jspωiki
FullRecentChanges

These are all of the changes made to these pages. A much shorter list is available in RecentChanges.

10.12.2018
LDAPWiki Images 09:46:20 jim
09.12.2018
User and Entity Behavior Analytics 11:12:18 jim
Behavioral Characteristics 11:08:50 jim
IMF 10:38:45 jim
International Monetary Fund 10:37:30 jim
Web Blog_blogentry_091218_1 10:34:16 jim
Penetration Test 10:19:37 jim
Vulnerability Assessment 10:13:48 jim
Vulnerability 10:13:00 jim
Red Green Refactor 10:07:12 jim
Decentralized system 09:51:27 jim
Common Criteria for Information Technology Security Evaluation 09:42:37 jim
07.12.2018
Sovrin Agent 12:51:16 jim
Sovrin 12:48:31 jim
Coherence 12:09:41 jim
Cloud computing 12:06:17 jim
Public Key 12:03:05 jim
CurveZMQ 11:44:54 jim
Plenum Byzantine Fault Tolerant Protocol 11:37:57 jim
06.12.2018
Organizational friction 16:43:05 jim
Mura 16:21:27 jim
Muda 16:20:10 jim
Muri 16:11:49 jim
Kanban 16:06:26 jim
Friction 15:48:32 jim
Byte 13:12:11 jim
Bit 13:07:32 jim
Megabyte 12:54:08 jim
MB 12:08:53 jim
N4u.server.thread-stack-size 12:08:18 jim
NDS Thread Pool 11:58:53 jim
NDS Threads 11:55:42 jim
Web Blog_blogentry_061218_1 10:46:18 jim
05.12.2018
Ndsconfig Parameters 15:10:14 jim
N4u.server.listen-on-loopback 15:07:18 jim
04.12.2018
MS Access Mask 12:40:12 jim
MS Access Mask/ms-accctrl4.png 12:37:51 jim MS Access Mask Format
Image Styles 12:32:05 jim
Access Control Entry 12:20:56 jim
Access Control Entry Type 12:15:22 jim
Rights 12:03:35 jim
Discretionary Access Control List 11:37:34 jim
Securable object 11:17:45 jim
Access Control Model-Microsoft Windows 11:15:58 jim
MSFT Access Token 10:34:55 jim
Security Descriptor 10:32:31 jim
Access Control Models 10:17:49 jim
Access Control List 10:14:27 jim
System Access Control List 10:12:27 jim
SID identifier authority 09:55:50 jim
Well-known Security Identifiers 09:55:18 jim
SECURITY_NT_AUTHORITY 09:36:17 jim
Security Identifier 09:29:45 jim
03.12.2018
Mimikatz 17:24:55 jim
Golden Ticket 17:16:31 jim
Health Dataset 13:44:11 jim
MLLP 13:44:01 jim
Minimal Lower Layer Protocol 13:42:01 jim
Health Level Seven 13:39:15 jim
Book 13:32:48 jim
Web Blog_blogentry_111017_1 13:32:24 jim Health Care ==> HealthCare
Web Blog_blogentry_200918_1 13:32:24 jim Health Care ==> HealthCare
Web Blog_blogentry_281018_1 13:32:24 jim Health Care ==> HealthCare
Medical ID Card 13:32:23 jim Health Care ==> HealthCare
Personal Health Record 13:32:23 jim Health Care ==> HealthCare
Regulatory Risk 13:32:23 jim Health Care ==> HealthCare
United States Office of Personnel Management 13:32:23 jim Health Care ==> HealthCare
Web Blog_blogentry_030618_1 13:32:23 jim Health Care ==> HealthCare
Informed Consent 13:32:22 jim Health Care ==> HealthCare
Integrating the Healthcare Enterprise 13:32:22 jim Health Care ==> HealthCare
Meaningful Use 13:32:22 jim Health Care ==> HealthCare
Health Care Provider 13:32:21 jim Health Care ==> HealthCare
Health Information Technology for Economic and Clinical Health 13:32:21 jim Health Care ==> HealthCare
Health information 13:32:21 jim Health Care ==> HealthCare
Identity Proofing 13:32:21 jim Health Care ==> HealthCare
Industry Specific 13:32:21 jim Health Care ==> HealthCare
Electronic Medical Record 13:32:20 jim Health Care ==> HealthCare
Federal Health Care Law 13:32:20 jim Health Care ==> HealthCare
HIPAA Covered Entity 13:32:20 jim Health Care ==> HealthCare
HIPAA Privacy Rule 13:32:20 jim Health Care ==> HealthCare
Health Care Organization 13:32:20 jim Health Care ==> HealthCare
Digital Imaging and Communications in Medicine 13:32:19 jim Health Care ==> HealthCare
Electronic Fitness Device 13:32:19 jim Health Care ==> HealthCare
HealthCare 13:32:19 jim Health Care ==> HealthCare
Data anonymization 13:30:21 jim
Clinical Data 13:30:05 jim
Cloud Data Store 13:24:24 jim
Relational Database Management System 13:23:18 jim
Dataset 13:20:17 jim
Windows registry 13:19:18 jim Data Store ==> DataStore
System Authorization Facility 13:19:17 jim Data Store ==> DataStore
Tracking 13:19:17 jim Data Store ==> DataStore
Update 13:19:17 jim Data Store ==> DataStore
Web Blog_blogentry_090418_1 13:19:17 jim Data Store ==> DataStore
Web Blog_blogentry_211217_1 13:19:17 jim Data Store ==> DataStore
Password Policy 13:19:16 jim Data Store ==> DataStore
Protocol Buffers 13:19:16 jim Data Store ==> DataStore
Queue 13:19:16 jim Data Store ==> DataStore
Read 13:19:16 jim Data Store ==> DataStore
Replication 13:19:16 jim Data Store ==> DataStore
Repository 13:19:16 jim Data Store ==> DataStore
Stateless 13:19:16 jim Data Store ==> DataStore
NICI 13:19:15 jim Data Store ==> DataStore
NoSQL 13:19:15 jim Data Store ==> DataStore
OAuth Scope Example 13:19:15 jim Data Store ==> DataStore
Object storage 13:19:15 jim Data Store ==> DataStore
Oracle Unified Directory 13:19:15 jim Data Store ==> DataStore
LDAP Overview 13:19:14 jim Data Store ==> DataStore
Legal Entity Identifier 13:19:14 jim Data Store ==> DataStore
Microservice 13:19:14 jim Data Store ==> DataStore
General Data Protection Regulation 13:19:13 jim Data Store ==> DataStore
Government Data Store 13:19:13 jim Data Store ==> DataStore
HBase 13:19:13 jim Data Store ==> DataStore
Keystore 13:19:13 jim Data Store ==> DataStore
FLAIM Cache 13:19:12 jim Data Store ==> DataStore
FLAIM checkpoint 13:19:12 jim Data Store ==> DataStore
Facial recognition 13:19:12 jim Data Store ==> DataStore
Faythe 13:19:12 jim Data Store ==> DataStore
GCP Storage Products 13:19:12 jim Data Store ==> DataStore
Delegation vs Impersonation 13:19:11 jim Data Store ==> DataStore
Delete 13:19:11 jim Data Store ==> DataStore
Delete Request 13:19:11 jim Data Store ==> DataStore
Digital Identity 13:19:11 jim Data Store ==> DataStore
Distributed Data Store 13:19:11 jim Data Store ==> DataStore
FLAIM 13:19:11 jim Data Store ==> DataStore
Data Metadata 13:19:10 jim Data Store ==> DataStore
Data Processor 13:19:10 jim Data Store ==> DataStore
Data warehouse 13:19:10 jim Data Store ==> DataStore
Data-lake 13:19:10 jim Data Store ==> DataStore
Database 13:19:10 jim Data Store ==> DataStore
Decentralized Identity Foundation 13:19:10 jim Data Store ==> DataStore
Codebase 13:19:09 jim Data Store ==> DataStore
Create 13:19:09 jim Data Store ==> DataStore
Credential Repository 13:19:09 jim Data Store ==> DataStore
Credential Vault 13:19:09 jim Data Store ==> DataStore
Cryptocurrency wallet 13:19:09 jim Data Store ==> DataStore
Biometric Identification 13:19:08 jim Data Store ==> DataStore
Blinding Identity Taxonomy 13:19:08 jim Data Store ==> DataStore
Brocade Communications Systems 13:19:08 jim Data Store ==> DataStore
By-reference 13:19:08 jim Data Store ==> DataStore
American Association of Motor Vehicle Administrators 13:19:07 jim Data Store ==> DataStore
Automated License Plate Reader 13:19:07 jim Data Store ==> DataStore
Biometric Enrollment 13:19:07 jim Data Store ==> DataStore
DataStore 13:19:07 jim Data Store ==> DataStore
AD Password Filters 13:18:52 jim
OpenID Connect Federation 12:19:17 jim
Personal Information Protection and Electronic Documents Act 10:00:12 jim
02.12.2018
Node 10:42:10 jim
Matrix 10:38:36 jim
Graph 10:32:15 jim
Binary Tree 10:28:27 jim
Stack 10:25:23 jim
JSONArray 10:22:47 jim
Array 10:21:28 jim
Linked List 10:20:13 jim
Data Structure 10:13:45 jim
Software design 10:06:23 jim
Software library 10:02:37 jim
OPAL Project 09:52:37 jim
Delivery Team 09:41:58 jim
Software 09:38:09 jim
Agile Principles 09:37:34 jim
Perl 09:33:29 jim
DevOps 09:32:01 jim
Debug 09:31:28 jim
Firebase 09:29:54 jim
Application 09:29:24 jim
Waterfall model 09:28:11 jim
Continuous Development 09:27:12 jim
Software Development Kit 09:24:33 jim
Lean Product Development 09:24:02 jim
Development Team 09:21:49 jim
01.12.2018
Refactoring 13:39:48 jim
Remote Procedure Call 11:16:03 jim
Idempotent 11:15:23 jim
Function 11:13:54 jim
Class 11:10:54 jim
Method 11:09:43 jim
Object 11:08:57 jim
SNMP 11:06:09 jim
Session Management 11:04:55 jim
SAML Web Browser Profiles 11:04:19 jim
Certification Authority Rating And Trust 11:02:48 jim
Binding_message 11:01:51 jim
The Twelve-Factor App 10:59:46 jim
Commitment Scheme 10:58:55 jim
FAL 2 10:57:33 jim
GS2 Mechanism Family 10:56:35 jim
SAML Bindings 10:54:46 jim
Binding 10:48:50 jim
Subroutine 10:26:54 jim
Backus Normal Form 10:00:52 jim
Polyglot 09:59:20 jim
Inheritance 09:58:05 jim
Python 09:56:53 jim
Property 09:56:35 jim
Application Programing Interface 09:55:12 jim
Object-oriented Programming 09:53:25 jim
Extreme Programming 09:52:32 jim
Software development 09:51:22 jim
Programming 09:49:43 jim
Functional Programming 09:47:19 jim
Protocol 09:23:52 jim
Protocol Stack 09:22:25 jim
DIAMETER 09:20:21 jim
30.11.2018
Ecash 11:04:38 jim
Money 10:53:46 jim
Store of value 10:48:11 jim
Unit of measurement 10:46:01 jim
Medium of exchange 10:37:20 jim
Store 10:23:18 jim
Identity Data Store 10:21:37 jim
International System of Units 10:14:10 jim
Fiat Currency 09:36:35 jim
29.11.2018
Fractional Reserve 17:52:34 jim
OpenLedger 17:48:05 jim
Pwd-Last-Set attribute 14:55:16 jim
PwdLastSet 14:46:06 jim
DID Context 14:14:24 jim
DID path 14:13:56 jim
DID record 14:13:38 jim
DID Operations 14:13:23 jim
DID Authentication 14:12:58 jim
DID reference 14:12:09 jim
DID Fragment 14:11:36 jim
Decentralized Identifier 14:10:20 jim
DID Subject 14:09:54 jim
DID Service Endpoint 13:58:02 jim
DID Document 13:55:32 jim
Trust Anchor 13:23:52 jim
27.11.2018
OBIT_COUNT_FROM_DATABASE_INDEX 13:01:45 jim
Cn=Partition, cn=Agent, cn=monitor 13:00:31 jim
ChangeCacheCount 12:59:30 jim
UserAttribute 12:58:06 jim
ExtensibleObject 12:55:32 jim
NDS Obituaries 12:49:40 jim
Change Cache 12:40:50 jim
PerishableData 12:23:25 jim
Glossary Of LDAP And Directory Terminology 12:11:32 jim ReplicaS Perishable Data Delta ==> PerishableData
MaxRingDelta 12:09:16 jim Maximum Ring Delta ==> MaxRingDelta
PurgeVector 11:59:22 jim
2.16.840.1.113719.1.1.4.1.500 11:34:55 jim
ObituaryNotify 11:34:32 jim
BirthDate 11:20:16 jim
PlaceOfBirth 11:13:05 jim
SapAddOnUM 11:11:47 jim
1.3.6.1.4.1.694.2.1.104 11:10:08 jim
BirthName 11:09:07 jim
DateOfBirth 11:04:52 jim
Date Of Birth 11:04:30 jim
Birth Certificate 11:03:21 jim
Birth Record 11:03:02 jim
Government Identity 11:01:58 jim
Metrics 10:46:57 jim
Monitor Entry 10:07:47 jim
Canada 10:02:13 jim
United States 10:00:11 jim
Earth 09:56:54 jim
Australia 09:56:00 jim
Antarctica 09:53:20 jim
South America 09:52:11 jim
North America 09:50:12 jim
Europe 09:47:43 jim
Africa 09:46:15 jim
