you probably want to use
    24 KB (3,704 words) - 12:21, 3 April 2020
  • 31 B (5 words) - 14:48, 11 September 2012
  • : can only be set ''by'' root / through sudo (for obvious security reasons) and if it's about high security then SELinux's MAC style is stronger than this DAC style.
    65 KB (10,563 words) - 14:06, 12 October 2020
  • ...enabled/*.conf&nbsp;</tt> {{comment|(config files for general stuff like security, charset)}} ** mostly a separation of some common shared setup (security, charset, and such)
    19 KB (2,935 words) - 12:21, 3 April 2020
  • ...l (i.e. basic firewalling, or unix-sockets-only), that is usually the only security you need. Source IPs should be enough authentication; if you can't assume t
    66 KB (10,865 words) - 14:34, 5 December 2019
  • It's also great for security in that you can't just read all memory contents. * {{comment|(for stability/security reasons we want to protect the kernel from accesses, so)}} there is a kerne
    99 KB (16,528 words) - 18:39, 2 November 2020
  • ...here in your filesystem {{comment|(which can be handy if you have anything security-sensitive, such hardcoded database logins in a <tt>config.py</tt>, that you
    69 KB (11,148 words) - 12:34, 12 March 2013
  • * may provides security and sessions by SSL and SSH ...nd well to IP subnets (layer 3), because this usually makes management and security sense.
    71 KB (11,538 words) - 16:53, 27 November 2019
  • Security is mostly the filesystem permissions to that socket file. It allows flexibility in management, helps security a bit, assists traffic monitoring/limiting, lets you limit the scope of bro
    59 KB (9,318 words) - 13:06, 24 August 2020
  • {{comment|(In accordance with general security rules, you may want to be relatively vague in your login failure errors. Fo
    9 KB (1,447 words) - 16:18, 10 May 2016
  • : for security reasons, it is '''ignored at runtime''' for executables that have [[setuid]
    24 KB (3,974 words) - 16:56, 11 November 2019
  • * node for for backend, because it's not due to the browser security
    26 KB (3,485 words) - 23:23, 26 June 2020
  • If it's an effective-user thing ''only'', e.g. for security reasons,
    8 KB (1,180 words) - 16:33, 17 April 2019
  • * security (object)
    24 KB (3,660 words) - 13:40, 18 June 2012
  • * [http://www.microsoft.com/en-us/security_essentials/default.aspx Microsoft Security Essentials] http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm
    7 KB (1,028 words) - 14:50, 1 October 2016
  • Security implications: https://devcenter.heroku.com/articles/websocket-security
    19 KB (2,978 words) - 00:13, 21 June 2020
  • #redirect [[Security notes / Glossary#Least privilege]]
    55 B (6 words) - 13:20, 8 October 2019
  • =On Samba security= ==security models (security=share, user, and such)==
    78 KB (12,593 words) - 17:21, 20 September 2020
  • * [http://www.secviz.org/ SecViz: Security Visualization]
    21 KB (2,859 words) - 15:42, 1 November 2016
  • ======Security notes====== '''Host security'''
    46 KB (7,174 words) - 12:32, 23 October 2020
  • When running sub-programs, especially security-related ones, -- can be a good tool/habit to protect programs against injec
    4 KB (672 words) - 15:55, 27 November 2019
  • It was never designed as a security feature, so it ''isn't'' a security feature. BSD jails actually ''did'' have some security in mind.
    24 KB (3,878 words) - 13:02, 4 September 2020
  • ==Security-related==
    11 KB (1,615 words) - 15:03, 3 March 2020
  • ...security in the authentication part; not the best option if you care about security * IPSec+ESP (Encapsulating Security Payloads) [http://en.wikipedia.org/wiki/Encapsulating_Security_Payload#Enca
    27 KB (4,178 words) - 21:35, 27 March 2020
  • ...assword reuse. Since you do not really know the quality of any one site's security, you should assume likeliness of a particular site being hacked as likely t To the bulk of us, there are more functional reasons than security reasons.
    8 KB (1,340 words) - 22:12, 1 October 2020
  • #REDIRECT [[Security notes / Identification, authentication, authorization]]
    76 B (6 words) - 08:51, 3 May 2017
  • ===Security truisms=== * security is only as good as its weakest link.
    16 KB (2,570 words) - 22:26, 13 August 2020
  • ...n.wikipedia.org/wiki/Same-origin_policy '''same-origin policy'''], a basic security model that says that these resources ''must'' come from the same origin. ...>Origin</tt> {{comment|(you can't even touch it via scripting, for obvious security reasons)}}
    18 KB (2,882 words) - 23:29, 15 September 2020
  • This is a ''bad'' idea to longer-term security, because if someone got access to the computer they could simply read off a When implementing security like this, there is a checklist of things frequently done wrong, that you c
    36 KB (5,852 words) - 16:50, 16 June 2020
  • ...ening, for one of various possible reasons, including location estimation, security-related applications, home rehabilitation of absent minded people, etc.
    75 KB (11,753 words) - 13:28, 1 October 2020
  • do the required security hoop-jumpery,
    18 KB (2,871 words) - 14:41, 14 November 2019
  • : WFP is a convenience feature, not a security feature. Once a program is allowed to write to the windows directory, it ca ...m different versions of non-hotfix updates (General Distribution Releases: security update, critical update, update, update rollup, driver, or feature pack). T
    48 KB (7,785 words) - 12:59, 30 April 2019
  • One of the larger ones is that it was never designed for strict security. ...have a responsibilities be clear, e.g. relating to input (which was also a security issue).
    33 KB (5,265 words) - 00:44, 20 January 2020
  • ...op working when the server's screen is locked (though that can be called a security feature too).
    7 KB (1,085 words) - 00:07, 30 September 2010
  • ** to apply per-app or per-process security policies - and separate them
    8 KB (1,360 words) - 14:06, 10 May 2012
  • ...won't necessarily work, and unless you use one of the other features (e.g. security) you may forego start-stop-daemon.
    24 KB (3,705 words) - 14:49, 4 June 2020
  • #redirect [[Apache config and .htaccess - security#.htpasswd]]
    62 B (8 words) - 00:38, 21 June 2010
  • ESS - Embedded Security Subsystem (IBM product), basically a chip supporting public keys systems. S Generally, the idea of trusted computing is building security from the ground up, starting at a hardware module.
    8 KB (1,309 words) - 00:33, 21 September 2019
  • '''Corporate networks''' (or any other that have more security) are more annoying. ...device dedicated to serving media, you may want to disable the web UI for security reasons (it includes a filesystem browser) or learn how to decently lock do
    54 KB (8,306 words) - 20:14, 9 February 2020
  • ...s that you can't really resolve without an hour-long education on trust in security. This mechanism is ''great'', it solves a bunch of security problems and some practical problems.
    32 KB (5,333 words) - 14:36, 4 September 2020
  • : (though its lack of authentication makes it a security problem in a few cases)
    19 KB (2,985 words) - 11:21, 2 June 2020
  • ...a (configurable and removable) component called Internet Explorer Enhanced Security Configuration. I don' t Go to Control Panel &rarr; Internet Options &rarr; Security (tab)
    2 KB (312 words) - 14:37, 4 September 2012
  • HttpOnly was only ever meant as a useful mitigation, never as a solid security solution. ==Cookies and security==
    18 KB (2,962 words) - 14:16, 28 August 2020
  • * the security model is almost inherently flawed, including the fact that every widely use ** Like various overzealous security systems, all the risks of failure are yours. One implication is that the va
    6 KB (934 words) - 16:05, 28 January 2011

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)