Search results
Jump to navigation
Jump to search
- #REDIRECT [[Logging (computing)#Server log]] [[Category:Computer logging]] ...143 bytes (17 words) - 09:05, 4 January 2023
- * [[Computer surveillance]] software ** [[Keystroke logging]] ...368 bytes (33 words) - 23:56, 10 November 2020
- ...tactics to infiltrate a [[computer]] user's environment. A mixed [[Threat (computer)|threat]] attack might include an infected file that comes in by way of [[S [[Nimda]] and [[Code Red (computer worm)|Code Red]] are examples of computer worms that utilized mixed threat attacks.<ref name = "TrendMicro"/> ...2 KB (268 words) - 05:19, 22 June 2025
- {{Short description|Computer security specialist}} ...utions at [[Qualys]], a U.S. [[Vulnerability management]] company, a Chief Logging Evangelist with [[LogLogic]], a U.S. [[Log Management and Intelligence]] co ...3 KB (409 words) - 03:20, 19 June 2024
- * [[Keystroke logger]], software that records the keys struck on a computer keyboard * [[Logging]] ...438 bytes (59 words) - 19:40, 30 August 2024
- '''Call logging''' is the collection, evaluation, and reporting of technical and statistica ...and analysis software. Some PBX manufacturers provide their own basic call logging software but many other third-party software packages are available. ...4 KB (601 words) - 22:43, 22 January 2025
- ...module it cross-cuts. Isolating such aspects as logging and [[persistence (computer science)|persistence]] from [[business logic]] is at the core of the [[aspe ...2 KB (321 words) - 14:03, 30 June 2024
- == Computer-generated CW == ...e [[computer keyboard]], from a [[telegraph key]], or from memories in the computer associated with steps in the process of making contest contacts. Some soft ...4 KB (516 words) - 04:56, 10 November 2023
- {{Short description|Information that has an effect on the code of a computer program}} ...' is a particular set of information that has an effect on the code of a [[computer program]]. A concern can be as general as the details of [[database]] inter ...4 KB (505 words) - 06:46, 23 March 2025
- * [[Cut-to-length logging]] * [[Computer Technology Limited]], a British computer manufacturer of the 1970s and 1980s ...1 KB (164 words) - 18:53, 6 February 2025
- [[Image:contest_logging_software-w5jlp.JPG|thumb|right|300px|The use of a computer to log contacts has become an integral part of radio contesting.]] ...for use by competitors in [[amateur radio]] [[contesting]]. Most contest logging software is written by individual [[programmers]] who are active radio cont ...4 KB (666 words) - 12:43, 3 March 2025
- {{Short description|Time spent logged into a computer system}} ...is the period of activity between a user [[login|logging in]] and [[login|logging out]] of a (multi-user) [[system]]. ...2 KB (265 words) - 08:13, 20 March 2025
- ...elated to [[OAuth]], an open standard for [[authorization]], however, most logging systems employ a mixture of both. [[Category:Computer security organizations]] ...2 KB (231 words) - 16:51, 26 March 2025
- ...atively, via a device plugged inline between a [[computer keyboard]] and a computer. They log all keyboard activity to their internal memory. ...ntage over software keyloggers as they can begin logging from the moment a computer is turned on (and are therefore able to intercept passwords for the [[BIOS] ...7 KB (1,007 words) - 07:15, 28 April 2025
- ...ue for providing [[Atomic (computer science)|atomicity]] and [[Durability (computer science) | durability]] (two of the [[ACID]] properties) in [[database syst ...d. Because the page is "activated" only when it is ready, it is [[Atomic (computer science)|atomic]]. ...2 KB (357 words) - 17:16, 4 November 2024
- ...ow control]] and other applications which require temporal coordination or logging of recording or actions. ...but is now typically done using shot-logging software running on a laptop computer that is connected to the timecode generator or the camera itself. ...3 KB (458 words) - 21:08, 8 July 2024
- ...crash (computing)|crash]]es or hardware failures. Physically, a log is a [[computer file|file]] listing changes to the database, stored in a stable storage for ...one to ensure [[atomicity (database systems)|atomicity]] and [[durability (computer science)|durability]] of transactions. ...6 KB (825 words) - 05:09, 18 July 2022
- ...cription|Computer virus}}{{Infobox computer virus|fullname=BadTrans|type=[[Computer worm]]|origin=East Asia (allegedly)|OSes=[[Windows 95]], [[Windows 98]], [[ '''BadTrans''' is a malicious [[Microsoft Windows]] [[computer worm]] distributed by [[e-mail]]. Because of a known vulnerability in older ...3 KB (419 words) - 16:15, 29 December 2024
- '''[[Login]]''' allows access to a computer system through providing private credentials, such as a username and a pass * [[Logging]], the cutting and processing of trees ...1 KB (144 words) - 17:40, 7 March 2025
- {{Short description|Computer operating system component}} ...ecurity policy]] on the system. It verifies users logging on to a Windows computer or server, handles password changes, and creates [[access token]]s.<ref>{{c ...3 KB (385 words) - 13:51, 24 June 2025