Asia 09:44:07 jim
Continent 09:42:28 jim
Mobile Country Code 09:39:41 jim
Estonia 09:36:55 jim
DigiD 09:30:46 jim
Netherlands 09:28:01 jim
National Identification Number 09:23:49 jim
REAL ID 09:15:24 jim
National ID 09:13:16 jim
Xdas.properties 09:09:22 jim
XDAS 09:08:14 jim
XDAS for eDirectory 09:06:40 jim
26.11.2018
OBIT_MOVED_PURGEABLE 15:34:23 jim
OBIT_MOVED_OK_TO_PURGE 15:33:46 jim
OBIT_MOVED_NOTIFIED 15:33:29 jim
OBIT_MOVED_ISSUED 15:33:10 jim
OBIT_NEWRDN_PURGEABLE 15:32:43 jim
OBIT_DEAD_ISSUED 15:32:14 jim
OBIT_NEWRDN_NOTIFIED 15:32:07 jim
OBIT_NEWRDN_OK_TO_PURGE 15:31:37 jim
OBIT_NEWRDN_ISSUED 15:31:18 jim
OBIT_DEAD_PURGEABLE 15:30:55 jim
OBIT_DEAD_OK_TO_PURGE 15:30:29 jim
OBIT_DEAD_NOTIFIED 15:30:03 jim
NDS Obituary State 15:28:26 jim
OBIT_NOTIFIED 15:27:28 jim
OBIT_ISSUED 15:26:24 jim
OBIT_PURGEABLE 15:25:51 jim
OBIT_OK_TO_PURGE 15:24:04 jim
NDS Obituaries Type 15:11:54 jim
INHIBIT_MOVE Obituary 15:11:15 jim
OBIT_MOVED 15:10:35 jim MOVED Obituary ==> OBIT_MOVED
NDS Primary Obituaries 15:10:15 jim
OBIT_NEWRDN 15:09:35 jim NEW RDN Obituary ==> OBIT_NEWRDN
OBIT_DEAD 15:07:09 jim DEAD Obituary ==> OBIT_DEAD
NDS Obituaries Classification 14:21:19 jim
EDirectory Monitor Entry 13:09:32 jim
25.11.2018
XDAS Security Events 20:36:54 jim
Locked By Intruder 20:33:38 jim
Universal Password 12:42:38 jim
NMAS_LOGIN 12:35:53 jim
RFC 4301 12:31:58 jim
SASL EXTERNAL 12:29:51 jim
SASL 12:27:23 jim
22.11.2018
Encoding claims in the OAuth 2 state parameter using a JWT 16:16:31 jim
OAuth 2.0 Security Best Current Practice 16:14:30 jim
OAuth 2.0 Mix-Up Attack 16:01:07 jim
OAuth 2.0 Vulnerabilities 15:56:51 jim OAuth 2.0 Mix-Up Mitigation ==> OAuth 2.0 Mix-Up Attack
21.11.2018
Web Authentication API 10:27:10 jim
Credential Management API 10:26:36 jim
W3C WebAuthn 10:19:56 jim
U2F device 10:17:24 jim
WebAuthn Attestation 10:14:36 jim
Public Key Credential 10:12:38 jim
UAF 09:46:53 jim
20.11.2018
Policy 12:47:52 jim
17.11.2018
Pic 12:35:38 jim
TitleBox 11:54:49 jim
OSI-Model 11:26:41 jim
OSI-Model/OSI Model.svg 10:11:46 jim ODI Model
Kim Cameron 09:17:27 jim
16.11.2018
FLAIM Attribute Containerization 10:31:49 jim
Edirectory Indexes 10:29:38 jim
SasUpdateLoginInfo 10:11:40 jim
13.11.2018
LDAPSyntaxes 14:57:29 jim
Postal Address_LDAPSyntax 14:56:15 jim
Case Ignore List 14:54:38 jim
1.3.6.1.4.1.1466.115.121.1.41 14:49:18 jim
Counter_LDAPSyntax 14:33:03 jim
2.16.840.1.113719.1.1.5.1.22 14:06:24 jim Counter_AttribuType ==> Counter_LDAPSyntax
Counter 14:01:08 jim XCounter ==> Counter
JSPWikiCorePlugins 14:01:08 jim XCounter ==> Counter
JSPWikiPlugins 14:01:08 jim XCounter ==> Counter
Time To Live 14:01:08 jim XCounter ==> Counter
Edirectory Filtered Replicas 13:57:22 jim
ReplicaType 13:56:48 jim
X-NDS_FILTERED_OPERATIONAL 11:34:17 jim
X-NDS_FILTERED_REQUIRED 11:33:45 jim
ReplicaAddressHint 11:18:56 jim
ReplicaState 11:08:06 jim
Edirectory Replicas 11:06:57 jim
NDS Sparse Read Replica 10:44:02 jim
EDirectory Synchronization 10:37:58 jim
NDS Sparse Write Replica 10:37:03 jim EdirectoryFilteredReadWriteReplica ==> NDS Sparse Write Replica
NDS Replica Pointer 10:30:07 jim
2.16.840.1.113719.1.1.5.1.16 10:15:35 jim
Replica 10:14:28 jim
Replica number 10:05:33 jim
Replica List 10:03:26 jim
Partition Root Entry 10:01:25 jim
Schema Sync 09:56:21 jim
Removing Failed Server 09:44:51 jim
NDS Subordinate Reference Replica 09:41:58 jim EdirectorySubordinateReferenceReplica ==> NDS Subordinate Reference Replica
NDS Read-Only Replica 09:36:50 jim Edirectory ReadOnly Replica ==> NDS Read-Only Replica
NDS Read-Write Replica 09:33:00 jim EdirectoryReadWriteReplica ==> NDS Read-Write Replica
NDS Master Replica 09:28:52 jim
12.11.2018
Web Blog_blogentry_121118_1 13:50:23 jim
Verifiable Claims 13:03:08 jim
Identifier registry 12:06:28 jim
Web Blog_blogentry_090217_1 11:57:17 jim
Password Statistics 11:41:10 jim
CAPTCHA 11:40:30 jim
Relying Party 11:40:12 jim
OpenAM 11:39:55 jim
Social Login 11:39:33 jim
Best Practices Password 11:39:15 jim
How SSL-TLS Works 08:38:09 jim
11.11.2018
Office of Tailored Access Operations 18:57:15 jim
Government Surveillance 18:55:04 jim
QUANTUM 18:43:49 jim
DISHFIRE 18:43:21 jim
National Security Agency 18:33:21 jim
10.11.2018
RFC 269 10:28:44 jim
Foo 10:27:53 jim
RFC 3092 10:23:36 jim
Web Blog_blogentry_100818_1 10:21:32 jim
The Twelve Networking Truths 10:04:19 jim
RFC 1925 09:58:18 jim
RFC 1776 09:57:00 jim
RFC 1217 09:53:19 jim
Humorous RFCs 09:51:12 jim
RFC 6214 09:46:31 jim
RFC 2549 09:45:24 jim
A Standard for the Transmission of IP Datagrams on Avian Carriers 09:41:32 jim
09.11.2018
Password Authentication is Broken 12:24:16 jim
Password Authentication 12:10:21 jim
Credential Leaked Databases 12:09:21 jim
Web Blog_blogentry_041118_1 12:06:18 jim
Web Blog_blogentry_230418_1 12:03:59 jim
Password 11:54:50 jim
Ontology 09:36:07 jim
OperationalAttribute 08:59:07 jim
Requesting Attributes by Object Class 08:56:59 jim
AttributeSelection 08:55:59 jim
1.3.6.1.4.1.4203.1.5.2 08:45:48 jim
08.11.2018
DirXML-DriverStartOption 18:48:08 jim
07.11.2018
TRAFFICTHIEF 15:33:59 jim
MAINWAY 15:28:54 jim
MARINA 15:21:33 jim
PINWALE 15:13:58 jim
06.11.2018
Continuous integration 08:38:02 jim
05.11.2018
Attack Effort 16:56:30 jim Risk Taxonomy ==> Risk Taxonomy Technical Standard
Risk Taxonomy Technical Standard 16:56:30 jim Risk Taxonomy ==> Risk Taxonomy Technical Standard
Open Factor Analysis of Information Risk 16:55:59 jim
The Open Group 16:42:58 jim
2.16.840.1.113719.1.8.4.6 12:29:09 jim
DirectReports 12:28:43 jim
04.11.2018
Web Blog_blogentry_251018_1 12:01:57 jim
Event Data Recorder 10:58:19 jim
EDR 10:57:19 jim
TAO 10:18:53 jim
Attribution 10:02:49 jim
03.11.2018
Host Name Resolution 21:28:53 jim
Hostname 21:19:10 jim
Web Blog_blogentry_021118_1 13:01:01 jim
Privacy Paradox 10:01:09 jim
Loyalty Card 09:56:28 jim
Web Blog_blogentry_031118_1 08:40:51 jim
Human Element 08:19:00 jim
Human 08:12:00 jim
Windows Client Authentication Architecture/Windows Client Authentication Architecture.svg 07:27:13 jim
Security Account Manager 07:24:24 jim
Netlogon service 07:23:34 jim
Local Security Authority 07:22:42 jim
Winlogon 07:21:52 jim
02.11.2018
User mode and Kernel mode 22:04:52 jim
Windows Client Authentication Architecture 21:19:24 jim
Web Blog_blogentry_011118_1 12:04:09 jim
Public Key Cryptography Based User-to-User 12:02:30 jim
PKU2U 11:53:42 jim
Negotiate SSP 11:52:59 jim
Security Support Provider 11:52:38 jim
CredSSP 11:45:20 jim
Corporate Censorship 10:08:59 jim
Year 1934 09:43:47 jim
Telecommunications Act 09:43:16 jim
Organizational Censorship 09:19:07 jim
Censorship 09:05:24 jim
Hate speech 09:02:03 jim
Free Expression 08:49:39 jim
Privacy 08:29:25 jim
01.11.2018
Encryption 14:14:29 jim
ROT13 14:10:31 jim
Substitution Cipher 14:01:21 jim
Caesar Cipher 13:57:32 jim
Offset Codebook Mode 13:53:44 jim
XorEncryptXor 13:46:18 jim
TBC 13:45:33 jim
Tweakable Block Cipher 13:45:19 jim Tweakable Blockcipher ==> Tweakable Block Cipher
XEX 13:42:53 jim
OCB2 13:37:15 jim
Consent 13:10:09 jim
Contract 13:01:04 jim
Uniform Commercial Code 12:49:00 jim
Smart contracts 12:37:16 jim
Contract of Adhesion 12:36:14 jim
TLS Client Authentication 08:43:05 jim
Mutual Authentication 08:12:54 jim
31.10.2018
Web Blog_blogentry_301018_1 12:10:35 jim
Year 1960 09:11:34 jim
Year 2099 09:10:40 jim
Year 1999 09:09:43 jim
1990s 09:05:01 jim
Year 1900 09:03:53 jim
20th Century 09:02:55 jim
21st Century 09:02:33 jim
Century 09:01:20 jim
Year 08:54:11 jim
Year 1924 08:49:22 jim
Year 1901 08:48:55 jim
Year 1939 08:48:15 jim
World War II 08:47:35 jim
Great Depression 08:46:33 jim
G.I. Generation 08:45:15 jim
Generation Y 08:43:03 jim
World War I 08:42:18 jim
Lost Generation 08:41:18 jim
Silent Generation 08:36:58 jim
Generation X 08:34:44 jim
Baby boomers 08:29:07 jim
Millennials 08:28:01 jim
Generation 08:26:03 jim
Generation Z 08:22:15 jim
Login_hint 07:53:25 jim
30.10.2018
Millennium 16:45:40 jim
Billion 16:40:57 jim
Million 16:34:56 jim
Number 16:32:18 jim
Thousand 16:29:12 jim
Hundred 16:27:03 jim
One 16:25:15 jim
Trillion 16:11:09 jim
OPM 16:03:36 jim
United States Federal Agency 16:00:54 jim
Zero Trust 14:21:42 jim
29.10.2018
PDC Emulator FSMO Role 18:11:11 jim
Infrastructure Master FSMO Role 18:08:24 jim
RID Master FSMO Role 18:08:18 jim
Domain Naming Master FSMO Role 18:08:12 jim
Schema Master FSMO Role 18:08:06 jim
Flexible Single Master Operation 18:05:16 jim
DirXMLState 18:05:08 jim
DirXML Driver 18:05:01 jim
Main 09:02:49 jim
28.10.2018
Notify and Reset Subscriber Filter 15:16:12 jim
Signatures with efficient protocols 14:11:20 jim
Group Signatures 14:11:08 jim
CL Signature 14:00:29 jim
Digital Signature 13:56:25 jim
Blue Button 12:13:25 jim
Electronic Health Record 11:54:43 jim
Patient Data 11:02:28 jim
Registry 09:44:30 jim
Patient matching 09:36:01 jim
Web Blog_blogentry_161018_1 09:00:21 jim
ERROR_DS_ENCODING_ERROR 08:07:15 jim
DN Escape Values 08:06:16 jim
ERROR_DS_NON_BASE_SEARCH 08:01:06 jim
LDAP Dereference Control 07:44:44 jim
1.3.6.1.4.1.4203.666.5.16 07:38:56 jim
SupportedControl 07:26:17 jim
27.10.2018
Paper Size 15:38:53 jim
Web Blog_blogentry_271018_1 15:03:55 jim
Guam 11:40:37 jim
American Samoa 11:40:02 jim
United States Virgin Islands 11:39:39 jim
Northern Mariana Islands 11:39:19 jim
Puerto Rico 11:39:03 jim
Insular Areas 11:38:17 jim
Year 1954 11:36:57 jim
Unorganized territory 11:20:14 jim
Commonwealth 11:20:05 jim
Organized territory 11:19:45 jim
Incorporated territory 11:13:14 jim
Unincorporated territory 11:13:04 jim
Organic Act 11:12:39 jim
United States Territories 11:03:26 jim
Palmyra Atoll 10:46:37 jim
DOI 10:42:51 jim
United States Department of the Interior 10:42:00 jim
MP 10:07:55 jim
Country Code 10:05:57 jim
Indian Reservation 09:51:19 jim
United States Minor Outlying Islands 09:40:43 jim
2.16.840.1.113719.1.8.4.4 09:28:21 jim
City 09:28:05 jim
Townships 09:20:36 jim
County 09:14:10 jim
US States 09:06:41 jim
26.10.2018
Web Blog_comments_170914_1 14:28:55 Namertjut
Fast Healthcare Interoperability Resources 13:40:44 jim
Internet User Authorization 13:34:47 jim
IUA 13:34:09 jim
WorkFlow 12:55:44 jim
Trigger 12:51:01 jim
Office of the National Coordinator for Health Information Technology 10:57:13 jim
21st Century Cures Act 10:53:20 jim
NIH 10:50:58 jim
National Institutes of Health 10:47:53 jim
United States Department of Health and Human Services 10:43:34 jim
NHIN 10:35:08 jim
Nationwide Health Information Network 10:34:20 jim
