Search results

From HandWiki
  • Computer science (category Wikipedia pages with incorrect protection templates) (section Computer security and cryptography)
    Glossary of computer science List of computer scientists List of computer science awards List of pioneers in computer science Outline of computer science In
    79 KB (7,051 words) - 20:13, 6 February 2024
  • Free software (category Hatnote templates with errors) (section Security and reliability)
    popular quantitative test in computer security is to use relative counting of known unpatched security flaws. Generally, users of this method advise avoiding
    53 KB (5,814 words) - 00:24, 7 February 2024
  • Malware (category Pages containing cite templates with deprecated parameters) (section Website security scans)
    interferes with the user's computer security and privacy. Researchers tend to classify malware into one or more sub-types (i.e. computer viruses, worms, Trojan
    73 KB (7,244 words) - 18:07, 8 February 2024
  • Java (programming language) (category Wikipedia pages with incorrect protection templates)
    erview.html.  "Java Security Overview". Java Documentation. Oracle. http://docs.oracle.com/javase/8/docs/technotes/guides/security/overview/jsoverview
    72 KB (6,328 words) - 22:29, 6 February 2024
  • Proprietary software (category Portal templates with all redlinked portals)
    was not clear until the 1983 appeals court ruling in Apple Computer, Inc. v. Franklin Computer Corp. According to Brewster Kahle the legal characteristic
    43 KB (4,593 words) - 16:47, 6 February 2024
  • Trojan horse (computing) (category Social engineering (computer security)) (section Detected by security researchers)
    case "trojan" for normal use. Computer security Cuckoo's egg (metaphor) Cyber spying Dancing pigs Exploit (computer security) Industrial espionage Phishing
    20 KB (2,089 words) - 16:51, 6 February 2024
  • API (category Pages containing cite templates with deprecated parameters) (section Security)
    changes to your server. Some common security practices include proper connection security using HTTPS, content security to mitigate data injection attacks
    47 KB (5,498 words) - 16:07, 6 February 2024
  • System administrator (category Wikipedia pages with incorrect protection templates)
    network-attached computers. A security administrator is a specialist in computer and network security, including the administration of security devices such
    13 KB (1,315 words) - 16:47, 6 February 2024
  • Internet (category Wikipedia pages with incorrect protection templates) (section Security)
    as both Internet access and computer literacy spread. The Internet allows computer users to remotely access other computers and information stores easily
    155 KB (16,323 words) - 06:01, 9 March 2024
  • Cryptography (category Wikipedia pages with incorrect protection templates) (section Early computer-era cryptography)
    cryptography has become a widely used tool in communications, computer networks, and computer security generally. Some modern cryptographic techniques can only
    98 KB (10,655 words) - 23:00, 8 February 2024
  • Computer security (category Computer security) (section Computer security incident management)
    description: Protection of computer systems from information disclosure, theft or damage Computer security, cybersecurity, digital security or information technology
    217 KB (22,658 words) - 19:03, 6 February 2024
  • Computer virus (category Computer security exploits)
    Cloner" was the first personal computer virus to appear "in the wild"—that is, outside the single computer or computer lab where it was created. Written
    89 KB (9,298 words) - 23:49, 6 February 2024
  • Open-source software security (category Computer security)
    limitations with respect to security and privacy. Computers & Security, 21 (5), 461–471. Retrieved 5 May 2008, from Computer Database. Peterson, G. (6 May
    8 KB (1,011 words) - 19:54, 8 February 2024
  • Software bug (category Pages containing cite templates with deprecated parameters)
    or fault in a computer program or system A software bug is an error, flaw or fault in the design, development, or operation of computer software that causes
    51 KB (6,104 words) - 20:38, 6 February 2024
  • Free and open-source software (category Portal templates with all redlinked portals) (section Privacy and security)
    technical measures (such as distributing only binary copies of computer programs) to prevent computer users from being able to use reverse engineering techniques
    81 KB (6,988 words) - 19:12, 6 February 2024
  • Hacker (category Hacking (computer security)) (section Computer security)
    the computer security subculture as crackers and refuse to accept any definition of hacker that encompasses such activities. The computer security hacking
    37 KB (4,250 words) - 05:56, 9 March 2024
  • Hypervisor (category Pages containing cite templates with deprecated parameters) (section Security implications)
    (VMM) or virtualizer, is a type of computer software, firmware or hardware that creates and runs virtual machines. A computer on which a hypervisor runs one
    24 KB (2,850 words) - 21:05, 6 February 2024
  • Long-term support (category Computer security procedures)
    org/DebianReleases/PointReleases.  "Debian security FAQ". Debian Project. https://www.debian.org/security/faq#lifespan.  "[SECURITY [DSA 2907-1] Announcement of long
    31 KB (2,065 words) - 22:02, 8 February 2024
  • Phishing (category Social engineering (computer security))
    Audun (2007). "Security Usability Principles for Vulnerability Analysis and Risk Assessment.". Proceedings of the Annual Computer Security Applications Conference
    96 KB (8,887 words) - 21:29, 6 February 2024
  • Reverse engineering (category Computer security)
    using bus analyzers and packet sniffers, such as for accessing a computer bus or computer network connection and revealing the traffic data thereon. Bus
    56 KB (6,949 words) - 20:09, 6 February 2024

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)