Search results

Jump to navigation Jump to search
  • ...ey are different purposes, and have practicalities different enough in the security and privacy implications, and how to use them well for those purposes. For a practical view, see [[Security notes - security for the everyday person]] ...
    15 KB (2,492 words) - 12:17, 9 March 2024
  • * also there is potentially some hardware / syscalls that security says only admins are allowed to do, in which case the experiment would not ...
    2 KB (393 words) - 12:27, 19 September 2023
  • The second or two of pause and the animated checkmark seem to primarily be [[security theater]], ...
    2 KB (392 words) - 23:56, 22 March 2024
  • : this only really matters when security or gambling are involved ...
    2 KB (325 words) - 16:13, 18 September 2017
  • * pam_access - logdaemon style login access control, via <tt>/etc/security/access.conf</tt> * pam_limits - limit resources, according to <tt>/etc/security/limits.conf</tt> ...
    13 KB (2,153 words) - 22:43, 4 May 2022
  • * security - try not leaking all your code ...
    2 KB (430 words) - 15:02, 23 March 2024
  • * some processes have their own logic that change security. ...icted user and some processes may be run in a chroot jail but all of these security methods are discretionary. ...
    10 KB (1,736 words) - 14:05, 4 February 2024
  • It's a hardware module that assists a few security needs https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm ...
    21 KB (3,508 words) - 19:33, 22 March 2024
  • Up to your sense of security. ...
    3 KB (445 words) - 18:48, 26 March 2024
  • ======Security notes====== '''Host security''' ...
    14 KB (2,111 words) - 15:43, 2 January 2024
  • ===Extracting things from security logs=== ...
    10 KB (1,582 words) - 12:41, 6 December 2023
  • * lsass.exe (local security, login. Perhaps see [[lsass.exe taking all cpu]]) * dpmw32.exe (print, security) ...
    9 KB (1,367 words) - 11:30, 28 September 2023
  • If you really want to tie down security, there are many things to think about ...he easiest solution, because it requires minimal additional setup, and the security implications are fairly easily understood. ...
    14 KB (2,229 words) - 00:09, 1 August 2022
  • Security features might e.g. isolate each device that attaches to the network But we did. So, security feature makes thing not work. ...
    11 KB (1,881 words) - 14:43, 26 February 2024
  • The disk is still fully accessible, if you care about strong security you should ''assume'' it's still readable, which are good at live security for CPU-cheap. ...
    27 KB (4,718 words) - 10:50, 28 February 2024
  • ...ed_keys|Restricting what command can be run on my server]] so that's not a security issue ===Syntax and some security notes=== ...
    25 KB (4,140 words) - 12:20, 20 November 2023
  • ...at on the internet we often... sort of ignore at our own peril. See [[LARP security]]), ...
    4 KB (558 words) - 10:28, 4 March 2024
  • * '''Trusted Computing''' - refers to hardware-assisted security present in newer computers Sometimes sort of imitates security agency / military style, and can be modeled off it if you want. ...
    31 KB (5,085 words) - 15:37, 26 March 2024
  • but these have all died, for various reasons, not least of them security concerns. ...
    4 KB (569 words) - 12:59, 7 October 2023
  • You should assume that digests like this have no security value, particularly when sent over the same channel, : stealing this still steals the session (ans forever - no forward security) - but does not reveal anything beyond the username ...
    16 KB (2,655 words) - 15:51, 18 March 2024
  • ** adds security to v2 (and little else?) ...
    4 KB (568 words) - 11:53, 16 July 2020
  • Sending these parameters instead of speech was initially also security ([[security by obscurity|by obscurity]])-->. ...ed a relatively poor voice, but this was seen as a feature when applied to security - it took out much of what made a voice identifiable, while still transmitt ...
    14 KB (2,190 words) - 14:57, 24 October 2023
  • If anything, it loosens security. ...>Origin</tt> {{comment|(you can't even touch it via scripting, for obvious security reasons)}} ...
    31 KB (4,955 words) - 14:20, 14 February 2024
  • Perhaps more interesting to security. ...
    5 KB (771 words) - 12:07, 20 February 2024
  • ...ode are also secure, then securing the network connection does nothing for security. (Same goes for the server, but that's one central place under admin contro ...
    6 KB (981 words) - 11:32, 9 July 2023
  • ...which case you may also want {{inlinecode|-b 4096}}) is only one, [http://security.stackexchange.com/questions/5096/rsa-vs-dsa-for-ssh-authentication-keys thi ...seless keys on multi-user systems''' if you don't fully trust the system's security, or administration. ...
