Search results

Jump to navigation Jump to search
  • ...could patch it in our derived version as soon as possible, but unless it's security-critical, ...
    2 KB (293 words) - 14:50, 6 March 2022
  • it's probably worse for security (patching each app is now more up to the application developer), * installing snap inside docker is somewhat awkward (and perhaps not ideal security-wise) ...
    4 KB (705 words) - 15:39, 26 March 2024
  • but it's a bit of security-by-obscurity, isn't the most effective, or very common. ...
    2 KB (301 words) - 16:20, 9 February 2022
  • ...ey are different purposes, and have practicalities different enough in the security and privacy implications, and how to use them well for those purposes. For a practical view, see [[Security notes - security for the everyday person]] ...
    15 KB (2,498 words) - 00:27, 21 April 2024
  • * also there is potentially some hardware / syscalls that security says only admins are allowed to do, in which case the experiment would not ...
    2 KB (393 words) - 13:27, 19 September 2023
  • The second or two of pause and the animated checkmark seem to primarily be [[security theater]], ...
    2 KB (387 words) - 00:51, 24 April 2024
  • Security IDentifiers (SIDs) identify users, groups, accounts, and also domains thems * (EventID 4226) TCP/IP has reached the security limit imposed on the number of concurrent TCP connect attempts. ...
    11 KB (1,805 words) - 12:08, 24 April 2024
  • : this only really matters when security or gambling are involved ...
    2 KB (325 words) - 17:13, 18 September 2017
  • * security - try not leaking all your code ...
    2 KB (430 words) - 16:02, 23 March 2024
  • * pam_access - logdaemon style login access control, via <tt>/etc/security/access.conf</tt> * pam_limits - limit resources, according to <tt>/etc/security/limits.conf</tt> ...
    13 KB (2,159 words) - 16:37, 20 April 2024
  • * some processes have their own logic that change security. ...icted user and some processes may be run in a chroot jail but all of these security methods are discretionary. ...
    10 KB (1,736 words) - 15:05, 4 February 2024
  • Up to your sense of security. ...
    3 KB (445 words) - 19:48, 26 March 2024
  • ======Security notes====== '''Host security''' ...
    14 KB (2,111 words) - 16:43, 2 January 2024
  • ===Extracting things from security logs=== ...
    10 KB (1,588 words) - 01:10, 24 April 2024
  • * lsass.exe (local security, login. Perhaps see [[lsass.exe taking all cpu]]) * dpmw32.exe (print, security) ...
    9 KB (1,370 words) - 00:18, 22 April 2024
  • so is preferred for the security-sensitive operations (that often makes up a small subset of all things bein * AMD Platform Security Processor (PSP), officially known as AMD Secure Technology=== ...
    24 KB (4,119 words) - 11:31, 24 April 2024
  • Security features might e.g. isolate each device that attaches to the network But we did. So, security feature makes thing not work. ...
    11 KB (1,881 words) - 15:43, 26 February 2024
  • If you really want to tie down security, there are many things to think about ...he easiest solution, because it requires minimal additional setup, and the security implications are fairly easily understood. ...
    14 KB (2,235 words) - 00:19, 22 April 2024
  • ...ed_keys|Restricting what command can be run on my server]] so that's not a security issue ===Syntax and some security notes=== ...
    25 KB (4,146 words) - 16:37, 20 April 2024
  • ...at on the internet we often... sort of ignore at our own peril. See [[LARP security]]), ...
    4 KB (564 words) - 16:26, 20 April 2024
  • but these have all died, for various reasons, not least of them security concerns. ...
    4 KB (569 words) - 13:59, 7 October 2023
  • * '''Trusted Computing''' - refers to hardware-assisted security present in newer computers Sometimes sort of imitates security agency / military style, and can be modeled off it if you want. ...
    31 KB (5,091 words) - 16:54, 20 April 2024
  • You should assume that digests like this have no security value, particularly when sent over the same channel, : stealing this still steals the session (ans forever - no forward security) - but does not reveal anything beyond the username ...
    16 KB (2,661 words) - 00:28, 21 April 2024
  • The disk is still fully accessible, if you care about strong security you should ''assume'' it's still readable, which are good at live security for CPU-cheap. ...
    30 KB (5,181 words) - 00:20, 22 April 2024
  • ** adds security to v2 (and little else?) ...
    4 KB (568 words) - 12:53, 16 July 2020
  • Sending these parameters instead of speech was initially also security ([[security by obscurity|by obscurity]])-->. ...ed a relatively poor voice, but this was seen as a feature when applied to security - it took out much of what made a voice identifiable, while still transmitt ...
