Search results

Jump to navigation Jump to search

Page title matches

  • The disk is still fully accessible, if you care about strong security you should ''assume'' it's still readable, which are good at live security for CPU-cheap. ...
    27 KB (4,718 words) - 10:50, 28 February 2024
  • It's a hardware module that assists a few security needs https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm ...
    21 KB (3,508 words) - 19:33, 22 March 2024
  • If anything, it loosens security. ...>Origin</tt> {{comment|(you can't even touch it via scripting, for obvious security reasons)}} ...
    31 KB (4,955 words) - 14:20, 14 February 2024
  • 68 bytes (8 words) - 12:18, 10 January 2024
  • 7 members (0 subcategories, 0 files) - 16:23, 28 January 2011
  • Zero trust security is a design principle, a way of thinking about access between systems, and which somehow seem much easier to mess up security-wise than localized networks. ...
    5 KB (756 words) - 13:46, 19 February 2024
  • In security context, a nonce is something that is exchanged and used once (...as part o There are two security related things called NaCl - which are completely unrelated to each other. ...
    9 KB (1,433 words) - 12:20, 9 March 2024
  • * '''Trusted Computing''' - refers to hardware-assisted security present in newer computers Sometimes sort of imitates security agency / military style, and can be modeled off it if you want. ...
    31 KB (5,085 words) - 15:37, 26 March 2024
  • 99 bytes (14 words) - 00:33, 4 December 2023
  • 43 bytes (3 words) - 14:01, 14 July 2023
  • ...henticate" which is vague about what it is, and how good it is in terms of security. but they can have very different security implications, ...
    4 KB (624 words) - 17:32, 27 February 2024
  • Security nerds can get very technical about Yes, in the sense that it is the most fragile part of your personal security. ...
    6 KB (1,049 words) - 12:01, 28 March 2024
  • The above is for bother and security. '''If you care about crawler reaction you probably want to use ...tual login, you could redirect back to HTTP {{comment|(note that there are security gotchas to the latter)}}. ...
    24 KB (3,766 words) - 11:48, 10 July 2023
  • ...ey are different purposes, and have practicalities different enough in the security and privacy implications, and how to use them well for those purposes. For a practical view, see [[Security notes - security for the everyday person]] ...
    15 KB (2,492 words) - 12:17, 9 March 2024
  • ===Security truisms=== * security is only as good as its weakest link. ...
    10 KB (1,549 words) - 12:02, 2 January 2023
  • * some processes have their own logic that change security. ...icted user and some processes may be run in a chroot jail but all of these security methods are discretionary. ...
    10 KB (1,736 words) - 14:05, 4 February 2024
  • You should assume that digests like this have no security value, particularly when sent over the same channel, : stealing this still steals the session (ans forever - no forward security) - but does not reveal anything beyond the username ...
    16 KB (2,655 words) - 15:51, 18 March 2024
  • Security implications vary along. ...tring of this and that' is assistance and/or normalization - and ''not'' a security feature until you can prove that it is. ...
    25 KB (4,259 words) - 12:16, 16 January 2024
  • ...many distinct uses for hashing, many of which not particularly related to security, This is obviously a ''bad'' idea to longer-term security, because if someone gets (local or remote) access to the computer that stor ...
    50 KB (7,774 words) - 17:47, 27 February 2024
  • ...at on the internet we often... sort of ignore at our own peril. See [[LARP security]]), ...
    4 KB (558 words) - 10:28, 4 March 2024
  • #REDIRECT [[Security notes / some flaw/exploit notes]] ...
    54 bytes (7 words) - 14:31, 11 January 2024
  • 2 KB (370 words) - 23:55, 25 April 2022

Page text matches

  • | style="padding-right: 4px; padding-left: 4px;" | Security related stuff. Linux - [[PAM notes]] &#xB7; [[Linux admin notes - security enhanced linux|SELinux]] ...
    2 KB (298 words) - 12:20, 9 March 2024
  • Around security: * [[Security_notes_/_Unsorted#NaCl|NaCl security-related library]] (either of the two unrelated ones?) ...
    511 bytes (64 words) - 19:58, 26 February 2024
  • #REDIRECT [[Zero trust security]] ...