Federal Risk and Authorization Management Program 09:09:47 jim
User Story 08:37:59 jim
Use cases 08:37:08 jim
25.10.2018
Certificate Signing Request 20:33:31 jim
RFC 5967 20:25:46 jim
PKCS10 20:24:35 jim
Federal Information Security and Management Act 14:35:16 jim
United States Privacy Act 14:32:53 jim
Patient Protection and Affordable Care Act 14:31:20 jim
Gramm-Leach-Bliley Act 14:29:01 jim
Bank Secrecy Act 14:26:38 jim
Fair Credit Reporting Act 14:25:56 jim
BSA 14:24:39 jim
Sarbanes-Oxley Act 14:19:33 jim
Computer Fraud and Abuse Act 14:18:12 jim
Federal Privacy Act 14:15:31 jim
Federal Reserve Act 14:14:21 jim
Telephone Consumer Protection Act 14:12:09 jim
Do-Not-Call 14:10:10 jim
Telemarketing and Consumer Fraud and Abuse Prevention Act 14:04:24 jim
Immigration and Nationality Act 13:54:50 jim
NSL 13:24:26 jim
National Security Letter 13:24:02 jim
RFPA 13:20:15 jim
Right to Financial Privacy Act 13:19:57 jim
Money laundering 13:11:29 jim
Money Laundering Control Act 13:08:59 jim
USA PATRIOT Act 13:03:23 jim
CLOUD Act 11:32:23 jim
Stored Communications Act 11:26:12 jim
SCA 11:21:02 jim
RFC 7292 11:16:37 jim
ECPA 11:15:41 jim
24.10.2018
IDM Related Compliance Items 13:51:46 jim
Protected Health Information 13:46:47 jim
Federal Tax Information 13:42:02 jim
United States Social Security Administration 13:40:39 jim
Social Security Number 13:40:21 jim
Medicaid 13:39:49 jim
United States Code 13:38:20 jim
U.S.C. Title 18 13:36:40 jim
Electronic Communications Privacy Act 13:34:22 jim
One-party consent 13:31:02 jim
18 U.S.C. 2511 13:27:05 jim
Social Security Act 13:25:52 jim
U.S.C. 13:25:00 jim
Dialed Number Recorder 13:23:48 jim
Private Law 13:18:30 jim
Public Law 13:15:58 jim
Act of Congress 13:10:33 jim
Web Blog_blogentry_241018_1 12:57:15 jim
SEPA 10:42:15 jim
Single Euro Payments Area 10:41:42 jim
European Payments Council 10:37:08 jim
The Berlin Group 10:29:35 jim
NextGenPSD2 10:26:11 jim
Payment Services Directive 10:24:23 jim
Four-Party Credit Card System 10:21:06 jim
Access to Account 10:18:12 jim
Payment Service User 10:14:00 jim
XS2A 10:12:59 jim
Payment Initiation Service Provider 10:10:39 jim
Account Information Service Provider 10:10:14 jim
Third Party Payment Service Provider 10:08:51 jim
OAuth 2.0 Proof-of-Possession (PoP) Security Architecture 09:32:48 jim
1.3.6.1.4.1.42.2.27.8.1.23 09:12:00 jim
21.10.2018
Information security 08:37:13 jim
Secure Remote Password Protocol 08:34:49 jim
3rd Generation Partnership Project 08:31:33 jim
Password-authenticated Key Exchange 08:28:05 jim
Secure by design 08:15:46 jim
European Telecommunications Standards Institute 08:12:23 jim
Web Blog_blogentry_211018_1 07:51:26 jim
20.10.2018
Ten Principles of Self-Sovereign Identity 10:17:46 jim
Web Blog_blogentry_191018_1 10:07:14 jim
Right to be forgotten 10:03:53 jim
Legal right 09:56:32 jim
19.10.2018
Credential 08:39:31 jim
18.10.2018
Local Security Authority Subsystem Service 12:49:06 jim
HKCU 12:43:53 jim
HIVE 12:43:24 jim
HKEY_DYN_DATA 12:42:55 jim
Windows ME 12:40:31 jim
Windows 9x 12:37:47 jim
Personal Computer 12:35:30 jim
Windows NT 12:34:55 jim
HKEY_PERFORMANCE_DATA 12:30:02 jim
HKEY_CURRENT_CONFIG 12:27:25 jim
HKU 12:25:52 jim
HKEY_USERS 12:25:36 jim
HKCC 12:24:00 jim
HKEY_CURRENT_USER 12:23:37 jim
HKEY_CLASSES_ROOT 12:20:52 jim
HKCR 12:10:01 jim
Relative IDentifier 11:36:59 jim
Primary Access Token 11:19:50 jim
Security Reference Monitor 11:12:46 jim
Access Token 11:11:23 jim
MSFT 11:09:09 jim
SRM 11:00:16 jim
Local Identity 10:32:28 jim
HKEY_LOCAL_MACHINE 10:00:11 jim
HKLM 09:49:41 jim
17.10.2018
Multiple-Input and Multiple-Output 13:41:49 jim
MIMO 13:41:25 jim
16.10.2018
DID method specification 17:02:20 jim
Sovrin Connector 16:39:43 jim
Key pair 16:13:13 jim
Hyperledger Indy 15:36:04 jim
DIGIT 15:18:53 jim
ALPHA 15:16:20 jim
National Motor Vehicle Title Information System 14:16:38 jim
VIN 14:15:46 jim
NMVTIS 14:15:19 jim
AAMVA 14:09:49 jim
State Pointer Exchange Services 13:50:19 jim
SPEXS 13:34:44 jim
Mobile Device 10:55:38 jim
Subscriber Identification Module 10:54:34 jim
BCCH 10:50:31 jim
ARFCN 10:50:00 jim
Absolute Radio-Frequency Channel Numbers 10:49:31 jim
Broadcast Control CHannel 10:47:34 jim
LAI 10:24:32 jim
Location Area Identity 10:24:09 jim
Mobile subscriber 10:22:04 jim
Integrated Circuit Card Identifier 10:06:45 jim
International Mobile Subscriber Identity 09:50:10 jim
Temporary Mobile Subscriber Identity 09:40:53 jim
Mobile Subscriber Identification Number 08:57:37 jim
International Mobile Equipment Identity 08:40:41 jim
15.10.2018
Threat Model 18:09:37 jim
Threat landscape 18:07:29 jim
The Seven Laws Of Identity 17:53:32 jim
ISO 29100 17:50:21 jim
Principle of least privilege 17:37:22 jim
OAuth 2.0 NOT an Authentication protocol 17:25:24 jim
UF_ACCOUNTDISABLE 17:15:24 jim
USER_ACCOUNT_DISABLED 17:11:12 jim
Common Active Directory Bind Errors 16:45:34 jim
Microsoft Active Directory Extensible Match Rules 15:46:48 jim
Holder 08:53:31 jim
Law of agency 08:50:16 jim
Possession Factor 08:34:24 jim
W3C Decentralized Identifiers 08:32:54 jim
14.10.2018
RFC 8485 17:25:36 jim
Vectors of Trust 17:25:04 jim
Create Read Update Delete 13:18:50 jim
Decentralized Identity 12:47:56 jim
Know Your Customer 12:46:01 jim
Data Provenance 12:07:52 jim
Verifiable Claims/vc-ecosystem-overview.png 11:57:44 jim
Entity 11:43:06 jim
Subject 11:39:03 jim
Claim 11:37:59 jim
Inspector-verifier 11:34:51 jim
Issuer 11:32:35 jim
Key Rotation 11:18:26 jim
Key Management 11:10:18 jim
CKMS 11:08:35 jim
KMS 11:07:50 jim
Key Management Service 11:07:23 jim
13.10.2018
Attack Surface 18:33:28 jim
API Development 10:40:00 jim
Bad Actor 10:36:38 jim
Attack vectors 10:31:32 jim
11.10.2018
Social Identity 17:27:13 jim
Identity Relationship Framework 17:24:26 jim
User-centric Identity 17:01:33 jim
Responsive Organizations 11:41:15 jim
10.10.2018
Product 17:04:51 jim
Service 17:04:10 jim
ServiceOutput 17:03:16 jim
Passport 17:01:00 jim
Profile 16:57:36 jim
PostalCode 16:55:32 jim
Phone Number 16:54:07 jim
Address 16:52:32 jim
Schema.org 16:50:25 jim
Name 16:40:41 jim
Organization 12:42:17 jim
Place 12:38:00 jim
Thing 12:37:04 jim
Yandex 12:21:19 jim
Link Relation Types 12:16:09 jim
StreetAddress 12:07:03 jim
Street 12:05:23 jim
2.5.4.9 11:59:25 jim
Data Protection 11:37:14 jim
Personal data 11:26:58 jim
Taxonomy 11:12:58 jim
AtMention 11:11:09 jim
Folksonomy 11:09:57 jim
Hashtag 11:08:32 jim
User-generated content 11:03:48 jim
Bug 09:58:55 jim
Data loss 09:57:42 jim
Data Breach 09:54:51 jim
Implementation Vulnerability 09:44:24 jim
Breach 09:42:09 jim
09.10.2018
Jim Willeke Resume 16:14:54 jim
Custodial Wallet 15:23:11 jim
RFC 8472 14:26:04 jim
RFC 8473 14:24:39 jim
RFC 8471 14:23:51 jim
Token Binding Protocol Negotiation 14:22:32 jim
Token Binding Protocol 14:21:40 jim
Token Binding over HTTP 14:21:09 jim
Bitcoin address 12:35:21 jim
Web Blog_blogentry_091018_1 12:29:52 jim
Data Privacy 12:29:00 jim
Right of access 11:49:14 jim
Acceptable Use 11:26:10 jim
Unexpected benefit 10:57:56 jim
Data portability 10:31:10 jim
Electronic Health 09:17:27 jim
EHealth 09:05:24 jim
08.10.2018
STRAITBIZARRE 11:21:01 jim
DROPOUTJEEP 11:18:37 jim
Web Blog_blogentry_081018_1 11:14:07 jim
Optic Nerve 11:13:33 jim
Integrated Automated Fingerprint Identification System 11:02:15 jim
Identity Verification Service 11:00:50 jim
United States Intelligence Community 11:00:22 jim
United States Census Bureau 10:59:56 jim
Traveler Verification Service 10:57:40 jim
CountryOfResidence 10:56:58 jim
1.3.6.1.4.1.8876.2.1.30 10:56:29 jim
Nonimmigrant Information System 10:50:40 jim
Combined DNA Index System 10:50:06 jim
State Identification Number 10:49:29 jim
Group of 20 10:42:36 jim
Terrorist Screening Database 10:40:36 jim
Repository for Individuals of Special Concern 10:40:21 jim
OAKSTAR 10:39:30 jim
STORMBREW 10:39:15 jim
BLARNEY 10:38:56 jim
National Crime Information Center 10:37:43 jim
TOYGRIPPE 10:36:28 jim
Unified Passenger Module 10:35:18 jim
United States Visitor and Immigrant Status Indicator 10:35:04 jim
Intelligence Agencies 10:34:52 jim
Border Crossing Information 10:34:12 jim
Automated Targeting System 10:33:32 jim
Automated Biometric Identification System 10:33:10 jim
Advanced Fingerprint Identification Technology 10:30:24 jim
Advance Passenger Information System 10:30:07 jim
KEYCARD 10:29:45 jim
HAMMERSTEIN 10:28:48 jim
APEX 10:12:30 jim
BOUNDLESSINFORMANT 10:12:13 jim
PRISM 10:12:00 jim
ECHELON 10:11:14 jim
XKEYSCORE 10:11:01 jim
TURMOIL 10:10:43 jim
TURBULENCE 10:10:21 jim
SIGINT 10:09:50 jim
Spying 10:05:57 jim
FAIRVIEW 10:04:59 jim
Surveillance 09:49:09 jim
Implied consent 09:41:55 jim
Express Consent 09:35:42 jim
Explicit consent 09:35:19 jim Express consent ==> Explicit consent
Upstream Surveillance 09:11:32 jim
LPR 08:52:17 jim
ALPR 08:51:52 jim
License Plate 08:49:12 jim
CarLicense 08:45:15 jim
07.10.2018
Web Blog_blogentry_071018_1 11:50:51 jim
UPort 11:18:39 jim
ERC1056 11:12:07 jim
Lightweight Ethereum Identity 11:11:45 jim
Issued_token_type 10:43:20 jim
Want_composite 10:40:30 jim
Subject_token_type 10:38:18 jim
Actor_token_type 10:37:36 jim
Actor_token 10:36:24 jim
Subject_token 10:34:00 jim
Requested_token_type 10:32:50 jim
Token Type Identifiers 10:30:40 jim
OAuth 2.0 Token Exchange 10:21:29 jim
OAuth 2.0 Token Exchange Request 10:20:42 jim
Token-exchange 10:14:01 jim
Cool Identity Token Uses 10:08:37 jim
Impersonation 09:41:05 jim
May_act (May Act For) Claim 09:33:00 jim
Act (Actor) Claim 09:17:31 jim
06.10.2018
Multi-Source Identity 10:48:35 jim
Self-Sovereign Identity 10:47:11 jim
NIS 10:11:51 jim
Discovery Mechanism 10:06:40 jim
NetBIOS Name Service 10:01:16 jim
Domain Name System 09:58:46 jim
Windows Internet Name Service 09:54:40 jim
Name Service 09:51:59 jim
Namespace 09:51:09 jim
RFC 1002 09:49:54 jim
RFC 1001 09:48:23 jim
DIF 09:24:10 jim
Domain of OneS Own 09:06:17 jim
Sovereign-source Identity 08:58:44 jim
Independent Identity 08:54:36 jim
05.10.2018
ADSTYPE_DN_STRING 11:08:34 jim
DN String 11:06:23 jim
Microsoft Active Directory Syntax 11:05:50 jim
Object(DS-DN) 10:57:22 jim
2.5.5.1 10:55:46 jim
Access Point 10:51:29 jim
1.3.6.1.4.1.1466.115.121.1.2 10:51:02 jim
Object(Access-Point) 10:42:47 jim
2.5.5.14 10:39:59 jim
ADSTYPE_DN_WITH_STRING 10:33:04 jim
DNWithString 10:32:21 jim
DN-String 10:32:03 jim
ADSTYPE_DN_WITH_BINARY 10:26:12 jim
DNWithOctetString 10:25:11 jim
DNWithBinary 10:24:11 jim
DN-Binary 10:24:04 jim
DN Syntax 10:14:03 jim