    15 KB (2,239 words) - 18:45, 22 April 2024
  • If anything, it loosens security. ...>Origin</tt> {{comment|(you can't even touch it via scripting, for obvious security reasons)}} ...
    31 KB (4,961 words) - 00:20, 22 April 2024
  • Perhaps more interesting to security. ...
    5 KB (774 words) - 23:12, 21 April 2024
  • ...ode are also secure, then securing the network connection does nothing for security. (Same goes for the server, but that's one central place under admin contro ...
    6 KB (981 words) - 12:32, 9 July 2023
  • Security: user auth, POSIX-style permissions Security: ...
    22 KB (3,359 words) - 12:02, 24 April 2024
  • ...which case you may also want {{inlinecode|-b 4096}}) is only one, [http://security.stackexchange.com/questions/5096/rsa-vs-dsa-for-ssh-authentication-keys thi ...seless keys on multi-user systems''' if you don't fully trust the system's security, or administration. ...
    19 KB (3,177 words) - 23:09, 20 April 2024
  • :::: banknotes often have security features to check ...
    6 KB (946 words) - 15:33, 6 April 2024
  • content: "security"; ...
    7 KB (662 words) - 10:41, 24 April 2024
  • ...things remotely, you ''can'' trust whatever happens on a LAN but it's bad security practice. ...sing SSH server) || Good (draw commands, small lag for encryption) || Security (auth and encryption) is already handled.<br/>Some SSH servers disable X by ...
    48 KB (7,830 words) - 00:23, 21 April 2024
  • ...ot change who can interact with this information - unless people made the security mistake of allowing ''anyone'' to add code to their page. * can be a security risk. Consider e.g. the case where app2.example.org is hosted hosted by som ...
    35 KB (5,837 words) - 00:33, 21 April 2024
  • * IPSec+ESP (Encapsulating Security Payloads) [http://en.wikipedia.org/wiki/Encapsulating_Security_Payload#Enca ** IPSec+SA (Security Association) [http://en.wikipedia.org/wiki/Security_association] ...
    27 KB (4,208 words) - 00:23, 21 April 2024
  • If it's an effective-user thing ''only'', e.g. for security reasons, This is intentional, good for security, and to avoid a mess. ...
    19 KB (2,877 words) - 00:41, 24 February 2024
  • ...system that magically makes everything good. None. Largely because decent security is inconvenient, so both people and systems compromise. ...ut don't, then you are fooling yourself. This is what we might call [[LARP security]]. ...
    55 KB (9,128 words) - 00:19, 22 April 2024
  • ...more security, the thoroughness you forget will give you a false sense of security : which can give a false sense of security ...
    35 KB (5,874 words) - 18:20, 22 April 2024
  • It's not a tool for security, it's purely to automate an interactive login automated that wouldn't work '''assume sshpass is bad security''' on the host you're running it ...
    37 KB (5,785 words) - 23:09, 20 April 2024
  • ====Security==== * https://jupyter-notebook.readthedocs.io/en/stable/security.html ...
    26 KB (3,995 words) - 18:29, 12 April 2024
  • : (it's also good for security, which is often part of the point) such as having full rights to trample over each other (meaning stability and security is impossible to guarantee), ...
    45 KB (7,398 words) - 19:08, 28 March 2024
  • This is useful e.g. when you serve from both, and want to avoid mixed-content security warnings, ...
    7 KB (1,185 words) - 15:00, 16 January 2024
  • ** to apply per-app or per-process security policies - and separate them ...
    9 KB (1,438 words) - 23:12, 20 April 2024
  • * 0010: Version 2: DCE Security version (with embedded POSIX UIDs) ...
    9 KB (1,388 words) - 00:41, 1 August 2022
  • 31 bytes (5 words) - 15:48, 11 September 2012
  • =====other security===== ...
    26 KB (4,153 words) - 16:20, 11 September 2023
  • There are practical details and security issues to both. ...
    9 KB (1,369 words) - 23:19, 20 April 2024
  • ...many distinct uses for hashing, many of which not particularly related to security, This is obviously a ''bad'' idea to longer-term security, because if someone gets (local or remote) access to the computer that stor ...
    50 KB (7,780 words) - 23:15, 21 April 2024
  • (assumption is use on home LAN. For security stuff, learn it properly) ==Security-related== ...
    28 KB (4,195 words) - 15:12, 8 April 2024
View ( | ) (20 | 50 | 100 | 250 | 500)