    33 bytes (4 words) - 18:17, 23 August 2023
  • Around security: ..., '''Mandatory Access Control''' is a model of how to enforce rules, see [[Security notes / Glossary#Mandatory_Access_Control_.28model.29]] ...
    531 bytes (73 words) - 13:10, 1 March 2022
  • #redirect [[Security notes / Glossary#Least_privilege_.28principle.29]] ...
    71 bytes (7 words) - 14:00, 30 September 2021
  • #redirect [[Security notes / Glossary#Mandatory_Access_Control_.28model.29]] ...
    76 bytes (8 words) - 14:25, 28 December 2020
  • #REDIRECT [[Security notes / Identification, authentication, authorization]] ...
    76 bytes (6 words) - 08:51, 3 May 2017
  • #redirect [[Security notes / Multi-Factor Authentication]] ...
    58 bytes (5 words) - 17:05, 27 February 2024
  • #redirect [[Security notes / Glossary#Role-Based_Access_Control]] ...
    65 bytes (7 words) - 17:17, 8 February 2022
  • #redirect [[Apache config and .htaccess - security#AllowOverride]] ...
    66 bytes (8 words) - 16:41, 26 March 2015
  • #redirect [[Apache config and .htaccess - security#.htpasswd_.2F_.htdigest]] ...
    76 bytes (10 words) - 21:13, 11 April 2022
  • #redirect [[Security notes / Identification, authentication, authorization#Yubikey]] ...
    84 bytes (7 words) - 16:21, 17 February 2024
  • #redirect [[Security notes / Identification, authentication, authorization#Yubikey]] ...
    84 bytes (7 words) - 16:21, 17 February 2024
  • #redirect [[Security notes / some flaw/exploit notes#CSRF:_Cross_Site_Request_Forgery]] ...
    87 bytes (12 words) - 15:54, 20 January 2024
  • #redirect [[Linux admin notes - security enhanced linux]] ...
    57 bytes (8 words) - 15:50, 1 May 2012
  • #redirect [[Security notes / Message signing notes]] ...
    52 bytes (6 words) - 13:27, 1 March 2022
  • #redirect [[Security notes / Hashing notes#Some_notes_on_CRC]] ...
    62 bytes (9 words) - 17:13, 1 December 2021
  • #REDIRECT [[Security notes / some flaw/exploit notes]] ...
    54 bytes (7 words) - 14:31, 11 January 2024
  • #redirect [[Security notes / Hashing notes#Checksum_files]] ...
    59 bytes (7 words) - 11:46, 13 May 2022
  • #redirect [[Security notes / Message signing notes]] ...
    52 bytes (6 words) - 13:26, 1 March 2022
  • #redirect [[Security notes / Message signing notes]] ...
    52 bytes (6 words) - 13:26, 1 March 2022
  • In security, [[Security_notes_/_Glossary#Discretionary_Access_Control_.28model.29|Discr ...
    217 bytes (25 words) - 12:33, 10 July 2023
  • #redirect [[Security notes / Hashing notes]] ...
    44 bytes (5 words) - 17:12, 1 December 2021
  • #redirect [[Security notes / Hashing notes]] ...
    44 bytes (5 words) - 17:13, 1 December 2021
  • #redirect [[Security notes / Hashing notes]] ...
    44 bytes (5 words) - 17:13, 1 December 2021
  • #REDIRECT [[Security notes / Hashing notes]] ...
    44 bytes (5 words) - 19:05, 29 November 2021
  • Since a relatively recent windows security update, CHM files cannot be opened across a network {{comment|(on UNC path ...r trust your entire LAN, you can tell each computer to disable the related security measures{{verify}}. ...
    958 bytes (150 words) - 12:11, 9 October 2023
  • In linux, we do not. It's considered a potential security issue. ...
    212 bytes (35 words) - 11:33, 12 January 2023
  • ...&#xB7; [[Debugging]] &#xB7; [[Linux admin notes - security enhanced linux|security enhanced linux]] &#xB7; [[PAM notes]] &#xB7; [[Linux admin notes - healt ...