Draft-armijo-ldap-syntax-00 09:53:41 jim
LDAP_SERVER_EXTENDED_DN_OID 09:31:20 jim
1.2.840.113556.1.4.529 09:26:06 jim
Security Descriptor Description Language 09:24:12 jim
2.5.5.16 09:11:44 jim
2.5.5.9 09:10:28 jim
AttributeSchema 09:04:54 jim
MapiID 08:56:55 jim
IsEphemeral 08:44:10 jim
ClassDisplayName 08:35:27 jim
IsDefunct 08:31:37 jim
AttributeSecurityGUID 08:24:48 jim
ExtendedCharsAllowed 08:16:47 jim
04.10.2018
Microsoft Active Directory Attributes 21:08:14 jim
1.2.840.113556.1.4.914 21:02:52 jim
AllowedAttributesEffective 21:02:21 jim
FLAG_DOMAIN_DISALLOW_RENAME 20:58:34 jim
LegacyExchangeDN 20:52:16 jim
Assistant 20:51:05 jim
RSVP 20:15:11 jim Resource Reservation Protocol ==> Resource ReSerVation Protocol
Resource ReSerVation Protocol 20:15:11 jim Resource Reservation Protocol ==> Resource ReSerVation Protocol
RFC 2205 20:14:59 jim
QoS 20:13:42 jim
Quality of Service 20:13:27 jim
AccountExpires 20:02:01 jim
AttributeSyntax 19:55:38 jim
Access Token Validation 11:42:33 jim
Data Controller 10:02:29 jim
Data curation 09:56:37 jim
Data Ownership 09:48:00 jim
Copyright 09:15:14 jim
Open data 09:09:44 jim
Linked Data 09:06:43 jim
Inrupt, Inc 08:59:04 jim
Solid 08:57:06 jim
WebID 08:39:25 jim SOLID ==> Solid
GS1 Country Code 08:12:48 jim
Iran 08:10:19 jim
03.10.2018
FOXACID 16:47:15 jim
TURBINE 16:11:21 jim QUANTUMTHEORY ==> QUANTUM
RAMPART-A 16:05:47 jim
Year 1971 15:58:47 jim
PRESSUREWAVE 15:57:56 jim
NZL 15:55:20 jim
NZ 15:55:04 jim
New Zealand 15:53:22 jim
NSA Suite A Cryptography 15:46:57 jim
Menezes-Qu-Vanstone 15:32:45 jim
RFC 6379 15:32:02 jim
RFC 6239 15:31:31 jim
RFC 6460 15:31:11 jim
RFC 5759 15:31:07 jim
NSA Suite B Cryptography 15:24:23 jim
FIPS Based Cipher Suites 15:15:44 jim
N4u.server.fips_tls 15:09:01 jim
EDirectory TLS 15:06:15 jim
EDirectory 14:41:12 jim
NumericStringMatch 11:55:32 jim
KeywordMatch 11:48:05 jim
MatchingRule 11:37:13 jim
RFC 3641 11:29:49 jim
GSER 11:29:15 jim
Generic String Encoding Rules 11:28:55 jim
RdnMatch 11:27:03 jim
Component Matching Rules 11:10:52 jim
IntegerFirstComponentMatch 10:44:42 jim
DirectoryStringFirstComponentMatch 10:33:15 jim
CaseIgnoreOrderingMatch 10:26:49 jim
CaseIgnoreListSubstringsMatch 10:20:18 jim
EQUALITY 10:15:07 jim
MatchingRuleUse 10:10:36 jim
Greater-Or-Equal SearchFilter 10:03:32 jim
AND SearchFilter 10:02:02 jim
EqualityMatch 09:59:13 jim
Substrings 09:55:07 jim
Schema Partition 09:42:41 jim
LDAP Filter Choices 09:37:57 jim
LDAP Three-valued logic 09:32:52 jim
SearchResultEntry 09:28:12 jim
Search Responses 09:26:08 jim
Web Blog_blogentry_031018_1 09:10:37 jim
Ambiguous Name Resolution 09:05:21 jim
ANR attribute set 08:49:22 jim
02.10.2018
ANR 21:18:16 jim
UsnChanged 18:28:14 jim
1.2.840.113556.1.2.120 18:25:10 jim
FLAG_ATTR_IS_OPERATIONAL 18:22:24 jim
X-SYSTEMFLAGS 18:21:22 jim
UTCTime 18:11:18 jim
USN 18:11:07 jim
Update Sequence Number 18:10:49 jim
Web Blog_blogentry_021018_1 18:04:47 jim
Microsoft TIME 17:51:23 jim
X-NDS_SYNTAX 17:29:49 jim
IA5String 17:25:46 jim
LDAP Schema 17:06:54 jim
Schema Extensions 14:26:01 jim
EDirectory Schema Reference 14:10:34 jim
LDAP Schema Element Type 14:01:51 jim
Write-managed 13:53:19 jim Novell Schema Documentation ==> EDirectory Schema Reference
Novell Developer Kit 13:52:01 jim
NDK 13:46:41 jim
Resource 13:46:03 jim
2.16.840.1.113719.1.1.6.1.21 13:42:48 jim
HostResourceName 13:41:58 jim
Smssmdrclass 13:36:11 jim
Status 13:31:15 jim status ==> Status
CertificateRevocationList 13:30:43 jim certificateRevocationList ==> CertificateRevocationList
CertificateRevocation 13:29:42 jim certificateRevocation ==> CertificateRevocation
MailHost 13:24:26 jim mailHost ==> MailHost
MailAlternateAddress 13:23:49 jim mailAlternateAddress ==> MailAlternateAddress
MailForwardingAddress 13:23:05 jim mailForwardingAddress ==> MailForwardingAddress
LDAPSchemasForNISInLDAP 13:22:31 jim
NSCP 13:20:53 jim
2.16.840.1.113730.3.1.3 13:16:27 jim
EmployeeNumber 13:16:06 jim
LDAP Schema for NDS 13:04:06 jim
1.3.6.1.1.1.2.4 13:01:55 jim
IpProtocol 13:01:31 jim
IpProtocolNumber 12:57:00 jim ipProtocolNumber ==> IpProtocolNumber
AutomountMapName 12:56:16 jim automountMapName ==> AutomountMapName
Extended Flags 12:55:26 jim
LDAP Schema Element Extensions 12:52:49 jim
DS_NONREMOVABLE_ATTR 12:41:29 jim
X-NDS_NON_REMOVABLE 12:40:44 jim
X-NDS_NONREMOVABLE 12:40:30 jim
X-NDS_NOT_CONTAINER 12:37:57 jim
X-NDS_NAME 12:36:49 jim
X-NDS_CONTAINMENT 12:35:47 jim
X-NDS_NAMING 12:34:31 jim
Draft-sermersheim-nds-ldap-schema 12:07:47 jim
GS1 Company Prefix 10:00:23 jim
Global Trade Item Number 09:50:45 jim
GS1 Product Code 09:47:58 jim
GS1 Manufacturer Code 09:45:01 jim Manufacturer Code ==> GS1 Manufacturer Code
GTIN 09:30:14 jim
United Nations Standard Products and Services Code 09:28:13 jim
UNSPSC 09:10:06 jim
GS1 09:02:13 jim
Industry 08:59:58 jim
SWIFT code 08:58:27 jim
Common Vulnerability Scoring System 08:54:14 jim
ISO 10646 08:53:30 jim
Car Connectivity Consortium 08:52:53 jim
PCI Data Security Standard v3.1 08:51:48 jim
DSL 08:50:23 jim
Export Control Classification Number 08:48:19 jim
Commerce Control list 08:46:50 jim
NASD 08:42:37 jim
Financial Industry Regulatory Authority Inc 08:41:56 jim
Industry Classification 08:37:26 jim
Major Industry Identifier 08:29:02 jim
Payment Card Industry 08:27:17 jim
LOB 08:22:23 jim
Line Of Business 08:21:56 jim
Merchant Category Code 08:18:13 jim
Merchant 07:47:05 jim
01.10.2018
AVS 18:31:29 jim
Address Verification System 18:30:28 jim
Card Verification Method 18:27:59 jim
Merchant Service Provider 18:24:40 jim
Card Issuer 18:23:08 jim
Interchange Fee 18:21:22 jim
Card Processor 18:12:30 jim
Payment Network 18:03:26 jim
MSP 18:00:17 jim
OAuth Parameters Registry 09:23:44 jim
Vector of Trust Request 09:23:16 jim
Vtr 09:12:46 jim
Upgraded 09:08:53 jim
Permission ticket 09:03:12 jim
Ticket 09:01:09 jim
Claim_token 08:56:39 jim
Persisted Claims Token 08:53:17 jim
PCT 08:50:33 jim
User-Managed Access Work Group 08:38:31 jim
UMA 2.0 Grant for OAuth 2.0 08:35:29 jim
Claims_locales 08:21:47 jim
Ui_locales 08:14:53 jim
Language-Tag 08:12:44 jim
BCP 47 08:07:47 jim
Tel 08:03:56 jim
RFC 3966 08:02:55 jim
RFC 5341 08:02:24 jim
OpenID Connect Standard Claims 07:57:53 jim
30.09.2018
Web Blog_blogentry_300918_1 11:38:57 jim
Tink 11:31:27 jim
BoringSSL 11:25:19 jim
The Onion Router 11:09:35 jim
Quick UDP Internet Connections 10:58:13 jim
CurveCP 10:55:29 jim
DNSCurve 10:49:21 jim
Perfect Forward Secrecy 10:45:25 jim
Forward Secrecy 10:43:18 jim
X25519 10:07:11 jim
29.09.2018
Modernity 12:21:22 jim
SRI 12:18:53 jim
SRI International 12:18:34 jim
ARPANET 12:17:48 jim
NPL Data Communications Network 12:16:13 jim
Metrology 12:13:55 jim
National Physical Laboratory 12:13:02 jim
Packet switching 12:11:04 jim
Year 1964 11:59:34 jim
Defense Advanced Research Projects Agency 11:53:08 jim
ARPA 11:51:21 jim
Advanced Research Projects Agency 11:50:27 jim
RAND Corporation 11:30:48 jim
Web Blog_blogentry_290918_1 11:18:55 jim
DunbarS Numbers 11:10:28 jim
John Doerr 10:03:19 jim
Objectives and Key Results 09:59:46 jim
Single Sign-On 09:32:31 jim
WEB Single Sign-On 09:27:19 jim
GCP Virtual Private Cloud 09:25:26 jim
Local device 09:24:00 jim
On-premise 09:23:34 jim
Cloud Access Security Broker 09:21:40 jim
Identity Broker 09:19:33 jim
28.09.2018
Client Login Extension 13:16:01 jim
NMAS Result Codes 13:14:49 jim
SASDFM 13:12:27 jim
SASLoginSequence 11:35:43 jim sASLoginSequence ==> SASLoginSequence
NMAS_E_INVALID_SPM_REQUEST 11:27:53 jim
Dump Password Information Tool-Trouble Shooting 11:27:19 jim
NMAS_E_ACCESS_NOT_ALLOWED 11:22:55 jim
DSE_NMAS_LOG_FINISH_LOGIN_STATUS 11:19:50 jim
NMAS_E_LOGIN_FAILED 11:17:43 jim NMAS -1642 ==> NMAS_E_LOGIN_FAILED
NMAS 11:16:32 jim
SSSD 10:27:16 jim
Cryptographically secure pseudorandom number generator 10:24:03 jim
GCP Zonal 10:22:14 jim
Server_error 10:21:03 jim
Action 10:18:41 jim
XDAS Action 10:14:53 jim
Unfortunate event 10:11:43 jim
Unintended consequence 10:08:49 jim
Perverse result 10:01:37 jim
SSL-TLS Interception 09:57:11 jim
CTAP2 09:48:40 jim
Client To Authenticator Protocol 09:39:36 jim
U2F 09:33:27 jim
27.09.2018
LDAP_MATCHING_RULE_IN_CHAIN 18:15:20 jim
1.2.840.113556.1.4.1941 18:06:31 jim
Filtering for Bit Fields 18:00:40 jim
LDAP_MATCHING_RULE_BIT_AND 17:56:58 jim
1.2.840.113556.1.4.803 17:56:44 jim
LDAP_MATCHING_RULE_BIT_OR 17:55:57 jim
1.2.840.113556.1.4.804 17:55:40 jim
Bitmask 17:42:13 jim
Filtered Attribute Set 17:12:29 jim
Application Directory Partitions 16:39:25 jim
Directory Partition Hierarchy 16:25:00 jim
Domain Directory Partition 16:20:17 jim
Schema Directory Partition 16:16:50 jim
Configuration Directory Partition 16:15:27 jim
Directory Partition Subtrees 16:11:02 jim
NamingContext 15:44:21 jim
PDC 15:16:07 jim
ObjectSID 15:07:41 jim
BackLink 14:32:53 jim
Forward link 14:30:47 jim
Linked Attribute 14:28:10 jim
2.5.5.7 14:23:55 jim
ISIN 14:17:55 jim
ISO 6166 14:17:20 jim
International Securities Identifying Number 14:15:14 jim
ISO 3901 14:11:27 jim
International Standard Recording Code 14:10:20 jim
ISRC 14:08:31 jim
US 13:45:15 jim
UM 13:42:54 jim
Co 13:41:16 jim
0.9.2342.19200300.100.1.48 13:37:06 jim
BuildingName 13:36:50 jim
0.9.2342.19200300.100.1.38 13:31:27 jim
AssociatedName 13:27:57 jim
1.2.840.113556.1.2.50 13:14:10 jim
LinkID 13:13:51 jim
MsDS-User-Account-Control-Computed 12:52:01 jim
Constructed Attribute 12:51:22 jim
User-Account-Control Attribute Values 12:19:43 jim
ACCOUNTDISABLE 12:16:08 jim
SCRIPT 12:13:48 jim
USER_USE_AES_KEYS 12:08:19 jim
Cipher Suite 11:46:45 jim
MsDS-SupportedEncryptionTypes 11:45:27 jim
NO-USER-MODIFICATION 11:19:53 jim
Messaging Application Programming Interface 11:18:32 jim
MAPI 11:10:00 jim
2.5.5.10 11:02:43 jim
1.2.840.113556.1.2.218 10:59:21 jim
OMObjectClass 10:58:52 jim
RFC 1278 10:49:33 jim
Presentation Address 10:48:34 jim
1.2.840.113556.1.1.1.12 10:46:48 jim
Replica Link 10:13:50 jim
PresentationAddress 09:25:21 jim
1.3.6.1.4.1.1466.115.121.1.38 09:16:05 jim
1.2.840.113556.1.2.49 08:35:31 jim
OMSyntax 08:24:26 jim
LDAPDisplayName 08:21:17 jim
26.09.2018
IsMemberOfPartialAttributeSet 19:18:06 jim
SchemaIDGUID 19:12:25 jim
AttributeID 19:10:31 jim
IsSingleValued 19:09:43 jim
RangeUpper 19:08:35 jim
RangeLower 19:07:37 jim
LOWERBOUND 19:07:00 jim
SchemaFlagsEx 19:00:30 jim
SystemOnly 18:55:58 jim
MsDS-PhoneticDepartment 18:50:08 jim
FRODCFilteredAttribute 18:49:48 jim
Active Directory Schema Attributes 18:27:51 jim
MsDS-PhoneticCompanyName 18:25:28 jim
