Search results

From Helpful
Jump to: navigation, search

Page title matches

  • ...tual login, you could redirect back to HTTP {{comment|(note that there are security gotchas to the latter)}}. The above is for bother and security. '''If you care about crawler reaction you probably want to use
    24 KB (3,704 words) - 13:21, 3 April 2020
  • ...assword reuse. Since you do not really know the quality of any one site's security, you should assume likeliness of a particular site being hacked as likely t : may be a false sense of security
    5 KB (757 words) - 16:44, 7 July 2020
  • ===Security truisms=== * security is only as good as its weakest link.
    15 KB (2,492 words) - 13:46, 8 October 2019
  • ...n.wikipedia.org/wiki/Same-origin_policy '''same-origin policy'''], a basic security model that says that these resources ''must'' come from the same origin. ...>Origin</tt> {{comment|(you can't even touch it via scripting, for obvious security reasons)}}
    18 KB (2,882 words) - 22:21, 11 February 2020
  • ...t is, the thing/person that wants to act, and as such has to deal with the security system. In computer security, what you actually check is "is this login valid",
    35 KB (5,709 words) - 15:40, 8 October 2019
  • If the security center shows antivirus and firewall as disabled, and reports similar errors
    707 B (100 words) - 18:08, 6 January 2014
  • * some processes have their own logic that change security. ...icted user and some processes may be run in a chroot jail but all of these security methods are discretionary.
    10 KB (1,673 words) - 14:46, 8 October 2019
  • Security implications vary along. ...tring of this and that' is assistance and/or normalization - and ''not'' a security feature until you can prove that it is.
    21 KB (3,505 words) - 16:37, 16 October 2019
  • ...system that magically makes everything good. None. Largely because decent security is inconvenient, so both people and systems compromise.--> The public-private key system's additional security is based on the fact that given the public key of someone's (public,private
    4 KB (722 words) - 16:16, 11 February 2017
  • * '''Trusted Computing''' - refers to hardware-assisted security present in newer computers Sometimes sort of imitates security agency / military style, and can be modeled off it if you want.
    6 KB (950 words) - 13:47, 30 May 2020

Page text matches

  • : OSes ''may'' deny user programs to listen to these ports, for security reasons {{comment|(e.g. arbitrary programs hosting common services to assis http://www.linuxhowtos.org/Security/iptables.htm
    40 KB (6,227 words) - 13:23, 16 July 2019
  • * some security-aware things like [[sudo]] and [[cron]] specifically avoid sourcing any of : have system environment stripped for security reasons {{verify}}
    39 KB (6,049 words) - 12:47, 28 May 2020
  • #redirect [[Apache config and .htaccess - security#AllowOverride]]
    66 B (8 words) - 17:41, 26 March 2015
  • ...sing SSH server) || Good (draw commands, small lag for encryption) || Security (auth and encryption) is already handled. Some SSH servers disable X by def ...as to support doing this, and it has to be enabled. It may be disabled for security/leanness reasons. If so, change your sshd config . Note that filenames tend
    19 KB (3,022 words) - 14:25, 26 July 2020
  • Start it without any security. '''WARNING:''' At this point people could connect and steal, pillage, plun * MySQL security prevents you from connecting
    46 KB (7,626 words) - 13:57, 26 February 2018
  • If you're lazy and don't care for security you can use postgres for everything. You want this only when you understand the security implications,
    129 KB (20,712 words) - 13:39, 14 May 2020
  • ...tual login, you could redirect back to HTTP {{comment|(note that there are security gotchas to the latter)}}. The above is for bother and security. '''If you care about crawler reaction you probably want to use
    24 KB (3,704 words) - 13:21, 3 April 2020
  • 31 B (5 words) - 15:48, 11 September 2012
  • : can only be set ''by'' root / through sudo (for obvious security reasons) and if it's about high security then SELinux's MAC style is stronger than this DAC style.