    1 KB (204 words) - 16:00, 21 January 2024
  • 85 bytes (12 words) - 14:32, 31 October 2012
  • Kernel capabilities are an implementation of POSIX capability-based security (see 1003.1e). ...S's package manager installed it, and you can trust them to have done some security checks. ...
    1 KB (233 words) - 15:41, 27 January 2024
  • ===Security=== When you want to expose gnuplot to, say, the web, there are two security issues: ...
    3 KB (394 words) - 11:45, 17 October 2023
  • Zero trust security is a design principle, a way of thinking about access between systems, and which somehow seem much easier to mess up security-wise than localized networks. ...
    5 KB (756 words) - 13:46, 19 February 2024
  • ...s|MPMs]] &#xB7; config/.htaccess: [[Apache config and .htaccess - security|security]] &#xB7; [[Apache config and .htaccess - logging|logging]] &#xB7; [[Apache ...
    2 KB (241 words) - 12:45, 9 January 2024
  • ===Security=== "As we all know, the S in IoT stands for Security." ...
    4 KB (701 words) - 13:06, 12 March 2024
  • ===Security truisms=== * security is only as good as its weakest link. ...
    10 KB (1,549 words) - 12:02, 2 January 2023
  • '''Session fixation''' - security explit where you can somehow find, or set, a session identifier. ...
    944 bytes (141 words) - 16:29, 18 August 2022
  • ===security notes=== ...but keep in mind that if the security flag mentioned above applies, it means access() calls for ''everything''. ...
    3 KB (533 words) - 22:42, 12 May 2022
  • ...a (configurable and removable) component called Internet Explorer Enhanced Security Configuration. I don' t Go to Control Panel &rarr; Internet Options &rarr; Security (tab) ...
    2 KB (312 words) - 14:37, 4 September 2012
  • * Chrome will refuse to run as root, for security reasons ...
    918 bytes (123 words) - 19:55, 9 December 2023
  • :: and maybe security identity" ...ental units of deployment, version control, reuse, activation scoping, and security permissions"[[https://learn.microsoft.com/en-us/dotnet/standard/assembly]) ...
    3 KB (448 words) - 11:58, 13 November 2023
  • Security nerds can get very technical about Yes, in the sense that it is the most fragile part of your personal security. ...
    6 KB (1,049 words) - 12:01, 28 March 2024
  • but that isn't great security when the client is a host with multiple users. '''Security upsides and downsides''' ...
    3 KB (500 words) - 00:35, 30 January 2022
  • * chroot is '''not a security tool''' against those with ill will ...said, there are some variations/extensions of the chroot idea that ''are'' security-oriented. ...
    5 KB (860 words) - 15:12, 11 September 2023
  • In security context, a nonce is something that is exchanged and used once (...as part o There are two security related things called NaCl - which are completely unrelated to each other. ...
    9 KB (1,433 words) - 12:20, 9 March 2024
  • ...any networked situations, handling local logon{{verify}} and various other security/authentication details, such as SSL connections {{verify}}. ...
    3 KB (558 words) - 11:52, 19 September 2023
  • ...henticate" which is vague about what it is, and how good it is in terms of security. but they can have very different security implications, ...
    4 KB (624 words) - 17:32, 27 February 2024
  • The Turing completeness may (or may not) matter to ''security'' with people transpiling what they want. ...
    2 KB (327 words) - 19:43, 25 April 2022
  • The cryptographic basis looks good (though as with any security detail, maybe don't trust the fate of the world on early implementations, u https://security.stackexchange.com/questions/150034/zero-knowledge-password-proof-why-is-has ...
    5 KB (741 words) - 11:46, 14 November 2023
  • ...could patch it in our derived version as soon as possible, but unless it's security-critical, ...
    2 KB (293 words) - 13:50, 6 March 2022
  • it's probably worse for security (patching each app is now more up to the application developer), * installing snap inside docker is somewhat awkward (and perhaps not ideal security-wise) ...
    4 KB (705 words) - 14:39, 26 March 2024
  • but it's a bit of security-by-obscurity, isn't the most effective, or very common. ...
    2 KB (301 words) - 15:20, 9 February 2022
  • : as restrictive as this domain's admins like it to be for security / functionality Security IDentifiers (SIDs) identify users, groups, accounts, and also domains thems ...