25.09.2018
Integrated Digital Enhanced Network 14:45:37 jim
IDEN 14:43:53 jim
MEID 14:32:22 jim
SNR 14:31:28 jim
SVN 14:29:09 jim
Software Version Number 14:28:52 jim
IMEI Software Version 14:22:20 jim
Type Allocation Code 14:20:12 jim
Digit 14:19:16 jim
Final Assembly Code 14:17:25 jim
FAC 14:10:34 jim
Reporting Body Identifier 14:03:42 jim
British Approvals Board for Telecommunications 13:52:52 jim
BABT 13:52:29 jim
SerialNumber 13:44:33 jim
Wiki Link Syntax 13:31:18 jim
L10n 13:29:01 jim
I18n 13:28:35 jim
Internationalization and Localization 11:24:26 jim
Preparation, Enforcement, and Comparison of Internationalized Strings 11:19:15 jim
RFC 3454 11:17:20 jim Internationalization ==> Internationalization and Localization
RFC 7564 11:04:28 jim
RFC 8264 11:04:01 jim
PRECIS 11:00:33 jim
RFC 2377 10:49:26 jim
24.09.2018
Netflix 18:36:31 jim
Join AD Domain 18:34:34 jim
Global Catalog 18:31:19 jim
AD DOMAIN 18:29:34 jim
Bounded Context 18:27:10 jim
Domain 18:25:51 jim
Policy Core Information Model 18:16:55 jim
Common Open Policy Service 18:15:21 jim
RFC 3060 18:06:15 jim
RFC 3460 18:05:01 jim
PCIM 18:03:05 jim
Policy Core Extension LDAP Schema 17:56:24 jim
PCELS 17:53:58 jim
HomePhone 17:49:52 jim
1.3.6.1.4.1.453.7.2.8 17:42:32 jim
AssociatedInternetGateway 17:42:14 jim
0.9.2342.19200300.100.1.37 17:32:21 jim
Name Registration Scheme 17:31:38 jim
NRS 17:28:46 jim
AssociatedDomain 17:26:11 jim
0.9.2342.19200300.100.1.26 17:21:01 jim
ARecord 17:20:19 jim
AliasedEntryName 17:13:58 jim
LDAP Object Identifier Descriptors 17:12:50 jim
Draft-wahl-ldap-adminaddr-05 17:08:23 jim
2.5.13.21 17:02:14 jim
TelephoneNumberSubstringsMatch 17:00:30 jim
Access Log 16:41:59 jim
LDAP Protocol Exchanges 16:40:32 jim
LDAP Message 16:37:33 jim
PUM 16:32:34 jim
Matched DN 16:31:12 jim DefinitionMatchedDN ==> Matched DN
LDAP Result 16:30:49 jim
DcObject 09:24:38 jim
Dc 09:20:05 jim
2.16.840.1.113719.1.48.4.1.18 09:13:51 jim
NdspkiIssueTime 09:13:29 jim
2.5.5.11 09:09:15 jim
1.3.6.1.4.1.1466.115.121.1.53 09:08:44 jim
ADSTYPE_UTC_TIME 09:04:45 jim
GeneralizedTime 08:50:39 jim
DefinitionGeneralizedTime 08:45:03 jim
Time synchronization 08:36:22 jim
Windows Time service 08:35:54 jim
Time sync 08:33:45 jim
Synchronization 08:29:55 jim
W32Time 08:24:40 jim
RFC 5905 08:11:32 jim
Network Time Protocol 08:10:41 jim
Simple Network Time Protocol 08:09:44 jim
SNTP 08:09:06 jim
Why is Time Important 08:02:38 jim
Verify Time is Synchronized 07:59:21 jim
23.09.2018
Cluster Orchestration System 20:33:26 jim
State of the Internet-Security Report 19:50:28 jim
Credential stuffing 09:06:13 jim
Akamai 09:03:27 jim
VNM 09:01:33 jim
VN 09:01:13 jim
Vietnam 09:00:43 jim
RFC 1267 08:53:17 jim
Border Gateway Protocol 08:52:39 jim
BGP 08:51:37 jim
AS 08:51:03 jim
Autonomous System 08:49:54 jim Autonomous system ==> Autonomous System
Autonomous System Number 08:49:54 jim Autonomous system ==> Autonomous System
RFC 6793 08:49:33 jim
ASN 08:47:09 jim
Web Blog_blogentry_230918_1 08:44:07 jim
Bot 08:38:13 jim
Botnet 08:31:11 jim
22.09.2018
BaseObject 21:53:22 jim
X-SEARCH-FLAGS 10:52:37 jim
FAS 10:42:56 jim
Read-Only Domain Controller 10:30:35 jim
LDAP Extensions and Controls Listing 10:29:14 jim
Active Directory Functional Levels 10:28:10 jim
Forest functional levels 10:26:50 jim
RODC 10:26:00 jim
PARTIAL_SECRETS_ACCOUNT 10:25:04 jim
Windows Server 2003 R2 09:27:02 jim
Code 09:24:44 jim
FPARTITIONSECRET 09:20:33 jim
FBASEONLY 09:20:20 jim
FEXTENDEDLINKTRACKING 09:20:11 jim
FNEVERVALUEAUDIT 09:19:49 jim
FCONFIDENTIAL 09:19:42 jim
FSUBTREEATTINDEX 09:19:33 jim
FTUPLEINDEX 09:19:14 jim
FCOPY 09:19:04 jim
FPRESERVEONDELETE 09:18:56 jim
FPDNTATTINDEX 09:18:47 jim
FATTINDEX 09:18:25 jim
SystemFlags 09:17:26 jim
ProxyAddresses 09:14:15 jim
FANR 09:12:03 jim
LDAP Indexes 09:06:19 jim
SubstringIndex 09:04:55 jim DefinitionSubstringIndex ==> SubstringIndex
PhysicalDeliveryOfficeName 08:42:40 jim
2.5.4.19 08:41:57 jim
MsDS-AdditionalSamAccountName 08:32:30 jim
SearchFlags 08:03:37 jim
Web Blog_blogentry_220918_1 07:55:14 jim
NAME 07:51:15 jim
1.2.840.113556.1.4.1 07:46:50 jim
20.09.2018
Business to Business 17:54:52 jim
Financial-grade API 15:39:01 jim
Authorization Code 15:31:48 jim
Authorization Code Flow 15:29:47 jim
Refresh Token 15:27:53 jim
Sender Constrained Token 15:20:31 jim
Token 15:17:50 jim
Contractor 11:30:35 jim
Vender 11:29:46 jim
Dat Protocol 09:53:09 jim
Member 09:16:18 jim
Distributed Web 09:04:17 jim
EE 08:54:37 jim
19.09.2018
MGT 18:28:06 jim
E.214 18:25:50 jim
Signalling Connection Control Part 18:24:33 jim
Mobile Global Title 18:23:42 jim
Mobile Network Code 18:08:45 jim
National Destination Code 18:04:40 jim
Telephone Numbering Plan 17:45:42 jim
North American Numbering Plan 17:39:47 jim
Easily Recognizable Code 17:31:32 jim
ERC 17:31:05 jim
N11 17:27:45 jim
E.164 17:24:02 jim
Number Plan Area 17:21:52 jim
NPA 17:17:14 jim
9-1-1 16:59:03 jim
ELS 16:58:06 jim
Public Safety Answering Point 16:57:27 jim
PSAP 16:56:56 jim
Next Generation 9-1-1 16:56:34 jim
United States Department of Transportation 16:56:09 jim
USDOT 16:55:28 jim
Emergency Location Service 16:40:15 jim
Web Blog_blogentry_190918_1 16:15:29 jim
18.09.2018
Primitive data type 09:28:48 jim
Integer 09:25:33 jim
Mailbox 09:20:51 jim
DOLLAR 09:17:15 jim
Other Mailbox 09:13:43 jim
LDAP Syntax Description 09:08:35 jim
DESC 09:07:15 jim
Boolean 08:59:25 jim
1.3.6.1.4.1.1466.115.121.1.7 08:53:58 jim
Fixed-point 08:36:56 jim
NaN 08:19:22 jim
IEEE 754 08:18:15 jim
Floating-point 08:14:59 jim
17.09.2018
SP 14:32:42 jim
ESC 14:31:36 jim
CAN 14:31:18 jim
NAK 14:30:45 jim
ACK 14:29:41 jim
Control character 14:28:34 jim
NUL 14:27:18 jim
Null 14:27:03 jim
SCIM Attributes 14:25:39 jim
SAFE-INIT-CHAR 14:25:15 jim
SAFE-CHAR 14:24:47 jim
1.3.6.1.4.1.1466.101.120.5 14:24:24 jim
DSA-Specific Entry 14:23:32 jim
Certificate Algorithm ID 14:23:17 jim
Abstract Syntax Notation One 14:22:41 jim
2,147,483,647 14:22:15 jim
Acknowledgement 14:19:58 jim
FHIR Resource 13:52:14 jim
Cisco Cables 13:45:09 jim
NACK 13:37:04 jim
Negative-Acknowledge 13:36:45 jim
Temp 13:12:17 jim
FF 13:05:41 jim
Form Feed 13:05:25 jim
EOL 13:01:14 jim
End Of Line 13:00:31 jim
LF 13:00:07 jim
Line Feed 12:59:47 jim
ASCII Table 12:53:22 jim
MyStartPage 12:37:26 jim
DEL 12:35:09 jim
Carriage Return 12:29:32 jim
Character 12:26:41 jim
Escape character 12:23:39 jim
SPACE 12:15:55 jim
CR 12:10:12 jim
RS 11:24:02 jim
Z-Wave 11:03:44 jim
Round-Trip Time 11:00:36 jim
TTL 10:47:59 jim
DNS Resource Records 10:47:23 jim
NSCD 10:45:48 jim
Graphics Cables 10:43:38 jim
Microsoft Active Directory Anomalies 10:38:15 jim
Payment Token 10:35:23 jim
Morse Code 10:23:14 jim
Braille 10:22:49 jim
XML 10:22:23 jim
Extensible Markup Language 10:22:07 jim
JavaScript Object Notation 10:21:43 jim
JSON 10:21:07 jim
Decimal 10:20:07 jim
Base-10 10:19:38 jim
Hexadecimal 10:19:11 jim
Base-16 10:17:59 jim
Binary 10:17:45 jim
Data representation 10:15:31 jim
WILL_NOT_PERFORM 10:13:15 jim
Verifying Certificate Signatures 10:13:01 jim
TLS 1.3 Cipher Suites 10:12:39 jim
NetWare Core Protocol 10:12:08 jim
LocalEntryID 10:11:41 jim
HTML Colour Names 10:11:11 jim
Ldapsearch Networkaddress 10:10:39 jim
LDIF eDirectory Indexes 10:09:57 jim
ERROR_PASSWORD_RESTRICTION 10:09:05 jim
ERROR_PASSWORD_MUST_CHANGE 10:08:38 jim
Common Edirectory Bind Errors 10:07:11 jim
ATTRIBUTE ALREADY EXISTS (-615) 10:05:55 jim
2.16.840.1.113719.1.203.4.33 10:04:40 jim
DhcpRelayAgentInfo 10:04:21 jim
Hex 09:57:32 jim
Token68 09:56:37 jim
Base64 09:54:04 jim
Positional notation 09:49:25 jim
Base-2 09:45:25 jim
Bitmap 09:28:03 jim
16.09.2018
MITRE Corporation 20:44:30 jim
EVM 20:22:40 jim
Ethereum Virtual Machine 20:22:13 jim
15.09.2018
DNS Privacy Considerations 09:45:39 jim
DNSCrypt 09:41:27 jim
DNS resolvers 09:40:13 jim
Recursive name server 09:31:01 jim
DoT 09:14:21 jim
DNS over TLS 09:13:58 jim
RFC 7858 09:09:30 jim
DNS over HTTPS 09:06:52 jim
RFC 7626 08:46:08 jim
14.09.2018
Ground truth 08:04:57 jim
13.09.2018
OS2 15:34:15 jim
LAN Manager 15:28:43 jim
MS-CHAP 15:24:36 jim
LANMAN 15:23:29 jim
Indy 15:14:14 jim
NFC 15:11:26 jim
Peer 15:04:54 jim
Peer-to-peer 15:02:41 jim
Trustless 15:01:18 jim
JLINC 14:57:56 jim
Decentralized Exchange 14:54:13 jim
Roots of Trust 14:52:11 jim
Trusted Service Manager 14:52:05 jim
Juridical Person 14:40:47 jim
Citizen 14:39:33 jim
Society 14:38:07 jim
Community 14:37:25 jim
Community of Interest 14:37:04 jim
Canonical truth 14:31:56 jim
Truth 14:29:32 jim
Web Blog_blogentry_130918_1 14:27:21 jim
Distributed Consensus 13:42:25 jim
Gossip protocol 13:07:35 jim
Password Manager 12:49:51 jim
Credential Reuse 12:48:10 jim
Web Blog_blogentry_180317_1 12:43:32 jim Password Vault ==> Credential Vault
BigQuery 12:30:25 jim
Automatic Certificate Management Environment 12:30:01 jim
Geocast 12:28:27 jim
Ad Hoc network 12:26:20 jim
Cum hoc ergo propter hoc 12:19:56 jim
Ad Hoc 12:18:13 jim
Authoritative Entity 12:15:18 jim
UNIX History and More 11:57:36 jim
Linux Boot Process 11:56:23 jim
Booting with GRUB 11:53:27 jim
XEN 11:49:05 jim
Direct Anonymous Attestation 11:48:34 jim
Intel 11:47:44 jim
Intel Corporation 11:47:21 jim
Santa Cruz Operation 11:47:02 jim
Extensible Firmware Interface 11:46:35 jim
EPID 11:41:38 jim
DAA 11:41:06 jim
RAND-Z 11:16:34 jim
BYOI 11:12:00 jim
Bring Your Own Identity 11:11:43 jim
Enhanced Privacy ID 11:05:25 jim
Attestation 10:58:04 jim
Credential Holder 10:08:32 jim
Web of Trust 09:30:05 jim
Decentralized Autonomous Corporation 09:15:56 jim
12.09.2018
Microsoft Active Directory Group Synchronization 08:52:30 jim
09.09.2018
SamAccountName 12:15:48 jim
08.09.2018
ISO 3166-2.US 12:00:35 jim
Geographic Names Information System Identifier 11:58:21 jim
Geographic Names Information System 11:57:44 jim
GNISID 11:51:52 jim
FIPS Numeric Code 11:50:36 jim
Arkansas 11:36:01 jim
Arizona 11:35:36 jim
Alaska 11:35:19 jim
Alabama 11:34:55 jim
US-VI 11:33:05 jim
US-PR 11:32:47 jim
US-MP 11:32:31 jim
US-GU 11:32:11 jim
US-AS 11:31:54 jim
US-WY 11:31:29 jim
US-WI 11:31:10 jim
US-WV 11:30:53 jim
US-WA 11:30:37 jim
US-VA 11:30:21 jim
US-VT 11:30:07 jim
US-UT 11:29:53 jim
US-TX 11:29:35 jim
US-TN 11:29:12 jim
US-SD 11:28:56 jim
US-SC 11:28:40 jim
US-RI 11:10:07 jim
US-PA 11:09:49 jim
US-OR 11:09:35 jim
US-OK 11:09:22 jim
US-ND 11:08:04 jim
US-NC 11:07:46 jim
US-NY 11:07:28 jim
US-NM 11:07:04 jim
US-NJ 11:06:48 jim
US-NH 11:06:32 jim
US-NV 11:06:14 jim
US-NE 11:05:50 jim
US-MT 11:05:32 jim
US-MO 11:02:34 jim