    64 KB (10,427 words) - 15:03, 9 July 2020
  • ...enabled/*.conf&nbsp;</tt> {{comment|(config files for general stuff like security, charset)}} ** mostly a separation of some common shared setup (security, charset, and such)
    19 KB (2,935 words) - 13:21, 3 April 2020
  • ...l (i.e. basic firewalling, or unix-sockets-only), that is usually the only security you need. Source IPs should be enough authentication; if you can't assume t
    66 KB (10,865 words) - 15:34, 5 December 2019
  • It's also great for security in that you can't just read all memory contents. * {{comment|(for stability/security reasons we want to protect the kernel from accesses, so)}} there is a kerne
    95 KB (15,843 words) - 11:17, 5 August 2020
  • ...here in your filesystem {{comment|(which can be handy if you have anything security-sensitive, such hardcoded database logins in a <tt>config.py</tt>, that you
    69 KB (11,148 words) - 13:34, 12 March 2013
  • * may provides security and sessions by SSL and SSH ...nd well to IP subnets (layer 3), because this usually makes management and security sense.
    71 KB (11,538 words) - 17:53, 27 November 2019
  • Security is mostly the filesystem permissions to that socket file. It allows flexibility in management, helps security a bit, assists traffic monitoring/limiting, lets you limit the scope of bro
    59 KB (9,327 words) - 18:13, 16 December 2019
  • {{comment|(In accordance with general security rules, you may want to be relatively vague in your login failure errors. Fo
    9 KB (1,447 words) - 17:18, 10 May 2016
  • : for security reasons, it is '''ignored at runtime''' for executables that have [[setuid]
    24 KB (3,974 words) - 17:56, 11 November 2019
  • * node for for backend, because it's not due to the browser security
    26 KB (3,485 words) - 00:23, 27 June 2020
  • If it's an effective-user thing ''only'', e.g. for security reasons,
    8 KB (1,180 words) - 17:33, 17 April 2019
  • * security (object)
    24 KB (3,660 words) - 14:40, 18 June 2012
  • * [http://www.microsoft.com/en-us/security_essentials/default.aspx Microsoft Security Essentials] http://www.techsupportalert.com/content/probably-best-free-security-list-world.htm
    7 KB (1,028 words) - 15:50, 1 October 2016
  • Security implications: https://devcenter.heroku.com/articles/websocket-security
    19 KB (2,978 words) - 01:13, 21 June 2020
  • #redirect [[Security notes / Glossary#Least privilege]]
    55 B (6 words) - 14:20, 8 October 2019
  • =On Samba security= ==security models (security=share, user, and such)==
    78 KB (12,506 words) - 11:16, 20 June 2020
  • * [http://www.secviz.org/ SecViz: Security Visualization]
    21 KB (2,859 words) - 16:42, 1 November 2016
  • =====Security notes===== '''Host security'''
    44 KB (6,868 words) - 14:57, 3 August 2020
  • When running sub-programs, especially security-related ones, -- can be a good tool/habit to protect programs against injec
    4 KB (672 words) - 16:55, 27 November 2019
  • It was never designed as a security feature, so it ''isn't'' a security feature. BSD jails actually ''did'' have some security in mind.
    24 KB (3,896 words) - 14:47, 28 July 2020
  • ==Security-related==
    11 KB (1,615 words) - 16:03, 3 March 2020
  • ...security in the authentication part; not the best option if you care about security * IPSec+ESP (Encapsulating Security Payloads) [http://en.wikipedia.org/wiki/Encapsulating_Security_Payload#Enca
    27 KB (4,178 words) - 22:35, 27 March 2020
  • ...assword reuse. Since you do not really know the quality of any one site's security, you should assume likeliness of a particular site being hacked as likely t : may be a false sense of security
    5 KB (757 words) - 16:44, 7 July 2020
  • #REDIRECT [[Security notes / Identification, authentication, authorization]]
    76 B (6 words) - 09:51, 3 May 2017
  • ===Security truisms=== * security is only as good as its weakest link.
    15 KB (2,492 words) - 13:46, 8 October 2019
  • ...n.wikipedia.org/wiki/Same-origin_policy '''same-origin policy'''], a basic security model that says that these resources ''must'' come from the same origin. ...>Origin</tt> {{comment|(you can't even touch it via scripting, for obvious security reasons)}}
    18 KB (2,882 words) - 22:21, 11 February 2020
  • This is a ''bad'' idea to longer-term security, because if someone got access to the computer they could simply read off a When implementing security like this, there is a checklist of things frequently done wrong, that you c
    36 KB (5,852 words) - 17:50, 16 June 2020
  • ...ening, for one of various possible reasons, including location estimation, security-related applications, home rehabilitation of absent minded people, etc.