    10 KB (1,604 words) - 17:33, 23 January 2024
  • ...ey are different purposes, and have practicalities different enough in the security and privacy implications, and how to use them well for those purposes. For a practical view, see [[Security notes - security for the everyday person]] ...
    15 KB (2,492 words) - 12:17, 9 March 2024
  • * also there is potentially some hardware / syscalls that security says only admins are allowed to do, in which case the experiment would not ...
    2 KB (393 words) - 12:27, 19 September 2023
  • The second or two of pause and the animated checkmark seem to primarily be [[security theater]], ...
    2 KB (392 words) - 23:56, 22 March 2024
  • : this only really matters when security or gambling are involved ...
    2 KB (325 words) - 16:13, 18 September 2017
  • * pam_access - logdaemon style login access control, via <tt>/etc/security/access.conf</tt> * pam_limits - limit resources, according to <tt>/etc/security/limits.conf</tt> ...
    13 KB (2,153 words) - 22:43, 4 May 2022
  • * security - try not leaking all your code ...
    2 KB (430 words) - 15:02, 23 March 2024
  • * some processes have their own logic that change security. ...icted user and some processes may be run in a chroot jail but all of these security methods are discretionary. ...
    10 KB (1,736 words) - 14:05, 4 February 2024
  • It's a hardware module that assists a few security needs https://docs.microsoft.com/en-us/windows/security/information-protection/tpm/how-windows-uses-the-tpm ...
    21 KB (3,508 words) - 19:33, 22 March 2024
  • Up to your sense of security. ...
    3 KB (445 words) - 18:48, 26 March 2024
  • ======Security notes====== '''Host security''' ...
    14 KB (2,111 words) - 15:43, 2 January 2024
  • ===Extracting things from security logs=== ...
    10 KB (1,582 words) - 12:41, 6 December 2023
  • * lsass.exe (local security, login. Perhaps see [[lsass.exe taking all cpu]]) * dpmw32.exe (print, security) ...
    9 KB (1,367 words) - 11:30, 28 September 2023
  • If you really want to tie down security, there are many things to think about ...he easiest solution, because it requires minimal additional setup, and the security implications are fairly easily understood. ...
    14 KB (2,229 words) - 00:09, 1 August 2022
  • Security features might e.g. isolate each device that attaches to the network But we did. So, security feature makes thing not work. ...
    11 KB (1,881 words) - 14:43, 26 February 2024
  • The disk is still fully accessible, if you care about strong security you should ''assume'' it's still readable, which are good at live security for CPU-cheap. ...
    27 KB (4,718 words) - 10:50, 28 February 2024
  • ...ed_keys|Restricting what command can be run on my server]] so that's not a security issue ===Syntax and some security notes=== ...
    25 KB (4,140 words) - 12:20, 20 November 2023
  • ...at on the internet we often... sort of ignore at our own peril. See [[LARP security]]), ...
    4 KB (558 words) - 10:28, 4 March 2024
  • * '''Trusted Computing''' - refers to hardware-assisted security present in newer computers Sometimes sort of imitates security agency / military style, and can be modeled off it if you want. ...
    31 KB (5,085 words) - 15:37, 26 March 2024
  • but these have all died, for various reasons, not least of them security concerns. ...
    4 KB (569 words) - 12:59, 7 October 2023
  • You should assume that digests like this have no security value, particularly when sent over the same channel, : stealing this still steals the session (ans forever - no forward security) - but does not reveal anything beyond the username ...
    16 KB (2,655 words) - 15:51, 18 March 2024
  • ** adds security to v2 (and little else?) ...
    4 KB (568 words) - 11:53, 16 July 2020
  • Sending these parameters instead of speech was initially also security ([[security by obscurity|by obscurity]])-->. ...ed a relatively poor voice, but this was seen as a feature when applied to security - it took out much of what made a voice identifiable, while still transmitt ...
    14 KB (2,190 words) - 14:57, 24 October 2023
  • If anything, it loosens security. ...>Origin</tt> {{comment|(you can't even touch it via scripting, for obvious security reasons)}} ...