US-MS 11:02:19 jim
US-MN 11:02:00 jim
US-MI 11:01:28 jim
US-MA 11:01:09 jim
US-MD 11:00:47 jim
US-ME 11:00:33 jim
US-LA 10:59:55 jim
US-AR 10:59:36 jim
Open Banking OBIE 10:58:41 jim
Open Banking 10:55:42 jim
US-KY 10:38:16 jim
US-KS 10:37:52 jim
US-IA 10:37:32 jim
US-IN 10:37:11 jim
US-IL 10:36:43 jim
US-ID 10:36:29 jim
US-HI 10:36:12 jim
US-GA 10:35:56 jim
US-FL 10:31:24 jim
US-DE 10:31:10 jim
US-CT 10:30:47 jim
US-CO 10:30:25 jim
US-AZ 10:29:57 jim
US-AK 10:28:01 jim
US-AL 10:27:33 jim
US-CA 10:27:08 jim
US-UM 10:26:37 jim
US-OH 10:17:54 jim
Ohio 10:16:39 jim
US Outlying Area 10:15:39 jim
US District 10:10:51 jim
US-DC 10:09:56 jim
District of Columbia 10:09:34 jim
California 10:07:06 jim
CA 09:52:36 jim
OH 09:51:34 jim
ContactUs 09:50:53 jim
Openid-configuration 09:49:36 jim
OpenID Provider Issuer Discovery 09:48:31 jim
WebFinger 09:47:06 jim
Pki-validation 09:46:03 jim
Domain Authorization Document 09:45:09 jim PkiValidation ==> Pki-validation
RFC 920 09:37:39 jim
Top-Level Domain 09:36:58 jim
WHOIS 09:30:29 jim
RFC 3912 09:27:41 jim
Search engine 09:24:15 jim
Jughead 09:21:26 jim
Veronica 09:20:20 jim
Gopher 09:19:25 jim
Archie 09:13:14 jim
Internet Toaster 09:11:42 jim ARCHIE ==> Archie
WAIS 09:05:18 jim
Wide Area Information Server 09:05:01 jim
LogicalApps 08:59:21 jim
Ungermann-Bass 08:57:00 jim
Internet Security Research Group 08:56:44 jim
Privacy Law 08:44:51 jim
Opt-out 08:34:55 jim
California Consumer Privacy Act 08:30:40 jim
07.09.2018
European Article Number 11:04:43 jim
International Standard Book Number 10:57:01 jim
International Standard Serial Number 10:52:39 jim
International Standard Serial Number/640px-Issn-barcode-explained.png 10:50:46 jim By Petermorgan at English Wikipedia, CC BY 3.0, https://commons.wikimedia.org/w/
ISO 3297 10:35:25 jim
06.09.2018
TransitiveVector 17:13:21 jim
Event number 16:58:15 jim
2.16.840.1.113719.1.1.5.1.19 16:55:20 jim
SynchronizedUpTo 15:38:11 jim
2.16.840.1.113719.1.1.4.1.508 15:27:24 jim
LocalReceivedUpTo 15:26:49 jim
Priority Synchronization 15:17:33 jim
Remote Received Up To 14:37:32 jim
Jim 13:22:40 jim
EDirectory Version 11:25:36 jim
SynOptics Communications 11:00:29 jim
DARPA 10:37:47 jim
Carrier-Sense Multiple Access 10:36:21 jim
CSMA 10:34:14 jim
Privacy Enhancing Technologies 10:32:49 jim
Advanced Research Projects Agency Network 09:58:17 jim
Network Control Program 09:53:03 jim
Netware Core Protocol 09:51:32 jim
NCP 09:47:56 jim
Communication Layers 09:46:04 jim Arpanet ==> ARPANET
History of LDAP 09:46:04 jim Arpanet ==> ARPANET
Internet 09:46:04 jim Arpanet ==> ARPANET
Advanced Interactive eXecutive 09:41:30 jim
AIX 09:38:44 jim
Active Directory Federation Services 09:36:43 jim
ADFS 09:36:01 jim
AD Determining Password Expiration 09:33:45 jim
Bonjour 09:32:17 jim
Zero-configuration networking 09:31:02 jim
Dynamic Host Configuration Protocol 09:30:54 jim
Zeroconf 09:28:03 jim
AppleTalk 09:26:24 jim
Apple Directory 09:15:05 jim
Logical Link Control 09:13:36 jim
PUP 09:12:05 jim
PARC Universal Packet 09:11:50 jim
Palo Alto Research Center 09:08:51 jim
PARC 09:05:00 jim
Xerox Network Systems 09:04:31 jim
Xerox 08:58:49 jim
Xerox Corporation 08:58:33 jim
05.09.2018
SAF 15:45:07 jim
Resource Access Control Facility 15:43:34 jim
Multiple Virtual Storage 15:19:14 jim
Access Control Facility 15:17:25 jim
MVS 15:14:30 jim
Privileged Account Management 10:43:35 jim
Account 10:28:22 jim
Analytics 10:19:47 jim
Entitlement 07:35:59 jim
04.09.2018
UniqueMember 15:53:08 jim
2.5.4.31 15:52:24 jim
PC Hardware Cables 14:06:14 jim
RS-232 14:02:53 jim
Home Automation Cables 13:50:21 jim
DCE 13:47:00 jim
DTE 13:46:30 jim
Data Circuit-terminating Equipment 13:46:13 jim
Data Terminal Equipment 13:42:28 jim
PDN 13:25:26 jim
Public Data Network 13:24:59 jim
X.121 13:20:26 jim
Country 13:07:17 jim
JAVA LDAP SDKs 12:44:03 jim
02.09.2018
Web Blog_blogentry_020918_1 20:30:20 jim
Identity Trust Framework 10:11:42 jim
Trust Framework 10:03:10 jim
Identity Federation 10:01:30 jim
Federated Identity Management 10:00:58 jim
Federated Identity 09:44:12 jim
Accreditation Authority 09:33:51 jim
Identity Ecosystem Steering Group 09:25:48 jim
01.09.2018
X500UniqueIdentifier 12:34:23 jim
0.9.2342.19200300.100.1.44 12:32:19 jim
UniqueIdentifier 12:30:51 jim
X.520 12:20:28 jim
Online activity 09:38:24 jim
Online 09:35:07 jim
Tracking Cookie 09:20:51 jim
DNT 09:19:20 jim
Do Not Track 09:12:29 jim
HTTP Request Header 09:05:51 jim
Privacy Considerations 08:56:22 jim
Acxiom Corporation 08:39:39 jim
31.08.2018
Extreme Networks 12:59:28 jim
Foundry Networks 12:55:17 jim
Avaya 12:52:39 jim
Siemens 12:40:31 jim
Cabletron Systems 12:37:45 jim
3Com Corporation 12:27:05 jim
Wellfleet Communications 12:22:02 jim
Nortel 12:17:20 jim
Nortel Networks Corporation 12:12:46 jim
Bay Networks 12:07:38 jim
LattisNet 11:58:38 jim
European Computer Manufacturers Association 11:30:47 jim
ECMA 11:24:55 jim
ECMA TR32 11:24:42 jim
Piloting a Research Directory in an OSI Environment 11:20:50 jim
PARADISE 11:13:58 jim
ISO Development Environment 11:07:35 jim
RFC 1006 11:05:40 jim
ISODE 10:59:26 jim
QUIPU 10:59:03 jim
30.08.2018
Browser 09:51:37 jim
Personal Unblocking Code 09:34:32 jim
CHV2 09:31:41 jim
CHV1 09:31:08 jim
28.08.2018
True 15:06:54 jim
False 15:05:42 jim
FALSE 15:04:35 jim
BooleanMatch 15:04:01 jim
DefinitionLDAPFalseFilter 14:58:13 jim
Post hoc ergo propter hoc 14:56:51 jim
Correlation does NOT imply Causation 14:52:30 jim
ASCII 14:50:33 jim
Legal Person 14:47:51 jim
DNIC 14:24:19 jim
Data Country Codes 14:24:04 jim Data Network Identification Codes ==> Data Network Identification Code
Data Network Identification Code 14:24:04 jim Data Network Identification Codes ==> Data Network Identification Code
ISO 3166-1 numeric 14:19:56 jim
Latin 14:19:03 jim
PrintableString 14:18:11 jim
Identity Correlation 14:16:45 jim
Correlation 14:14:54 jim
Statistic 14:11:41 jim
Reasoning 14:00:54 jim
Fallacy 13:58:26 jim
Causation 13:55:35 jim
Web Blog_blogentry_280818_1 13:47:21 jim
Arithmetic shift 11:41:17 jim
Arithmetic shift/Rotate_right_arithmetically.png 11:40:29 jim Rotate_right_arithmetically.png
Arithmetic shift/Rotate_left_logically.png 11:33:20 jim Rotate_left_logically.png
Rotate through carry 11:25:19 jim
Circular Shift 11:25:10 jim
Logical shift 11:25:02 jim
Involutory function 11:21:00 jim XOR ==> Bitwise XOR
Stream Cipher 11:21:00 jim XOR ==> Bitwise XOR
Triple DES 11:21:00 jim XOR ==> Bitwise XOR
BEAST 11:20:59 jim XOR ==> Bitwise XOR
Bitwise XOR 11:20:59 jim XOR ==> Bitwise XOR
Bitwise OR 11:19:58 jim
Bitwise AND 11:15:25 jim
Bitwise NOT 11:01:46 jim
Bitwise operation 10:49:59 jim
Padded 09:35:25 jim
Padding oracle 09:20:41 jim
Oracle 09:19:57 jim
Length extension attack 09:08:54 jim
Merkle-Damgard construction 09:05:27 jim MerkleDamgÃRd construction ==> Merkle-Damgard construction
Padding 09:03:06 jim
Attack 08:38:02 jim
27.08.2018
Vrdim 21:00:09 jim
24.08.2018
Foreign 10:39:49 jim
Immigrant 10:39:03 jim
Alien 10:37:15 jim
Nonimmigrant 10:35:34 jim
NIIS 10:31:10 jim
UPAX 10:21:41 jim
ATS 10:13:57 jim
APIS 10:05:54 jim
United States Department of State 09:57:43 jim
Consolidated Consular Database 09:55:24 jim
IDENT 09:53:22 jim The Automated Biometric Identification System ==> Automated Biometric Identification System
Web Blog_blogentry_100618_1 09:53:22 jim The Automated Biometric Identification System ==> Automated Biometric Identification System
Departure Verification System 09:38:32 jim
TSA 09:32:14 jim
Transportation Security Administration 09:31:52 jim
TVS 09:29:12 jim
SORN 09:28:39 jim
System of Records Notice 09:25:26 jim
Data Retention 09:05:56 jim
22.08.2018
Keccak 15:59:56 jim
SHA-3 15:59:31 jim
Passwd 15:56:57 jim
Authentication Request 13:09:08 jim
Hosted domain 13:08:00 jim
Id_token_hint 13:02:10 jim
NIST.SP.800-171 09:32:38 jim
NIST Cybersecurity Framework 09:27:04 jim
NIST.SP.800-39 09:23:25 jim
NIST Special Publication 09:16:56 jim
21.08.2018
Web Blog_blogentry_210818_1 12:00:17 jim
Ndstrace 09:08:17 jim
20.08.2018
Decentralised system 12:27:14 jim
Centralized system 12:26:26 jim
Distributed system 12:18:26 jim
Centralized Exchange 11:45:04 jim
Web Blog_blogentry_260715_1 11:39:03 jim
Distinguished Names 10:46:34 jim
Reliable protocol 09:37:19 jim
RFC 1213 09:35:39 jim
RFC 1155 09:34:18 jim
Structure of Management Information 09:33:08 jim
Management Information Base 09:32:38 jim
RFC 2578 09:31:49 jim
Simple Network Management Protocol 09:30:24 jim
RFC 1157 09:30:05 jim
X.25 09:23:07 jim
Network 09:18:38 jim
Link 09:15:42 jim
Network topology 09:11:52 jim
Byzantine Fault Tolerance 08:59:05 jim
WS-ReliableMessaging 08:55:06 jim
WS-Specifications 08:48:17 jim
19.08.2018
Byzantine Generals Problem 08:38:22 jim
18.08.2018
Web Blog_blogentry_180818_1 09:50:44 jim
Event eXchange Protocol 09:49:03 jim
XRI Data Interchange 09:42:00 jim
EXtensible Data Interchange 09:38:49 jim
JSON Web Tokens 09:21:55 jim
17.08.2018
Web Blog_blogentry_170818_1 19:36:16 jim
Monero 11:20:16 jim
Blockchain 2.0 11:19:48 jim
OCSP Stapling 10:42:21 jim
RFC 6961 10:38:55 jim
TLS 1.3 10:37:02 jim
RFC 5489 10:23:15 jim
ECDHE_PSK 10:22:17 jim
Key Performance Indicator 07:33:46 jim
13.08.2018
Social contract 09:55:46 jim
Natural rights 09:46:09 jim
Jurisdiction 09:38:32 jim
Legal 09:36:26 jim
Law 09:35:48 jim
12.08.2018
Office of Management and Budget 20:28:53 jim
OMB 20:27:18 jim
FedRAMP 20:25:10 jim
Web Blog_blogentry_120818_1 20:20:45 jim
Regulation 20:00:35 jim
RFC 4880 08:37:04 jim
OpenPGP 08:36:09 jim
Pretty Good Privacy 08:35:26 jim
PGP 08:34:47 jim
Hybrid cryptosystem 08:30:53 jim
DataEncipherment 08:29:21 jim
Key Encapsulation Method 08:24:26 jim
KEM 08:23:59 jim
DEM 08:21:29 jim
Data Encapsulation Method 08:21:01 jim
Cryptography 07:50:38 jim
Symmetric Key Cryptography 07:43:19 jim
Asymmetric Key Cryptography 07:36:01 jim
11.08.2018
0-RTT Handshakes 16:47:36 jim
RFC 8446 16:34:47 jim
Human-Centered Design 09:37:04 jim
Donald A. Norman 09:32:23 jim
Web Blog_blogentry_110818_1 09:28:39 jim
Homograph attack 09:01:09 jim
Punycode 08:57:43 jim
Phishing 08:47:40 jim
Identity questions 08:46:23 jim
Side-channel attacks 08:45:23 jim
SS7 hack 08:42:14 jim Social Engineering Attacker ==> Social Engineering Attack
Social Engineering Attack 08:42:13 jim Social Engineering Attacker ==> Social Engineering Attack
10.08.2018
Feedback 21:59:16 jim
Discoverability 21:53:06 jim
HCD 21:37:46 jim
Human Interconnection Model 21:37:19 jim
RFC 2551 14:44:10 jim
