Suchergebnisse

  • sECuRE sECuRE
    14 KB (1.928 Wörter) - 13:27, 10. Jan. 2013
  • …angenehm. Am letzten Tag dann wieder Chaos und kaputt... [[Benutzer:SECuRE|SECuRE]] 14:16, 6. Jul 2008 (CEST)
    9 KB (1.451 Wörter) - 10:39, 26. Mai 2009
  • …eininterpretiert hast. --[[Benutzer:SECuRE|SECuRE]] ([[Benutzer Diskussion:SECuRE|Diskussion]]) 17:35, 23. Jun. 2014 (CEST) …isse nicht stimmen :). --[[Benutzer:SECuRE|SECuRE]] ([[Benutzer Diskussion:SECuRE|Diskussion]]) 18:07, 24. Jun. 2014 (CEST)
    23 KB (3.479 Wörter) - 12:16, 16. Apr. 2015
  • …Iskorpitx defaced auf einen Schlag insgesamt etwa 38.000 Websites, die bei Secure Hosting gehostet werden.
    6 KB (759 Wörter) - 02:38, 26. Apr. 2007
  • Description='GPN20 secure WPA2 802.1X config'
    5 KB (763 Wörter) - 12:15, 20. Mai 2022
  • * [[GPN5:Secure Networking|Secure Networking]]
    13 KB (1.527 Wörter) - 18:08, 1. Jul. 2023
  • …more secure operating system without sacrificing usability|Towards a more secure operating system without sacrificing usability]] – aka the GNOME challeng
    18 KB (2.054 Wörter) - 17:10, 27. Mai 2017
  • |rowspan=3 |[[GPN16:More Secure Websites|More Secure Websites]] – HTTP Security Header
    17 KB (1.977 Wörter) - 19:49, 28. Mai 2016
  • Description='GPN21 secure WPA2 802.1X config'
    8 KB (1.155 Wörter) - 23:39, 9. Jun. 2023
  • sECuRE sECuRE
    22 KB (3.087 Wörter) - 16:24, 6. Jun. 2015
  • …allen Tischen (es gab welche ohne). +1 +1 +1 +1 +1 +1 --[[Benutzer:SECuRE|SECuRE]] 12:09, 10. Jun. 2012 (CEST) …ht, z.B. ICMP). Weiß nicht ob das finanziell drin ist. --[[Benutzer:SECuRE|SECuRE]] 00:32, 10. Jun. 2012 (CEST) +1 +1 +1 +1 +1
    42 KB (6.234 Wörter) - 13:35, 1. Jun. 2013
  • sECuRE
    10 KB (1.334 Wörter) - 00:21, 12. Jan. 2012
  • Vortragender: sECuRE
    13 KB (1.929 Wörter) - 14:52, 29. Jun. 2009
  • SUMMARY:More Secure Websites - Ives Laaf rs are the foundation of any application. In order to achieve secure sof
    49 KB (7.692 Wörter) - 19:37, 21. Jul. 2017
  • sECuRE sECuRE
    23 KB (3.207 Wörter) - 05:43, 21. Feb. 2019
  • …at combination, any of your PGP-encrypted messages can be read. PGP is not secure if you don't understand what you are doing. It is also true that God knows
    17 KB (2.460 Wörter) - 20:08, 24. Jan. 2012
  • …en, damit ich nicht mehr der entscheidende Faktor bin. --[[Benutzer:SECuRE|SECuRE]] 13:51, 26. Jun. 2011 (CEST)
    28 KB (4.140 Wörter) - 12:17, 7. Jun. 2012
  • …developers with prescriptive requirements that guide them down the path of secure software. And even when they do, there may be security flaws inherent in th …s document was written by developers for developers to assist those new to secure development.</abstract>
    99 KB (14.151 Wörter) - 19:49, 28. Mai 2016
  • |[[GPN20:Linux secure boot|Linux secure boot]] – ''Mit "secure boot" wird ein gefährliches Einfallstor für Schadsoftware und manipuliert
    53 KB (7.788 Wörter) - 22:23, 26. Mai 2022
  • g best practises\, the act of signing a key involves secure transfer of SUMMARY:Towards a more secure operating system without sacrificing usabil
    48 KB (7.438 Wörter) - 17:10, 27. Mai 2017
  • ….owasp.org/index.php/OWASP_Secure_Headers_Project#tab=Main","title":"OWASP Secure Headers Project"},{"url":"https://github.com/riramar/hsecscan","title":"sec
    88 KB (12.356 Wörter) - 19:49, 28. Mai 2016
  • DESCRIPTION:Mit "secure boot" wird ein gefährliches Einfallstor für Schad gnature verfügen.\n\nDer Vortrag stellt das Konzept von secure boot vor u
    66 KB (10.264 Wörter) - 22:27, 26. Mai 2022