    31 KB (4,955 words) - 14:20, 14 February 2024
  • Perhaps more interesting to security. ...
    5 KB (771 words) - 12:07, 20 February 2024
  • ...ode are also secure, then securing the network connection does nothing for security. (Same goes for the server, but that's one central place under admin contro ...
    6 KB (981 words) - 11:32, 9 July 2023
  • ...which case you may also want {{inlinecode|-b 4096}}) is only one, [http://security.stackexchange.com/questions/5096/rsa-vs-dsa-for-ssh-authentication-keys thi ...seless keys on multi-user systems''' if you don't fully trust the system's security, or administration. ...
    19 KB (3,171 words) - 12:53, 6 December 2023
  • Security: user auth, POSIX-style permissions Security: ...
    22 KB (3,356 words) - 12:02, 12 July 2023
  • :::: banknotes often have security features to check ...
    6 KB (935 words) - 23:18, 7 January 2024
  • ...ot change who can interact with this information - unless people made the security mistake of allowing ''anyone'' to add code to their page. * can be a security risk. Consider e.g. the case where app2.example.org is hosted hosted by som ...
    35 KB (5,834 words) - 15:36, 18 March 2024
  • ...things remotely, you ''can'' trust whatever happens on a LAN but it's bad security practice. ...sing SSH server) || Good (draw commands, small lag for encryption) || Security (auth and encryption) is already handled.<br/>Some SSH servers disable X by ...
    48 KB (7,827 words) - 12:01, 28 November 2023
  • * IPSec+ESP (Encapsulating Security Payloads) [http://en.wikipedia.org/wiki/Encapsulating_Security_Payload#Enca ** IPSec+SA (Security Association) [http://en.wikipedia.org/wiki/Security_association] ...
    27 KB (4,205 words) - 00:06, 26 December 2023
  • If it's an effective-user thing ''only'', e.g. for security reasons, This is intentional, good for security, and to avoid a mess. ...
    19 KB (2,877 words) - 23:41, 23 February 2024
  • ...system that magically makes everything good. None. Largely because decent security is inconvenient, so both people and systems compromise. ...ut don't, then you are fooling yourself. This is what we might call [[LARP security]]. ...
    54 KB (8,968 words) - 16:20, 23 January 2024
  • ...more security, the thoroughness you forget will give you a false sense of security : which can give a false sense of security ...
    35 KB (5,871 words) - 16:58, 3 March 2024
  • It's not a tool for security, it's purely to automate an interactive login automated that wouldn't work '''assume sshpass is bad security''' on the host you're running it ...
    37 KB (5,779 words) - 13:45, 22 December 2023
  • ====Security==== * https://jupyter-notebook.readthedocs.io/en/stable/security.html ...
    26 KB (4,001 words) - 18:32, 27 November 2023
  • : (it's also good for security, which is often part of the point) such as having full rights to trample over each other (meaning stability and security is impossible to guarantee), ...
    44 KB (7,257 words) - 18:06, 5 March 2024
  • This is useful e.g. when you serve from both, and want to avoid mixed-content security warnings, ...
    7 KB (1,185 words) - 14:00, 16 January 2024
  • ** to apply per-app or per-process security policies - and separate them ...
    9 KB (1,435 words) - 19:35, 23 June 2023
  • * 0010: Version 2: DCE Security version (with embedded POSIX UIDs) ...
    9 KB (1,388 words) - 23:41, 31 July 2022
  • 31 bytes (5 words) - 14:48, 11 September 2012
  • There are practical details and security issues to both. ...
    8 KB (1,301 words) - 16:06, 19 September 2023
  • =====other security===== ...
    26 KB (4,153 words) - 15:20, 11 September 2023
  • ...many distinct uses for hashing, many of which not particularly related to security, This is obviously a ''bad'' idea to longer-term security, because if someone gets (local or remote) access to the computer that stor ...
    50 KB (7,774 words) - 17:47, 27 February 2024
  • (assumption is use on home LAN. For security stuff, learn it properly) ==Security-related== ...
    28 KB (4,195 words) - 10:47, 16 February 2024
  • One of the larger ones is that it was never designed for strict security. ...have a responsibilities be clear, e.g. relating to input (which was also a security issue). ...