IMPS 14:43:18 jim
The Infinite Monkey Protocol Suite 14:42:48 jim
RFC 2795 14:40:59 jim
RFC 1216 14:39:17 jim
RFC 1121 14:38:25 jim
RFC 1097 14:37:43 jim
RFC 968 14:37:03 jim
RFC 748 14:35:56 jim
RFC 527 14:35:08 jim
INTEROP 14:18:02 jim
The Reliable Internetwork Troubleshooting Agent 13:54:49 jim
RFC 2321 13:54:30 jim
Hyper Text Coffee Pot Control Protocol 13:52:47 jim
Compliance Layer 13:44:01 jim
HIM 13:42:14 jim
Organization Layer 13:34:39 jim
2.5.6.4 13:32:29 jim
User Layer 13:23:14 jim
RITA 13:13:03 jim
User error 11:41:23 jim
Hu 09:15:32 jim
Problem Exists Between Keyboard And Chair 09:05:53 jim
PEBKAC 08:59:54 jim
Strict-Transport-Security 08:29:41 jim
08.08.2018
Code injection 11:37:25 jim
Arbitrary code execution 11:28:52 jim
Web Blog_blogentry_080818_1 11:19:25 jim
Second Preimage Resistance 10:49:04 jim
Preimage Resistance 10:45:21 jim
One-Way Hash Function 10:39:43 jim
Cryptographic Primitive 10:24:10 jim
Mix network 10:20:10 jim
Nonce 10:07:16 jim
Initialization Vector 10:03:33 jim
Block Cipher Mode 09:54:23 jim
NIST.SP.800-38 09:52:20 jim
OCB 09:47:39 jim
OFB 09:46:55 jim
CFB 09:46:35 jim
PCBC 09:46:05 jim
IAPM 09:19:33 jim
Integrity Aware Parallelizable Mode 09:17:02 jim
EAX 09:14:45 jim
CWC 09:06:48 jim
Authenticated Encryption with Associated Data 09:03:34 jim
CTR 08:43:30 jim
CCM 08:43:08 jim
AE 08:36:54 jim
Authenticated Encryption 08:36:20 jim
Output FeedBack 08:19:37 jim
Cipher FeedBack 08:18:54 jim
Propagating Cipher Block Chaining 08:17:50 jim
Counter mode 08:16:11 jim
XTS 08:14:18 jim
Cipher 07:53:10 jim
07.08.2018
Message Number 15:03:45 jim
Web Blog_blogentry_070818_1 14:59:03 jim
Cryptographic Hash Function 14:51:42 jim
Hash Function 14:48:54 jim
Hash Function Security Properties 14:48:06 jim Hash Function Security ==> Hash Function Security Properties
Key size 14:48:06 jim Hash Function Security ==> Hash Function Security Properties
Fingerprint 14:44:10 jim
Cryptographic Hash Function Comparison 14:38:05 jim Cryptographic Hash Function Comparrison ==> Cryptographic Hash Function Comparison
Block Cipher 14:17:01 jim Block cipher mode of operation ==> Block Cipher Mode
Meet-in-the-Middle Attack 14:08:34 jim
Birthday Attack 13:56:07 jim
Birthday Paradox 13:54:54 jim
Authentication 13:31:53 jim
Authentication/authentication.png 13:05:11 jim
Applied Cryptography 12:17:37 jim
Encryption/encryption.png 12:03:29 jim
Kerckhoffs principle 11:56:37 jim
Encryption Scheme 11:55:20 jim
Data and Goliath 11:26:05 jim Book I read ==> Book
Lean Enterprise 11:26:05 jim Book I read ==> Book
Thriving on Chaos 11:26:05 jim Book I read ==> Book
Perfect Security 11:16:12 jim
Cryptographic Collision 10:07:55 jim
Kerberos Pre-Authentication 10:07:33 jim
Redundant Byzantine Fault Tolerance 10:06:09 jim
DNS cache poisoning 10:05:00 jim
Internationalized Resource Identifiers 10:04:01 jim
IDN homograph attack 10:03:36 jim
Mallory 10:01:40 jim
Malicious Software 10:00:24 jim
Malicious Endpoint 09:58:41 jim
Malicious PAC 09:57:21 jim
Malicious 09:56:36 jim
Security 09:36:33 jim
Online Certificate Status Protocol 09:33:30 jim
CAP theorem 09:32:09 jim
Device Inventory Service 09:30:46 jim
Asynchronous Transfer Mode 09:30:18 jim
Token Revocation 09:28:21 jim
Transmission Control Protocol 09:27:49 jim
Practical Byzantine Fault Tolerance 09:27:17 jim
GCP Cloud CDN 09:26:51 jim
TLS Abbreviated Handshake 09:26:25 jim
Latency 09:25:39 jim
Ciphertext stealing 09:17:13 jim
LM hash 09:09:18 jim
Lucky 13 09:07:10 jim
PKCS 1 09:06:18 jim
Poodle 08:52:41 jim
Padding bit 08:50:38 jim
Packed Encoding Rules 08:48:07 jim
Certificate Pinning 08:39:07 jim
CacheCtl 08:35:27 jim
CacheCtl/Screen Shot 2018-08-07 at 04.30.46.png 08:32:50 jim dbCacheStats
Science Applications International Corporation 08:26:28 jim
SAIC 08:25:01 jim
VeriSign 08:23:55 jim
MasterCard 08:22:29 jim
VISA 08:21:45 jim
Secure Electronic Transaction 08:21:18 jim
3D Secure 08:19:02 jim
Exploitability Metrics 08:08:05 jim
06.08.2018
Frame 21:26:57 jim
Packet 21:26:13 jim
Sex 17:50:45 jim
EDirectory 9.1.1.0 (40102.29) 15:59:29 jim
Component Syntax 12:58:01 jim
VolumeName Field 12:57:36 jim
Xdasauditds 12:57:10 jim
X-NDS_READ_FILTERED 12:57:01 jim
X-NDS_PUBLIC_READ 12:56:50 jim
X-NDS_BOTH_MANAGED 12:52:13 jim
NspmPasswordPolicy 12:48:10 jim
NspmConfigurationOptions 12:47:57 jim
Novell Secure Password Manager 12:47:44 jim
Novell Modular Authentication Service 12:47:34 jim
Novell Directory Services 12:47:01 jim
Novell Certificate Server 12:44:08 jim
Nldap 12:43:46 jim
NetWare 12:41:50 jim
Ndsmodules.conf 12:41:39 jim
Nds.conf 12:41:15 jim
Ncpengine 12:41:02 jim
NICI Version 12:39:50 jim
NDSD Loadable Module 12:39:09 jim
NDSD 12:38:52 jim
NDSBACKUP 12:38:36 jim
LDAP Metrics 12:37:06 jim
DirectoryTreeName 12:35:30 jim
NDS Unknow Entries 12:33:32 jim
NDS Tree-name 12:29:53 jim
Ndstrace Log Searches 12:21:14 jim
NDS Result Code 12:19:50 jim
NDS Partition 12:19:40 jim
NDS Login Methods 12:18:04 jim
NDS Informational Obituaries 12:17:24 jim
NDS External References 12:02:53 jim
NDAP 12:02:37 jim
N4u.server.interfaces 12:02:08 jim
N4u.server.idle-threads 12:01:11 jim
N4u.server.configdir 12:01:01 jim
N4u.nds.server-name 12:00:47 jim
N4u.nds.dofsync 12:00:36 jim
N4u.nds.backlink-interval 12:00:24 jim
Importing Certificates In Imanager 11:59:17 jim
Import Conversion Export 11:57:28 jim
Imanager Roles And Tasks 11:56:44 jim
Imon 11:56:33 jim
Imonitor 11:56:22 jim
Static Cache Mode 11:55:37 jim
Hard cache limit 11:53:26 jim
Groups Edirectory 11:53:08 jim
GetEffectivePrivilegesRequest 11:52:51 jim
Gams 11:52:30 jim
Files In Dib Directory 11:52:06 jim
Roll-Forward Log 11:49:07 jim
Maxdirtycache 11:48:44 jim
Lowdirtycache 11:48:29 jim
Cpinterval 11:48:12 jim
FLexible Adaptable Information Management 11:36:56 jim
EdirectoyFHSAndLSBCompliance 11:34:29 jim
EdirectoryPasswords 11:34:17 jim
EdirectoryMonitoringMIB 11:34:04 jim
EdirectoryLoginUpdate 11:29:47 jim
Edirectory Usefull Linux Commands 11:29:15 jim
Edirectory Performance Counters 11:28:34 jim
Edirectory Password Policy 11:28:18 jim
Edirectory Extensible Match Rules 11:27:19 jim
Edirectory Anomalies 11:26:54 jim
Edirectory Administrative Password Changes 11:26:13 jim
EDirectory and NDS Client Error Codes 11:25:53 jim
EDirectory Multiple Instance 11:24:54 jim
EDirectory Performance Tuning 11:24:26 jim
EDirectory Password Expiration 11:24:11 jim
EDirectory LDAP Transaction 11:23:45 jim
EDirectory Extended LDAP Flags 11:23:30 jim
EDirectory DIB 11:23:12 jim
Presence Index 11:20:19 jim
DefinitionIDList 11:16:13 jim
DefinitionEntryID 11:14:50 jim
DSE_LOGIN_EX 11:13:01 jim
DSE_AUTHENTICATE 11:12:43 jim
Creating KMO Signed By An External Certificate Authority 11:11:29 jim
DHost 11:10:15 jim
DIB 11:09:56 jim
BACKLINK Obituary 11:07:35 jim
NDS Authentication 11:06:37 jim
EDirectory Privileges 11:06:22 jim
ACL (eDirectory Attribute) 11:05:07 jim
Installing And Configuring Edirectory 11:04:39 jim
NDSTRACE Examples 11:03:55 jim
Edirectory Instance Management 11:01:40 jim
2.5.4.43 08:01:16 jim
Initials 07:56:34 jim
DirXML Code Snippets 07:51:31 jim
Ndsrepair 07:50:41 jim
03.08.2018
RFC 3550 23:22:49 jim
Real-time Transport Protocol 23:21:43 jim
RTP 23:21:02 jim
Encapsulating Security Payload 23:18:44 jim
ESP 23:15:29 jim
HAMMERCHANT 23:07:36 jim
H.323 22:47:28 jim
FASCIA 22:44:07 jim
Cell ID 22:42:58 jim
LAC 22:41:39 jim
Location Area Code 22:08:02 jim
CELLID 22:04:07 jim
Universal Terrestrial Radio Access Network 22:03:01 jim
UTRAN 22:01:35 jim
SIGDEV 21:45:20 jim
Voice over IP 21:39:31 jim
VoIP 21:39:12 jim
Internet Key Exchange 21:28:44 jim
IKE 21:25:13 jim
Five Eyes Intelligence Alliance 20:54:08 jim
Edward Snowden 20:52:19 jim
Public Key Infrastructure Weaknesses 20:49:37 jim
Signalling System No. 7 20:48:25 jim
Communication Surveillance 20:26:00 jim
02.08.2018
HTTP Header Field 13:49:20 jim
HTTP Header Directive 13:48:07 jim
01.08.2018
HTTP Request 20:12:44 jim
HTTP Conditional Request 20:09:28 jim
Etag 20:07:52 jim
Entity-tag 20:04:25 jim
31.07.2018
LDAP 11:23:01 jim
Key-value 11:09:34 jim
Redis 10:37:11 jim
RFC 6797 10:06:41 jim
HSTS 10:04:12 jim
HTTP 301 09:55:21 jim
HTTP 302 09:53:26 jim
Found 09:53:04 jim
Moved Permanently 09:52:45 jim
Permanent Redirect 09:52:18 jim
HTTP Status Code 09:51:06 jim
HTTP 308 09:48:06 jim
RFC 7538 09:44:23 jim
30.07.2018
Intermediary 12:09:47 jim
Reverse Proxy 12:07:23 jim
End-to-end Encryption 12:05:41 jim
Netstat 11:52:16 jim
29.07.2018
The LDAP Controller 09:06:09 jim
LDAP Java Code 09:04:29 jim
Version Control System 09:01:46 jim
Microsoft Windows 09:00:12 jim
Linux 08:52:44 jim
Kernel 08:50:34 jim
Linus Torvalds 08:46:25 jim
Git 08:46:06 jim
VCS 08:37:10 jim Version Control Systems ==> Version Control System
Revision 08:30:55 jim
Open Software Foundation 08:27:10 jim
Software Architecture Model 08:26:18 jim
Software design pattern 08:24:42 jim
Open Source 08:20:51 jim
Source code 08:13:36 jim
Web Blog_blogentry_290718_1 08:03:22 jim
28.07.2018
1900s 09:57:56 jim
1910s 09:57:19 jim
1920s 09:56:51 jim
Decade 09:56:16 jim
1930s 09:55:32 jim
1940s 09:54:44 jim
1960s 09:51:58 jim
1950s 09:50:16 jim
Year 1958 09:48:07 jim
Continuous Delivery 09:43:35 jim
CD 09:25:05 jim
Ethernet 09:14:16 jim
Kubernetes 09:10:42 jim
26.07.2018
1. 08:58:05 jim
RoT 08:51:59 jim
Secure Enclave 08:49:22 jim
ISO Publicly Available Standards 08:36:11 jim
ISO 11889 08:34:27 jim
Cloud 08:28:11 jim
TCG 08:24:19 jim
Trusted Computing Group 08:24:00 jim
Trusted Platform Module 08:17:04 jim
Google Key Management Service 08:07:23 jim
25.07.2018
Web Blog_blogentry_140415_1 13:42:28 jim
Disablemovetoattrcontainer 13:41:41 jim
Preventing eDirectory from Auto Adding Indexes 13:39:20 jim
IndexDefinition 13:23:05 jim indexDefinition ==> IndexDefinition
24.07.2018
Google Cloud Functions 10:20:17 jim
Enterprise Integration Patterns 10:00:20 jim
Factory 09:59:10 jim
Request-Response 09:57:45 jim
Publish-Subscribe 09:57:10 jim
Messaging pattern 09:56:28 jim
Serverless 09:51:40 jim
SPML 09:50:14 jim
IDMDeveloperInfo 09:49:17 jim
IDM Tricks 09:49:04 jim
IDM Start-Stop 09:48:51 jim
Dxcmd 09:48:21 jim
Dirxml-uACHomedirRequired 09:47:52 jim
Dirxml-uACEncryptedTextPasswordAllowed 09:47:37 jim
Dirxml-uACDontExpirePassword 09:47:26 jim
DirXML-NTAccountName 09:47:13 jim
DirXML-JavaDebugPort 09:47:02 jim
DirXML-Association States 09:46:36 jim
DirXML and Oracle (OID) 09:46:19 jim
DirXML Trace File Searches 09:46:06 jim
DirXML Toolbox 09:45:55 jim
DirXML Required Reading 09:45:45 jim
