Search results

Jump to navigation Jump to search
  • ...If the encryption key is broken or compromised then all anonymity for all users for all past transactions would be void. (Break one, break all.) It might b ...correctness of the system will be endangered and not the anonymity of its users.</dd>
    4 KB (699 words) - 01:57, 13 May 2006
  • ...and who operate and maintain those resources in order to offer services to users. To recover their investments (and to make some profit) they charge their c ...feasible to outsource the function of an operator (company) to the service users. The software that normally runs on operator-owned computers may be split i
    4 KB (597 words) - 12:28, 21 November 2006
  • ** attributes of system critical files (rights / users / size / modification date etc.) ** in our example: the treshold is computed from the users past login activities
    6 KB (934 words) - 04:13, 11 February 2005
  • A P2P network is usually open to everyone, so it is also open for malicious users who want to damage the network. They can do that depending on the architect ...network to keep going well it needs to protect itself somehow. Restricting users depending on their reputation is a way to do so.
    10 KB (1,629 words) - 11:50, 26 April 2006
  • ...User die Tickets/Anfragen los, sondern Programme (Clients) im Auftrag des Users. Da aber der User die Kommunikation veranlasst (und sei es, in dem er den C .... Das TGT besteht aus: TGT{Session-Key für SGS,Username,Rechneradresse des Users} und ist mit dem Passwort / geheimen Schlüssel des SGS verschlüsselt, das
    11 KB (1,656 words) - 10:06, 13 July 2005
  • ** to using the ignorance of users **** optimal: users do not install software
    6 KB (872 words) - 21:31, 28 January 2005
  • Users of a public key shall be confident that the associated private an SSL server at Bob’s site is also not practical for many users.
    10 KB (1,517 words) - 21:27, 15 February 2005
  • because in case of, e.g. a raid this would compromise the users' anonymity.
    2 KB (364 words) - 21:55, 31 October 2006
  • ...cuse me for using your time, but I have changed the security mode. Now all users have to be updated if they are to have access again. Would you please give
    2 KB (312 words) - 20:21, 14 November 2004
  • ...e that the position of the nodes is determined only by the fact, where its users happen to live. ...teways, which advertise themselves as such to the rest of the network. The users are free to transform their BSS into a gateway by making their internet acc
    9 KB (1,491 words) - 14:24, 18 July 2007
  • C:\Users\wolfm>openvpn --show-ciphers
    5 KB (717 words) - 12:14, 18 September 2018
  • The default responses are correct for most users.
    3 KB (377 words) - 21:32, 14 November 2006
  • * Acceptability of Reputation Information by end users ...reputation depends on who makes the query and how that person rated other users. User anonymity through pseudonyms are allowed in both systems.
    7 KB (1,070 words) - 10:52, 7 May 2006
  • -rw-r--r-- 1 mj users 111415 2006-05-13 14:33 fs/unionfs/unionfs.ko
    4 KB (574 words) - 11:00, 13 May 2006
  • For human users is a more simple representation than the reputation function needed.<br>
    5 KB (1,111 words) - 08:28, 28 February 2006
  • * To create the toolchain, you will need debootstrap for it. Debian users run:
    4 KB (541 words) - 19:21, 15 December 2005
  • ...l in systems that are confined to single locations and specified groups of users ...the authorization decision. In some cases remote users are mapped to local users. This approach does not allow for delegation and relies heavily on an exist
    20 KB (3,188 words) - 11:59, 4 January 2005
  • ...ased on HMAC-SHA-512, HMAC-RIPEMD-160, or HMAC-Whirlpool, depending on the users selection. ...ent of a mounted TrueCrypt volume is visible (accessible) to all logged on users (NTFS file permissions can be configured to prevent this).
    17 KB (2,810 words) - 16:55, 10 June 2008
  • ...cker provides AES key size of either 128 Bits or 256 bits depending on the users choosing.
    7 KB (1,241 words) - 16:03, 20 June 2008
  • ...n the middle''' attack. They use a HTTP protocol vulnerability to redirect users to their pages. Technically, they were never intended. There is no standard ...ot redirected to the portal, but instead they get an https error. Already, users often have the problem that many large websites such as Google, Facebook or
    15 KB (2,455 words) - 13:54, 12 October 2017
View ( | ) (20 | 50 | 100 | 250 | 500)