  • ographic patterns to get you started on your way to better and more secure DESCRIPTION:Building secure software applications. A pragmatic approach - a
    80 KB (12.062 Wörter) - 19:05, 12. Mai 2018
  • <pentabarf:title>Linux secure boot</pentabarf:title> <summary>Linux secure boot</summary>
    132 KB (14.421 Wörter) - 22:22, 26. Mai 2022
  • <title>Towards a more secure operating system without sacrificing usability</title> However, when following best practises, the act of signing a key involves secure transfer of the OpenPGP key which contemporary casual key signing protocols
    100 KB (14.290 Wörter) - 17:10, 27. Mai 2017
  • <pentabarf:title>More Secure Websites</pentabarf:title> <summary>More Secure Websites- HTTP Security Header</summary>
    260 KB (40.353 Wörter) - 19:49, 28. Mai 2016
  • <slug>gpn20-67-linux-secure-boot</slug> <title>Linux secure boot</title>
    178 KB (20.739 Wörter) - 22:22, 26. Mai 2022
  • …s to automatically authenticate the key material before the transfer via a secure audible or visual channel.\r\nA Free Software implementation of the protoco
    88 KB (12.353 Wörter) - 17:10, 27. Mai 2017
  • …f cryptographic patterns to get you started on your way to better and more secure software. <abstract>Building secure software applications. A pragmatic approach - and getting your peers motiva
    219 KB (24.798 Wörter) - 19:05, 12. Mai 2018
  • …t he is responsible for the time lapse beforehand (+Wiki page), that he'll secure the device and the produced pictures as best as he can, and that he'll only
    40 KB (6.548 Wörter) - 09:46, 20. Jun. 2014
  • …ud and high performance computing.\r\nMultiple unikernels claim to be more secure than a traditional operating system due to their massively reduced attack…
    154 KB (22.316 Wörter) - 22:22, 26. Mai 2022
  • …ping Mechanism. So that the U2F device can only keep a master secret when secure storage capacity has a limit.\r\n\r\nhttps://fidoalliance.org/specs/fido-u2
    181 KB (26.351 Wörter) - 19:05, 12. Mai 2018
  • …he wiring in these things is kinda funny, as they use punch down blocks to secure the wires. The interesting thing about these is that some of these have 'fl
    64 KB (10.794 Wörter) - 18:11, 26. Jun. 2010
  • <description>How to code secure software applications. Focus will be on coding practices - especially those …ping Mechanism. So that the U2F device can only keep a master secret when secure storage capacity has a limit.
    202 KB (21.045 Wörter) - 19:05, 12. Mai 2018
  • <pentabarf:title>Towards a more secure operating system without sacrificing usability</pentabarf:title> <summary>Towards a more secure operating system without sacrificing usability- aka the GNOME challenge</su
    527 KB (85.964 Wörter) - 17:10, 27. Mai 2017
  • …e": "U9YNYF", "public_name": "@malexmave", "biography": "Researcher at the Secure Mobile Networking Lab, TU Darmstadt. I am interested in how we can use tran
    184 KB (26.519 Wörter) - 18:32, 1. Jun. 2019
  • DESCRIPTION:How to create and run your own secure leaking platform that act
    104 KB (16.039 Wörter) - 01:24, 11. Jul. 2023
  • …y is talking about and how to get in?\r\n\r\nMatrix is an open network for secure and decentralized communication. In this workshop we will show you how to…
    298 KB (43.503 Wörter) - 01:11, 11. Jul. 2023
  • …continuing to flow and are interested in setting up and running their own secure leaking platform as an alternative to WikiLeaks that still works, on a frac
    246 KB (27.455 Wörter) - 01:11, 11. Jul. 2023
Zeige ( | nächste 50) (20 | 50 | 100 | 250 | 500)