    75 KB (11,705 words) - 15:03, 12 July 2020
  • do the required security hoop-jumpery,
    18 KB (2,871 words) - 15:41, 14 November 2019
  • : WFP is a convenience feature, not a security feature. Once a program is allowed to write to the windows directory, it ca ...m different versions of non-hotfix updates (General Distribution Releases: security update, critical update, update, update rollup, driver, or feature pack). T
    48 KB (7,785 words) - 13:59, 30 April 2019
  • One of the larger ones is that it was never designed for strict security. ...have a responsibilities be clear, e.g. relating to input (which was also a security issue).
    33 KB (5,265 words) - 01:44, 20 January 2020
  • ...op working when the server's screen is locked (though that can be called a security feature too).
    7 KB (1,085 words) - 01:07, 30 September 2010
  • ** to apply per-app or per-process security policies - and separate them
    8 KB (1,360 words) - 15:06, 10 May 2012
  • ...won't necessarily work, and unless you use one of the other features (e.g. security) you may forego start-stop-daemon.
    24 KB (3,705 words) - 15:49, 4 June 2020
  • #redirect [[Apache config and .htaccess - security#.htpasswd]]
    62 B (8 words) - 01:38, 21 June 2010
  • ESS - Embedded Security Subsystem (IBM product), basically a chip supporting public keys systems. S Generally, the idea of trusted computing is building security from the ground up, starting at a hardware module.
    8 KB (1,309 words) - 01:33, 21 September 2019
  • '''Corporate networks''' (or any other that have more security) are more annoying. ...device dedicated to serving media, you may want to disable the web UI for security reasons (it includes a filesystem browser) or learn how to decently lock do
    54 KB (8,306 words) - 21:14, 9 February 2020
  • plus it puts all security on a central resource always being available and trustable. ...ting is a problem (which makes sense in that shared hosting is a potential security liability ''anyway'')
    27 KB (4,487 words) - 13:04, 31 July 2020
  • : (though its lack of authentication makes it a security problem in a few cases)
    19 KB (2,985 words) - 12:21, 2 June 2020
  • ...a (configurable and removable) component called Internet Explorer Enhanced Security Configuration. I don' t Go to Control Panel &rarr; Internet Options &rarr; Security (tab)
    2 KB (312 words) - 15:37, 4 September 2012
  • HttpOnly was only ever meant as a useful mitigation, never as a solid security solution. ==Cookies and security==
    16 KB (2,614 words) - 18:18, 7 January 2019
  • * the security model is almost inherently flawed, including the fact that every widely use ** Like various overzealous security systems, all the risks of failure are yours. One implication is that the va
    6 KB (934 words) - 17:05, 28 January 2011
  • For the same reason, there have been security exploits of the API using these image files.
    33 KB (5,189 words) - 17:50, 9 July 2020
  • * security:
    46 KB (7,422 words) - 21:24, 6 February 2020
  • '''Security''':
    7 KB (1,251 words) - 17:54, 2 June 2017
  • ...t is, the thing/person that wants to act, and as such has to deal with the security system. In computer security, what you actually check is "is this login valid",
    35 KB (5,709 words) - 15:40, 8 October 2019
  • ...s hosts, there is usually no meaning/point to this, and worst-case it is a security problem due to permission bits.
    28 KB (4,521 words) - 02:04, 1 August 2020
  • ...HTTPS notes|SSL or TLS]], so its only real value is identifying users, not security.
    18 KB (2,861 words) - 16:24, 21 July 2020
  • ...rotocol that clients can use fairly directly (and may integrate user auth, security, and all that). Think NFS, CIFS/SMB. ...requires an easy way to control that, and the ability to isolate parts for security.
    119 KB (19,369 words) - 12:56, 9 July 2020
  • ...JSP) via their preset interfaces. (Usually adding multithreading, possibly security, and such)
    7 KB (1,201 words) - 15:26, 4 December 2018
  • If the security center shows antivirus and firewall as disabled, and reports similar errors
    707 B (100 words) - 18:08, 6 January 2014
  • (assumption is use on home LAN. For security stuff, learn it properly)
    2 KB (356 words) - 15:22, 5 April 2015
  • * 0010: Version 2: DCE Security version (with embedded POSIX UIDs)
    8 KB (1,336 words) - 13:54, 7 March 2020
  • * chroot is '''not a security tool''' against those with ill will, yet certainly better than nothing agai ...said, there are some variations/extensions of the chroot idea that ''are'' security-oriented.