    19 KB (3,171 words) - 12:53, 6 December 2023
  • Security: user auth, POSIX-style permissions Security: ...
    22 KB (3,356 words) - 12:02, 12 July 2023
  • :::: banknotes often have security features to check ...
    6 KB (935 words) - 23:18, 7 January 2024
  • ...ot change who can interact with this information - unless people made the security mistake of allowing ''anyone'' to add code to their page. * can be a security risk. Consider e.g. the case where app2.example.org is hosted hosted by som ...
    35 KB (5,834 words) - 15:36, 18 March 2024
  • ...things remotely, you ''can'' trust whatever happens on a LAN but it's bad security practice. ...sing SSH server) || Good (draw commands, small lag for encryption) || Security (auth and encryption) is already handled.<br/>Some SSH servers disable X by ...
    48 KB (7,827 words) - 12:01, 28 November 2023
  • * IPSec+ESP (Encapsulating Security Payloads) [http://en.wikipedia.org/wiki/Encapsulating_Security_Payload#Enca ** IPSec+SA (Security Association) [http://en.wikipedia.org/wiki/Security_association] ...
    27 KB (4,205 words) - 00:06, 26 December 2023
  • If it's an effective-user thing ''only'', e.g. for security reasons, This is intentional, good for security, and to avoid a mess. ...
    19 KB (2,877 words) - 23:41, 23 February 2024
  • ...system that magically makes everything good. None. Largely because decent security is inconvenient, so both people and systems compromise. ...ut don't, then you are fooling yourself. This is what we might call [[LARP security]]. ...
    54 KB (8,968 words) - 16:20, 23 January 2024
  • ...more security, the thoroughness you forget will give you a false sense of security : which can give a false sense of security ...
    35 KB (5,871 words) - 16:58, 3 March 2024
  • It's not a tool for security, it's purely to automate an interactive login automated that wouldn't work '''assume sshpass is bad security''' on the host you're running it ...
    37 KB (5,779 words) - 13:45, 22 December 2023
  • ====Security==== * https://jupyter-notebook.readthedocs.io/en/stable/security.html ...
    26 KB (4,001 words) - 18:32, 27 November 2023
  • : (it's also good for security, which is often part of the point) such as having full rights to trample over each other (meaning stability and security is impossible to guarantee), ...
    45 KB (7,398 words) - 18:08, 28 March 2024
  • This is useful e.g. when you serve from both, and want to avoid mixed-content security warnings, ...
    7 KB (1,185 words) - 14:00, 16 January 2024
  • ** to apply per-app or per-process security policies - and separate them ...
    9 KB (1,435 words) - 19:35, 23 June 2023
  • * 0010: Version 2: DCE Security version (with embedded POSIX UIDs) ...
    9 KB (1,388 words) - 23:41, 31 July 2022
  • 31 bytes (5 words) - 14:48, 11 September 2012
  • There are practical details and security issues to both. ...
    8 KB (1,301 words) - 16:06, 19 September 2023
  • =====other security===== ...
    26 KB (4,153 words) - 15:20, 11 September 2023
  • ...many distinct uses for hashing, many of which not particularly related to security, This is obviously a ''bad'' idea to longer-term security, because if someone gets (local or remote) access to the computer that stor ...
    50 KB (7,774 words) - 17:47, 27 February 2024
  • (assumption is use on home LAN. For security stuff, learn it properly) ==Security-related== ...
    28 KB (4,195 words) - 10:47, 16 February 2024
  • One of the larger ones is that it was never designed for strict security. ...have a responsibilities be clear, e.g. relating to input (which was also a security issue). ...
    37 KB (5,893 words) - 18:07, 5 March 2024
  • =On Samba security= ==security models (security=share, user, and such)== ...
    78 KB (12,562 words) - 14:54, 11 September 2023
  • : WFP is a convenience feature, not a security feature. Once a program is allowed to write to the windows directory, it ca ...m different versions of non-hotfix updates (General Distribution Releases: security update, critical update, update, update rollup, driver, or feature pack). T ...
    22 KB (3,542 words) - 12:02, 12 March 2024
  • {{comment|(In accordance with general security rules, you may want to be relatively vague in your login failure errors. Fo ...
    9 KB (1,485 words) - 10:38, 3 April 2023
  • ** adds optional security, manufacturer-specific functionality Programming mode is due to one of various security levels and their conditions - basic alterations may require a password, som ...
    24 KB (3,906 words) - 16:50, 27 February 2024
View ( | ) (20 | 50 | 100 | 250 | 500)