    37 KB (5,893 words) - 18:07, 5 March 2024
  • =On Samba security= ==security models (security=share, user, and such)== ...
    78 KB (12,562 words) - 14:54, 11 September 2023
  • : WFP is a convenience feature, not a security feature. Once a program is allowed to write to the windows directory, it ca ...m different versions of non-hotfix updates (General Distribution Releases: security update, critical update, update, update rollup, driver, or feature pack). T ...
    22 KB (3,542 words) - 12:02, 12 March 2024
  • {{comment|(In accordance with general security rules, you may want to be relatively vague in your login failure errors. Fo ...
    9 KB (1,485 words) - 10:38, 3 April 2023
  • ** adds optional security, manufacturer-specific functionality Programming mode is due to one of various security levels and their conditions - basic alterations may require a password, som ...
    24 KB (3,906 words) - 16:50, 27 February 2024
  • It's a security and maintenance subscription, that goes a little beyond LTS, offering a few more security updates. ...
    31 KB (4,599 words) - 13:52, 6 March 2024
  • The above is for bother and security. '''If you care about crawler reaction you probably want to use ...tual login, you could redirect back to HTTP {{comment|(note that there are security gotchas to the latter)}}. ...
    24 KB (3,766 words) - 11:48, 10 July 2023
  • ...ervices, and OSes ''may'' deny user programs to listen to these ports, for security reasons {{comment|(e.g. making it a little harder to replace common service http://www.linuxhowtos.org/Security/iptables.htm ...
    32 KB (5,000 words) - 21:23, 1 February 2024
  • * user mode +x will make the server obfuscate your hostname -- for security reasons. (bans will often still work fine) ...
    12 KB (1,945 words) - 16:10, 14 July 2023
  • : can only be set ''by'' root / through sudo (for obvious security reasons) and if it's about high security then SELinux's MAC style is stronger than this DAC style. ...
    66 KB (10,737 words) - 16:50, 11 September 2023
  • ...generated DOM in a more isolated way (isolated in terms of structure, not security) : not a security feature, as some assume ...
    62 KB (9,591 words) - 16:53, 11 September 2023
  • * some security-aware things like '''[[sudo]]''' and '''[[cron]]''' ''specifically avoid'' : have system environment stripped for security reasons {{verify}} ...
    40 KB (6,118 words) - 12:21, 15 March 2024
  • ...independent, and not trample on other things {{comment|(and ''in theory'' security concerns but there are some footnotes)}}. ...efore Linux, though in that case for reasons of operational efficiency and security, whereas docker seems more focused at deploying [[microservice]] style thin ...
    91 KB (14,563 words) - 15:32, 21 February 2024
  • ...enabled/*.conf&nbsp;</tt> {{comment|(config files for general stuff like security, charset)}} ** mostly a separation of some common shared setup (security, charset, and such) ...
    25 KB (3,916 words) - 09:39, 7 October 2023
  • : does not use any features that are potential security features ...
    12 KB (1,771 words) - 16:29, 17 February 2024
  • ...o/guide/en/elasticsearch/reference/current/security-settings.html advanced security]" (meaning? TLS for whatever connects directly to the service?) xpack.security.enabled (in elasticsearch.yml) ...
    74 KB (11,202 words) - 17:13, 19 March 2024
  • Security implications vary along. ...tring of this and that' is assistance and/or normalization - and ''not'' a security feature until you can prove that it is. ...
    25 KB (4,259 words) - 12:16, 16 January 2024
  • * better security (how?) ** has some security implications when you also use no_root_squash {{verify}} ...
    24 KB (3,735 words) - 19:33, 11 April 2022
  • ...out standardizing exactly what happens immediately after a TRIM, there are security issues and even data corruption issues. Should it return the data there? (security issue?) ...
    28 KB (4,723 words) - 13:26, 16 August 2023
  • ...dboxing isn't perfect, so it's more about resources and convenience than a security feature. {{comment|(For example, environment is shared, things can affect e ...in this context means Thread Local Storage {{comment|(not Transport Layer Security)}}. ...