    5 KB (892 words) - 14:20, 1 November 2018
  • Since a relatively recent windows security update, CHM files cannot be opened across a network (on UNC path or mapped ...r trust your entire LAN, you can tell each computer to disable the related security measures{{verify}}.
    925 B (145 words) - 14:08, 25 September 2010
  • * ...so it's false security Used in security reviews, but also in some extended tests for robustness.
    11 KB (1,730 words) - 00:52, 27 June 2020
  • ** adds optional security, manufacturer-specific functionality Programming mode is due to one of various security levels and their conditions - basic alterations may require a password, som
    23 KB (3,694 words) - 13:39, 11 June 2020
  • ...this before Linux, though there for reasons of operational efficiency and security, whereas docker focuses more on the microservice angle. : also, it takes some relearning on how to do a lot of security things (e.g. least-privilege access) and admin things (e.g. restorable back
    74 KB (11,740 words) - 14:53, 3 August 2020
  • One of the causes is that the fetch is against security policy (probably the same-source policy).
    3 KB (437 words) - 16:30, 25 June 2018
  • ===Basic useful state: SIM stuff and security===
    57 KB (9,202 words) - 00:49, 2 February 2020
  • [[Category:Security and privacy]]
    671 B (117 words) - 14:47, 9 February 2011
  • * pam_access - logdaemon style login access control, via <tt>/etc/security/access.conf</tt> * pam_limits - limit resources, according to <tt>/etc/security/limits.conf</tt>
    12 KB (2,009 words) - 14:13, 8 October 2019
  • =====other security=====
    24 KB (3,897 words) - 15:10, 8 July 2020
  • ** adds security to v2 (and little else?)
    4 KB (568 words) - 12:53, 16 July 2020
  • * Access control (often used purely as tokens, i.e. one-factor security) Security or privacy was never really a design goal.
    26 KB (4,129 words) - 23:47, 27 February 2020
  • ...an 'we pick a setup, stick with it for a considerable time, and only apply security updates', which makes hardening and support easier and more thereby more ef ** how long you can use this installation more or less as-is, and get security upgrades, and support for it
    41 KB (6,638 words) - 15:21, 21 March 2018
  • #redirect [[Linux admin notes - security enhanced linux]]
    57 B (8 words) - 16:50, 1 May 2012
  • * some processes have their own logic that change security. ...icted user and some processes may be run in a chroot jail but all of these security methods are discretionary.
    10 KB (1,673 words) - 14:46, 8 October 2019
  • * Security software (overzealous firewall filter) blocking secunia
    408 B (57 words) - 17:53, 4 September 2012
  • * security Security
    50 KB (7,709 words) - 10:43, 29 July 2020
  • ==Security== In public networks you have a choice in either favouring strong security, or excluding the fewest devices.
    70 KB (11,585 words) - 18:25, 25 March 2020
  • 85 B (12 words) - 15:32, 31 October 2012
  • ...stack profile 2) adds multi-casting, many-to-one routing and has some more security options. {{verify}} ** It seems you can mostly mix Pro with non-Pro (unless you use Pro's high security mode) {{verify}}
    23 KB (3,556 words) - 00:14, 22 May 2019
  • This sandboxing isn't perfect {{comment|(so more of a convenience than a security feature)}}. For example, things can affect each other via IO, and extension ...in this context means Thread Local Storage {{comment|(not Transport Layer Security)}}.
    27 KB (4,348 words) - 21:00, 19 June 2020
  • * security model (also for online development)
    29 KB (4,354 words) - 15:48, 27 June 2020
  • ...L SC''' ('Safety Control') - restricted profile that may be required in in security-critical contexts, such as those in avionics, military, medical, automotive
    39 KB (6,296 words) - 07:15, 26 July 2020
  • Because pointer arithmetic done wrong means security/stability problems, other languages do their best to make pointers as abstr
    27 KB (4,516 words) - 19:39, 19 May 2020
  • * better security (how?) ** has some security implications when you also use no_root_squash {{verify}}
    24 KB (3,732 words) - 16:58, 12 December 2016
  • ===Security=== When you want to expose gnuplot to, say, the web, there are two security issues: The ability to read from files, and the ability to pipe from given
    3 KB (411 words) - 13:28, 12 July 2017
  • ===Security=== ...ault, VNC is not encrypted. Some flavours support it, but for more general security you may wish to look at [[ssh tunneling]] or the [http://www.winton.org.uk/
    21 KB (3,361 words) - 17:30, 19 June 2020
  • ...es (or not-yet initialized data in new blocks; you may care about this for security reasons), and the metadata won't necessarily tell you this. There are practical details and security issues to both.
