Search results
Jump to navigation
Jump to search
- * Compliance with [[security policies]] * Security incident response ...5 KB (752 words) - 11:45, 20 April 2023
- # ''Security'': Messages must be encrypted if they travel over public interfaces. Messa ...ed differently. For example, some messages may have different priority or security policies. ...5 KB (710 words) - 10:14, 22 June 2025
- ...f''' ('''COTS''') products are packaged or canned (ready-made) hardware or software, which are adapted aftermarket to the needs of the purchasing organization, .../2.101|access-date=2022-06-22}}</ref> For example, [[Microsoft]] is a COTS software provider. Goods and construction materials may qualify as COTS but bulk car ...12 KB (1,665 words) - 00:02, 9 May 2025
- {{Infobox software ...upport/kb/article.php?id=1000305&lang=en|title=History of changes: Outpost Security Suite Pro|publisher=Agnitum|access-date=2015-06-22|archive-url=https://web. ...10 KB (1,379 words) - 08:14, 15 June 2025
- {{short description|Class of network management software}} ...m/books?id=eomJgz8J6jEC&pg=PA159 |pages=159–161 |title=Implementing 802.1X Security Solutions for Wired and Wireless Networks |author=Jim Geier |year=2008 |isb ...8 KB (1,033 words) - 23:52, 18 March 2025
- {{Short description|Free software backup utility}} {{about|computer backup software|the penile bone found in some mammals|baculum|the genus of sea snail|Bacula ...9 KB (1,259 words) - 17:19, 17 May 2025
- {{Short description|Software to run Windows and Linux simultaneously}} {{Infobox software ...9 KB (1,331 words) - 08:36, 29 August 2024
- The term "[[Email security#Privacy concerns|Email security]]" refers to the protection of email from [[Computer virus|viruses]] and [[ ...ox (computer security)|Sandbox]] !![[Email security#Privacy concerns|Email security]] !![[Antispam]] !![[Web filter|Web protection]] !!Macro protection !!Live< ...48 KB (5,202 words) - 08:14, 15 June 2025
- ...act to protect the bulk of the user's files from potentially untrustworthy software such as [[Trojan horse (computing)|Trojan horses]] or other forms of [[malw ...nd later versions of [[macOS]] use a powerbox to allow [[sandbox (computer security)|sandboxed]] applications to open and save files.<ref>{{cite web|url=https: ...5 KB (773 words) - 14:15, 27 January 2025
- ...Trusted Computing]]'', an approach under present development that achieves security in general at the potential cost of compelling obligatory trust in corporat == Nature and limits of security == ...19 KB (2,779 words) - 11:35, 18 June 2025
- ...] (FOSS) – and [[closed source]] are two approaches to the distribution of software. ...crosoft Windows|Windows]] and [[Microsoft Office]], along with other major software companies, have long been proponents of this business model, although in Au ...21 KB (2,966 words) - 15:23, 26 May 2025
- ! [[software license|License]] | [[Proprietary software|Proprietary]] ...15 KB (1,883 words) - 03:16, 11 April 2022
- {{about|the software|the comic|Grease Monkey|other uses|Grease monkey (disambiguation)}} {{Infobox software ...14 KB (1,967 words) - 18:52, 9 September 2024
- ===Serial number comparisons=== Serial number comparisons are intended to use [[Serial Number Arithmetic]] as defined in RFC 1982. H ...14 KB (2,097 words) - 17:39, 24 May 2025
- ...ualization software''' refers to both application [[virtual machine]]s and software responsible for implementing them. Application virtual machines are typical ![[Secure coding|Code security]] ...17 KB (2,226 words) - 03:19, 22 June 2025
- An '''SSH client''' is a software program which uses the [[secure shell]] protocol to connect to a [[Server ( ! rowspan="2" | [[Software license|License]] ...25 KB (3,120 words) - 23:38, 18 March 2025
- ![[Transport Layer Security]] ! {{rh}} |[[Bonjour (software)|Bonjour]] ...22 KB (2,767 words) - 15:09, 26 May 2025
- ...licable to measurement, supply chain, software development, healthcare and security. ...or ''metrological traceability'' is used to refer to an unbroken chain of comparisons relating an [[Measuring instrument|instrument]]'s [[measurement]]s to a kno ...18 KB (2,508 words) - 20:57, 15 September 2025
- ...(lock)|door locks]]. Terms that are primarily used by the U.S. [[National Security Agency]] are marked ''(NSA)''. For classification of keys according to thei ...dware_security_module_hsm_integration|title = Chapter 5. Barbican Hardware Security Module (HSM) Integration Red Hat OpenStack Platform 15}}</ref> ...9 KB (1,412 words) - 00:41, 29 April 2025
- ...e also|Collaborative development environment|Comparison of version-control software}} ...ject documentation. Software authors generally retain their copyright when software is posted to a code hosting facilities. ...33 KB (4,105 words) - 02:41, 20 June 2025