    31 KB (4,966 words) - 11:54, 10 July 2023
  • * [http://www.secviz.org/ SecViz: Security Visualization] ...
    21 KB (2,852 words) - 17:39, 9 May 2022
  • ...an 'we pick a setup, stick with it for a considerable time, and only apply security updates', which makes hardening and support easier and more thereby more ef ** how long you can use this installation more or less as-is, and get security upgrades, and support for it ...
    44 KB (7,142 words) - 16:13, 14 February 2024
  • ...east in non-evil environments (technically, trusting an application is bad security when that executable can be replaced with something bad). ...
    14 KB (2,197 words) - 16:10, 14 July 2023
  • ::: can be disabled (e.g. for security), e.g. -s parameter avoids adding the user site directory to sys.path (and ...stly metadata in the end) on top -- as well as aribtrary code execution, a security issue. ...
    45 KB (6,973 words) - 14:05, 5 March 2024
  • * {{comment|(for stability/security reasons we want to protect the kernel from accesses, so)}} there is a kerne ...
    13 KB (2,234 words) - 12:59, 12 October 2023
  • ==Security== ...requiring strong security but excluding some devices, and allowing weaker security. ...
    95 KB (15,819 words) - 10:42, 28 March 2024
  • So the only value is identifying users, '''not security''', '''Security''' ...
    28 KB (4,350 words) - 14:51, 10 March 2024
  • This is both a security issue and potentially a DoS issue. '''On security''' ...
    31 KB (5,036 words) - 13:40, 9 January 2024
  • ...management in general, and more so if you care about process relations and security. ...
    18 KB (2,905 words) - 15:10, 18 May 2023
  • direnv realizes that automatic execution is a security risk. Your security audits may be a little messier with nix in place ...
    49 KB (7,600 words) - 01:52, 24 March 2024
  • * node for for backend, because it's not due to the browser security :: in part because acting like local apps requires escaping browser security ...
    30 KB (4,103 words) - 16:41, 11 September 2023
  • ======Security and sandboxing====== ...
    50 KB (7,487 words) - 17:09, 11 January 2024
  • ...starting as little more "I am tag with this number" - no real protocol, no security. * Access control (often used purely as tokens, i.e. one-factor security) ...
    107 KB (16,860 words) - 19:26, 22 March 2024
  • '''Backports''' - when a feature / bugfix / security fix from the newest, possibly more experimental version, is merged into an ...
    20 KB (3,225 words) - 11:13, 6 March 2023
  • : by design, because the latter is a security risk ...tribution there is usually no meaning to the users, and worst-case it is a security problem due to permission bits. ...
    35 KB (5,638 words) - 14:53, 26 December 2023
  • : meant for integration of that environment - and security between sessions ...equiring TLS -- or ''should'', because per-request login would be terrible security ...
    88 KB (13,765 words) - 22:36, 23 February 2024
  • ===Basic useful state: SIM stuff and security=== ...
    57 KB (9,256 words) - 14:22, 2 August 2023
  • ...e limit that feels like it's from the nineties, or just prefer the control/security/trust of hosting it yourself. ...
    19 KB (3,026 words) - 11:12, 30 January 2024
  • do the required security hoop-jumpery, Some files are owned by other users, e.g. root, which is ''potentially'' security-relevant. ...
    82 KB (13,594 words) - 17:00, 21 March 2024
  • * may provides security and sessions by SSL and SSH ...
    23 KB (3,754 words) - 16:18, 6 November 2023
  • ...won't necessarily work, and unless you use one of the other features (e.g. security) you may forego start-stop-daemon. ...
    25 KB (3,811 words) - 13:33, 24 November 2023
  • Has had some security issues. and there have been several security exploits of the API using these image files. ...
    45 KB (7,214 words) - 15:56, 28 February 2024
  • Security is mostly the filesystem permissions to that socket file, when you open() i ...ers, etc), it is either untenable or not a good idea (in terms of traffic, security, and more) to have a broadcast domain that is all of the computers. ...
    79 KB (12,552 words) - 20:28, 15 January 2024
  • Start it without any security. '''WARNING:''' At this point people could connect and steal, pillage, plun * MySQL security prevents you from connecting ...