    91 KB (14,837 words) - 20:09, 6 February 2020
  • * if you'll be using -R style tunnels (and this is a security consideration, read http://www.snailbook.com/faq/gatewayports.auto.html ...ng, and do so with an unsniffable encryped connection so you don't open up security problems caused by insecure protocols.
    22 KB (3,693 words) - 12:52, 7 August 2019
  • #ssh-keygen -t rsa -b 4096 -f my_new_identity # if you care about more security ...e you may also want {{inlinecode|-b 4096}}) is only one, see e.g. [http://security.stackexchange.com/questions/5096/rsa-vs-dsa-for-ssh-authentication-keys thi
    17 KB (2,826 words) - 15:21, 20 May 2019
  • ...ption takes CPU, and most encryption is single-threaded for simplicity and security. ...that when using ssh for interoperable convenience more than for strongest security, you can just use a simpler, faster cipher for a particular connection.
    31 KB (4,850 words) - 11:40, 18 July 2020
  • If you really want to tie down security, there are many things to think about ...he easiest solution, because it requires minimal additional setup, and the security implications are fairly easily understood.
    14 KB (2,201 words) - 23:36, 22 March 2019
  • * user mode +x will make the server obfuscate your hostname -- for security reasons. (bans will often still work fine)
    12 KB (1,943 words) - 02:34, 5 July 2018
  • ...ne-readable captchas. They don't work, leaving you with a net effect of no security, but more more bother to your users.
    5 KB (854 words) - 16:59, 3 December 2013
  • Security: user auth, POSIX-style permissions Security:
    20 KB (2,967 words) - 17:40, 9 October 2019
  • ...east in non-evil environments (technically, trusting an application is bad security when that executable can be replaced with something bad).
    12 KB (2,006 words) - 14:52, 19 April 2018
  • It will typically log to your security log (auth.log or such). * edit <tt>/etc/security/pam_mount.conf.xml</tt> to uncomment
    885 B (157 words) - 16:36, 1 October 2014
  • * "national security" became its own concept after repeated use (by official bodies) that basica
    15 KB (2,354 words) - 11:50, 7 October 2017
  • * lsass.exe (local security, login. Perhaps see [[lsass.exe taking all cpu]]) * dpmw32.exe (print, security)
    8 KB (1,113 words) - 14:30, 18 April 2017
  • ===security notes=== ...in mind that indexed permissions can be a day behind, so if you want more security (at the cost of more IO on every locate),
    3 KB (501 words) - 17:45, 13 November 2017
  • Security implications vary along. ...tring of this and that' is assistance and/or normalization - and ''not'' a security feature until you can prove that it is.
    21 KB (3,505 words) - 16:37, 16 October 2019
  • ...system that magically makes everything good. None. Largely because decent security is inconvenient, so both people and systems compromise.--> The public-private key system's additional security is based on the fact that given the public key of someone's (public,private
    4 KB (722 words) - 16:16, 11 February 2017
  • : this only really matters when security or gambling are involved
    2 KB (325 words) - 17:13, 18 September 2017
  • Kernel capabilities are an implementation of POSIX capability-based security (see 1003.1e). ...S's package manager installed it, and you can trust them to have done some security checks.
    1 KB (220 words) - 15:01, 31 August 2019
  • : as restrictive as this domain's admins like it to be for security / functionality
    2 KB (225 words) - 13:58, 14 June 2018
  • it's probably worse for security (patching each app is now more up to the application developer),
    2 KB (339 words) - 18:49, 10 December 2019
  • ======Security and sandboxing======
    44 KB (6,541 words) - 13:40, 31 July 2020
  • * '''Trusted Computing''' - refers to hardware-assisted security present in newer computers Sometimes sort of imitates security agency / military style, and can be modeled off it if you want.
    6 KB (950 words) - 13:47, 30 May 2020

View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)