Search results

Jump to navigation Jump to search
Results 1 – 21 of 799
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • #REDIRECT [[Logging (computing)#Server log]] [[Category:Computer logging]] ...
    143 bytes (17 words) - 09:05, 4 January 2023
  • * [[Computer surveillance]] software ** [[Keystroke logging]] ...
    368 bytes (33 words) - 23:56, 10 November 2020
  • ...tactics to infiltrate a [[computer]] user's environment. A mixed [[Threat (computer)|threat]] attack might include an infected file that comes in by way of [[S [[Nimda]] and [[Code Red (computer worm)|Code Red]] are examples of computer worms that utilized mixed threat attacks.<ref name = "TrendMicro"/> ...
    2 KB (268 words) - 05:19, 22 June 2025
  • {{Short description|Computer security specialist}} ...utions at [[Qualys]], a U.S. [[Vulnerability management]] company, a Chief Logging Evangelist with [[LogLogic]], a U.S. [[Log Management and Intelligence]] co ...
    3 KB (409 words) - 03:20, 19 June 2024
  • * [[Keystroke logger]], software that records the keys struck on a computer keyboard * [[Logging]] ...
    438 bytes (59 words) - 19:40, 30 August 2024
  • '''Call logging''' is the collection, evaluation, and reporting of technical and statistica ...and analysis software. Some PBX manufacturers provide their own basic call logging software but many other third-party software packages are available. ...
    4 KB (601 words) - 22:43, 22 January 2025
  • ...module it cross-cuts. Isolating such aspects as logging and [[persistence (computer science)|persistence]] from [[business logic]] is at the core of the [[aspe ...
    2 KB (321 words) - 14:03, 30 June 2024
  • == Computer-generated CW == ...e [[computer keyboard]], from a [[telegraph key]], or from memories in the computer associated with steps in the process of making contest contacts. Some soft ...
    4 KB (516 words) - 04:56, 10 November 2023
  • {{Short description|Information that has an effect on the code of a computer program}} ...' is a particular set of information that has an effect on the code of a [[computer program]]. A concern can be as general as the details of [[database]] inter ...
    4 KB (505 words) - 06:46, 23 March 2025
  • * [[Cut-to-length logging]] * [[Computer Technology Limited]], a British computer manufacturer of the 1970s and 1980s ...
    1 KB (164 words) - 18:53, 6 February 2025
  • [[Image:contest_logging_software-w5jlp.JPG|thumb|right|300px|The use of a computer to log contacts has become an integral part of radio contesting.]] ...for use by competitors in [[amateur radio]] [[contesting]]. Most contest logging software is written by individual [[programmers]] who are active radio cont ...
    4 KB (666 words) - 12:43, 3 March 2025
  • {{Short description|Time spent logged into a computer system}} ...is the period of activity between a user [[login|logging in]] and [[login|logging out]] of a (multi-user) [[system]]. ...
    2 KB (265 words) - 08:13, 20 March 2025
  • ...elated to [[OAuth]], an open standard for [[authorization]], however, most logging systems employ a mixture of both. [[Category:Computer security organizations]] ...
    2 KB (231 words) - 16:51, 26 March 2025
  • ...atively, via a device plugged inline between a [[computer keyboard]] and a computer. They log all keyboard activity to their internal memory. ...ntage over software keyloggers as they can begin logging from the moment a computer is turned on (and are therefore able to intercept passwords for the [[BIOS] ...
    7 KB (1,007 words) - 07:15, 28 April 2025
  • ...ue for providing [[Atomic (computer science)|atomicity]] and [[Durability (computer science) | durability]] (two of the [[ACID]] properties) in [[database syst ...d. Because the page is "activated" only when it is ready, it is [[Atomic (computer science)|atomic]]. ...
    2 KB (357 words) - 17:16, 4 November 2024
  • ...ow control]] and other applications which require temporal coordination or logging of recording or actions. ...but is now typically done using shot-logging software running on a laptop computer that is connected to the timecode generator or the camera itself. ...
    3 KB (458 words) - 21:08, 8 July 2024
  • ...crash (computing)|crash]]es or hardware failures. Physically, a log is a [[computer file|file]] listing changes to the database, stored in a stable storage for ...one to ensure [[atomicity (database systems)|atomicity]] and [[durability (computer science)|durability]] of transactions. ...
    6 KB (825 words) - 05:09, 18 July 2022
  • ...cription|Computer virus}}{{Infobox computer virus|fullname=BadTrans|type=[[Computer worm]]|origin=East Asia (allegedly)|OSes=[[Windows 95]], [[Windows 98]], [[ '''BadTrans''' is a malicious [[Microsoft Windows]] [[computer worm]] distributed by [[e-mail]]. Because of a known vulnerability in older ...
    3 KB (419 words) - 16:15, 29 December 2024
  • '''[[Login]]''' allows access to a computer system through providing private credentials, such as a username and a pass * [[Logging]], the cutting and processing of trees ...
    1 KB (144 words) - 17:40, 7 March 2025
  • {{Short description|Computer operating system component}} ...ecurity policy]] on the system. It verifies users logging on to a Windows computer or server, handles password changes, and creates [[access token]]s.<ref>{{c ...
    3 KB (385 words) - 13:51, 24 June 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)