    47 KB (7,644 words) - 14:55, 26 February 2024
  • One of the causes is that the fetch is against security policy (probably the same-source policy). "Don't these STUN, TURN, and signalling servers imply security issues?" ...
    72 KB (11,063 words) - 14:46, 21 March 2024
  • : part of isolating networks for security reasons, where nothing should route between them in the first place ...nd well to IP subnets (layer 3), because this usually makes management and security sense. ...
    71 KB (11,617 words) - 14:28, 8 November 2023
  • * security features * security model (also for online development) ...
    55 KB (8,019 words) - 17:58, 9 July 2023
  • :: for security reasons, it is '''ignored at runtime''' for executables that have [[setuid] ...
    25 KB (4,016 words) - 16:50, 11 September 2023
  • * security (object) ...
    24 KB (3,659 words) - 16:42, 11 September 2023
  • Because pointer arithmetic done wrong means security/stability problems, other languages do their best to make pointers as abstr ...
    32 KB (5,339 words) - 13:43, 26 June 2022
  • :: helps security a little (but not hard guarantee) ...
    29 KB (4,425 words) - 17:15, 18 March 2024
  • : (though its lack of authentication makes it a security problem in a few cases) ...
    28 KB (4,281 words) - 10:59, 1 February 2024
  • '''Corporate networks''' (or any other that have more security) are more annoying. ...device dedicated to serving media, you may want to disable the web UI for security reasons (it includes a filesystem browser) or learn how to decently lock do ...
    59 KB (9,169 words) - 14:08, 21 December 2023
  • A lot of security cameras are sensitive to NIR, because it means you have a choice of adding ...
    35 KB (5,847 words) - 03:29, 4 February 2024
  • ...es (or not-yet initialized data in new blocks; you may care about this for security reasons), and the metadata won't necessarily tell you this. ...''<tt>noexec</tt>''': allow binaries to run from this partition. ''Not'' a security solution since binaries can be copied, but can be convenient. ...
    90 KB (14,596 words) - 15:47, 21 March 2024
  • ...r you want to have a read/write distinctions, and on whether it meets your security standards ...
    46 KB (7,500 words) - 11:59, 23 March 2024
  • ...L SC''' ('Safety Control') - restricted profile that may be required in in security-critical contexts, such as those in avionics, military, medical, automotive ...
    42 KB (6,789 words) - 19:44, 29 December 2023
  • It's also great for security, ...
    53 KB (8,845 words) - 12:38, 9 March 2024
  • * security: ...
    49 KB (8,030 words) - 15:54, 26 September 2023
  • If you're lazy and don't care for security you can use postgres for everything. You want this only when you understand the security implications, ...
    145 KB (23,191 words) - 16:35, 19 March 2024
  • If you don't do that, RAID can create a false sense of security. ...
    50 KB (8,353 words) - 22:46, 23 February 2024
  • ...here in your filesystem {{comment|(which can be handy if you have anything security-sensitive, such hardcoded database logins in a <tt>config.py</tt>, that you ...
    70 KB (11,151 words) - 15:05, 11 September 2023
  • and dependency management is for people who don't want job security. ...
    59 KB (9,314 words) - 19:39, 27 March 2024
  • ...ening, for one of various possible reasons, including location estimation, security-related applications, home rehabilitation of absent minded people, etc. ...
    78 KB (12,219 words) - 12:20, 5 February 2024
  • ...l (i.e. basic firewalling, or unix-sockets-only), that is usually the only security you need. Source IPs should be enough authentication; if you can't assume t ...
    74 KB (12,217 words) - 14:31, 25 March 2024
  • Full-body security scanners are typically "millimeter wave imaging", which is well below even ...
    81 KB (13,341 words) - 18:45, 26 March 2024
  • * When running sub-programs, especially security-related ones, -- can be a good tool/habit to protect programs against injec ...
    90 KB (13,679 words) - 12:29, 15 March 2024
  • :: e.g. collocation, some security considerations, some of the emoji processing, a compressed encoding ...
    96 KB (15,504 words) - 14:19, 14 March 2024
  • So the only use of having this open source is security reviews. And even then you have to assume. ...
    122 KB (19,889 words) - 13:03, 7 March 2024