DirXML PWFILTER.DLL 09:45:20 jim
DirXML Out-of-Band Requests 09:45:03 jim
DirXML Merge-Resync Process 09:44:44 jim
DirXML Examples 09:43:57 jim
DirXML Error 09:43:32 jim
DirXML Engine Version 09:42:53 jim
DirXML 4.0.2.0 09:42:30 jim
DirXML 09:40:38 jim
Transaction 09:36:41 jim
Event sourcing 09:33:07 jim
Event System 09:26:05 jim
Event Sequencer 09:18:38 jim
Event-Driven Architecture 09:13:01 jim
State 08:58:49 jim
Event 08:57:55 jim
Domain-Driven Design 08:46:19 jim
22.07.2018
Certbot 22:18:07 jim
8.8.8.8 12:20:28 jim
1.1.1.1 12:20:04 jim
DNS SRV Records 12:04:04 jim
Domain Name server 12:03:05 jim
CloudFlare 11:40:54 jim
Representational State Transfer 11:17:01 jim
GraphQL 11:15:35 jim
21.07.2018
GCP Compute Products 19:47:46 jim
Google Cloud Pub-Sub 19:47:32 jim
Web Blog_blogentry_210718_1 19:40:20 jim
Google Cloud SDK 19:28:23 jim
ISO 19944 09:51:47 jim
Personally Identifiable Information 09:47:24 jim
20.07.2018
LDAP Modify-Increment Extension 22:04:41 jim
Point-to-Point Protocol over Ethernet 11:01:31 jim
Point-to-Point Protocol 10:35:34 jim
Message Passing Interface 10:34:36 jim
Schema 10:23:25 jim
Web Ontology Language 10:14:08 jim
Semantic WEB 10:08:44 jim
RFC 5988 09:42:57 jim
Web Linking 09:41:51 jim
The Atom Syndication Format 09:35:02 jim
Atom 09:33:02 jim
RFC 4287 09:28:54 jim
RFC 8288 09:26:58 jim
17.07.2018
Access Control 11:02:23 jim
External Security Managers (ESM) 10:50:55 jim
Mainframe 10:48:58 jim
XACML 10:44:44 jim
Trust Tier 10:33:45 jim
NGAC 09:16:02 jim
16.07.2018
Next Generation Access Control 18:55:19 jim
NIST.SP.1800-3 18:47:20 jim
Attribute Based Access Control 18:39:42 jim
NIST.SP.800-162 18:38:13 jim
CISCO Commands 16:33:17 jim
OpenSSL Commands 16:30:47 jim
PAM module-arguments 16:29:54 jim
NAM Troubleshooting 16:28:34 jim
Syslog Facility 16:27:00 jim
Fanout Core Driver Debugging 16:20:52 jim
Fanout Platform Debugging 16:20:09 jim
Debugging Fanout Driver 16:18:06 jim
2.16.840.1.113719.1.14.4.1.27 16:15:16 jim
NAV 16:12:52 jim
Network Analysis 16:12:21 jim
Web Blog_blogentry_160718_1 14:45:30 jim
Web Blog_blogentry_280717_1 13:47:05 jim
Disruptive technology 13:38:42 jim
Nordic APIs 13:35:20 jim
Alice And Bob 12:53:35 jim
Marc Andreessen 12:06:14 jim
CI 11:35:28 jim
XP 11:34:57 jim
Dev 11:15:41 jim
Ops 11:15:06 jim
Operations Team 11:14:31 jim
Continuous testing 11:12:01 jim
Velocity 10:58:44 jim
SDLC 10:48:03 jim
Software Development Life Cycle 10:47:31 jim
BDUF 10:34:36 jim
Big Design Up Front 10:34:19 jim
Conways law 09:53:15 jim
API Economy 09:48:56 jim
15.07.2018
Facade pattern 16:58:03 jim
API-Gateway 16:55:24 jim
Web Blog_blogentry_150718_1 09:10:07 jim
14.07.2018
Monolithic Architecture 08:57:28 jim
Identity Relationship Management 08:53:05 jim
Holacracy 08:40:22 jim
12.07.2018
Emergent Design 16:22:06 jim
Web Blog_blogentry_120718_1 16:17:44 jim
LRM 10:43:48 jim
Last Responsible Moment 10:43:32 jim
Alibaba 09:48:15 jim
Uber 09:47:24 jim
Airbnb 09:46:55 jim
Load Balancing 09:02:39 jim
11.07.2018
Web Blog_blogentry_110718_1 15:11:04 jim
Data-centric 14:47:45 jim
Test Page 10:59:29 jim
LDAP Result Codes 10:56:11 jim
Error 10:54:52 jim
Cheat Sheets 10:44:17 jim
SQL Quick Help 10:43:25 jim
Cable Connections 10:41:19 jim
AdminsPage 10:24:26 jim
Allowed Inlined Images 10:18:03 jim
Costs of Wiki 10:15:24 jim
Modify-password 10:11:44 jim
Modify-association 10:09:52 jim
DNA 09:31:49 jim
CODIS 09:29:39 jim
Something You Are 09:12:40 jim
Deoxyribonucleic Acid 09:10:42 jim
Genome 09:08:32 jim
10.07.2018
DomainFunctionality 13:30:55 jim
ForestFunctionality 13:30:40 jim
DomainControllerFunctionality 13:30:28 jim
AES-256 13:21:47 jim
AES-192 13:21:31 jim
AES-128 13:21:18 jim
AES 13:19:24 jim
Single-master 12:24:03 jim
Multi-master 12:22:22 jim
FSMO 12:08:18 jim
Photo 10:18:38 jim
0.9.2342.19200300.100.1.60 10:14:40 jim
JpegPhoto 10:14:03 jim
Image 10:07:16 jim
Audio 10:04:18 jim
Video 10:02:50 jim
Font 10:01:08 jim
Multipart 09:58:48 jim
Media-type 09:54:04 jim
IANA.MediaTypes 09:27:32 jim
Structured Syntax Suffix 09:15:39 jim
Security Event Token 08:57:05 jim
RFC 6838 08:55:13 jim
RFC 8417 08:14:43 jim
09.07.2018
RFC 1149 13:51:41 jim
Web Blog_blogentry_090718_1 13:47:21 jim
ISO 8601 13:43:53 jim
Timestamp 13:37:51 jim
Sid 09:47:08 jim
07.07.2018
RCS Universal Profile 20:57:03 jim
Organizational Identity 20:50:26 jim
Third-party Identity Provider 20:48:06 jim
Electronic IDentification Authentication and trust Services 20:29:09 jim
05.07.2018
CIA 17:30:57 jim
Central Intelligence Agency 17:27:55 jim
Independent United States Federal Agency 17:17:31 jim
Federal Communications Commission 16:57:23 jim
FCC 16:51:34 jim
Global Positioning System 16:51:12 jim
National Vulnerability Database 10:56:49 jim
Security Content Automation Protocol 10:54:39 jim
CVSS 10:48:42 jim
Acceptable risk 10:00:15 jim
Tomcat And LDAP 09:55:32 jim
PreInstall Check List 09:53:46 jim
B003281 09:48:16 jim
Risk Assessment 09:39:38 jim
Threat 09:38:22 jim
Internet Threat Model 09:31:50 jim
Probability of Loss 09:30:15 jim
Authenticator Assurance Levels 09:23:46 jim
Data Security Impact 09:20:38 jim
04.07.2018
OBIE 11:33:43 jim
Open Banking Implementation Entity 11:33:26 jim
Web Blog_blogentry_040718_1 09:58:09 jim
Google Cloud Storage 09:49:57 jim
RFC 8414 08:53:29 jim
OAuth 2.0 Authorization Server Metadata 08:52:03 jim
United States federal government 08:34:57 jim
United States Cabinet Department 08:23:58 jim
United States Constitution 08:15:45 jim
Vice President of the United States 08:14:31 jim
President of the United States of America 08:06:41 jim
Cryptographic Module Validation Program 07:55:11 jim
03.07.2018
Signature Verification 15:06:54 jim
Signature Generation 15:05:34 jim
Message Authentication Code 14:19:54 jim
Digital Signature Algorithm 14:18:37 jim
Probabilistic Signature Scheme 13:57:07 jim
Wi-Fi Alliance 10:36:02 jim
Wi-Fi 10:35:21 jim
Trademark 10:33:42 jim
Intellectual Property Rights 10:31:37 jim
USPTO 10:31:09 jim
United States Patent and Trademark Office 10:30:40 jim
Open Protocol for Access Control, Identification, and Ticketing with privacY 10:27:51 jim
02.07.2018
ACE 16:26:04 jim
1.2.840.113556.1.4.1669 16:25:33 jim
ACE-OAuth 16:08:30 jim
Authentication and Authorization for Constrained Environments 16:05:46 jim
Web Blog_blogentry_020718_1 15:47:06 jim
01.07.2018
Photography 10:01:52 jim
Video Surveillance 09:55:37 jim
Two-party consent 09:54:47 jim
Wiretapping 09:54:29 jim
Recording 09:53:31 jim
Legal Consideration 09:48:05 jim
Audio Surveillance 09:46:15 jim
Photographs 09:39:24 jim
Signals Intelligence 09:24:59 jim
Logging 09:11:00 jim
CFAA 08:50:31 jim
Web Blog_blogentry_010718_1 08:35:10 jim
28.06.2018
Bandit-project.org 20:02:16 jim
Higgins Project 19:58:57 jim
CardSpace 19:51:15 jim
Information Cards 19:50:08 jim
ICards 19:48:32 jim
IDMRelatedOrganizationsAndStandards 19:28:45 jim
Blockchain 10:16:10 jim
27.06.2018
PosixGroup 11:07:58 Martin
26.06.2018
LEC 18:11:20 jim
Local Exchange Carrier 18:10:59 jim
Local Access and Transport Area 18:09:35 jim
Local Exchange 18:08:37 jim
IXC 18:01:59 jim
Point-of-Presence 18:01:19 jim
Interexchange Carrier 17:59:26 jim
Year 1985 17:53:04 jim
OR-Name 13:26:47 jim
2.16.840.1.113719.1.8.4.2 13:17:49 jim
25.06.2018
United States Department of Homeland Security 13:54:15 jim
United States Department of Homeland Security/homeland-logo.png 13:53:46 jim homeland-logo.png
24.06.2018
PasswordsUsed 11:30:37 jim
LoginAllowedTimeMap 11:25:49 jim
DIT Content Rule 10:21:50 jim
Name Form Description 10:13:50 jim
Name Form 10:13:27 jim
X-MIN-VALUE-LENGTH 10:04:36 jim
X-MIN-VALUE-COUNT 10:03:44 jim
X-MIN-INT-VALUE 10:03:21 jim
X-MAX-VALUE-LENGTH 10:02:57 jim
X-MAX-VALUE-COUNT 10:02:30 jim
X-MAX-INT-VALUE 10:01:18 jim
X-ALLOWED-VALUE 10:00:41 jim
X-NOT-HUMAN-READABLE 09:51:42 jim
X-SCHEMAFLAGSEx 09:48:04 jim
23.06.2018
CCC 08:22:24 jim
Key 08:19:07 jim
Digital Key 08:15:00 jim
Lock 08:14:18 jim
MirrorLink 07:49:29 jim
Web Blog_blogentry_230618_1 07:41:46 jim
19.06.2018
SignatureAlgorithm 19:10:39 jim
Example Certificate 19:07:41 jim
Certificate Issuer 19:04:13 jim
SignatureValue 19:02:16 jim
TBSCertificate 19:01:35 jim
Basic Certificate Fields 18:54:36 jim
ContentCommitment 18:36:10 jim
NonRepudiation 18:35:21 jim
KeyUsage 18:34:44 jim
CA Constraint 18:11:07 jim Basic Constraints ==> BasicConstraints
BasicConstraints 18:11:06 jim Basic Constraints ==> BasicConstraints
Certificate Extensions 18:10:55 jim
ExtendedKeyUsage 18:06:35 jim
Subject Alternative Name 18:05:56 jim
Certificate Validation 17:43:11 jim
DigitalSignature 15:16:50 jim
Extended Validation Certificate 14:57:50 jim
Certificate Chain 14:42:32 jim
14.06.2018
Tips using UnboundID LDAP SDK 12:04:57 jim
PS_TOKEN 12:02:47 jim
Server-Side Login throttling schemes 12:00:08 jim
LDAP Connection Maintenance 11:58:19 jim
Standards Based SSO 11:57:37 jim
HttpSessionTimeout 11:56:07 jim httpSessionTimeout ==> HttpSessionTimeout
2.16.840.1.113719.1.3.4.7 11:55:59 jim
LdapServerIdleTimeout 11:51:31 jim
LDAP_TIMEOUT 11:50:56 jim
LDAP_TIMELIMIT_EXCEEDED 11:50:33 jim
LDAP Client Error And Result Codes 11:49:45 jim
13.06.2018
Measure What Matters 11:57:11 jim
DicAppData 11:27:44 jim dicAppData ==> DicAppData
Schema Modifications 11:26:08 jim
1.3.6.1.4.1.8876 11:23:58 jim
1.3.6.1.4.1.8876.2.2.5 11:23:31 jim Schema-willeke ==> Willeke Schema
DicPersonInfo 11:23:31 jim Schema-willeke ==> Willeke Schema
LDAPAttributetypesWillekeBranchStart 11:23:31 jim Schema-willeke ==> Willeke Schema
Willeke Schema 11:23:30 jim Schema-willeke ==> Willeke Schema
How To Get Your Own OID 11:16:23 jim LDAPAttributetypesBranchStart ==> LDAPAttributetypesWillekeBranchStart
1.3.6.1.4.1.8876.2.1.6 11:12:18 jim
Identification 11:05:10 jim
Attribute 11:04:36 jim
Relationship 11:04:10 jim
Agent 11:03:38 jim
CNCF 09:57:41 jim
Cloud Native Computing Foundation 09:57:26 jim
Protobuf 09:55:33 jim
Google Remote Procedure Call 09:46:04 jim
12.06.2018
Web Blog_blogentry_120618_1 16:39:51 jim
MsDS-UserPasswordExpiryTimeComputed 10:53:13 jim
Date Form 10:44:02 jim
Time 10:42:49 jim
Date 10:40:02 jim
LargeInteger Date 10:39:22 jim
FILETIME 10:38:30 jim
LargeInteger 10:35:39 jim FILETIME ==> LargeInteger Date
PwdStartTime 10:20:22 jim
LoginActivationTime 10:19:46 jim
Account Expiration 10:15:16 jim
1.2.840.113556.1.4.159 10:12:17 jim
11.06.2018
OpenID Foundation 22:51:22 jim
Request For Comment 22:41:32 jim
EEA 10:03:38 jim
European Economic Area 10:03:05 jim
Payment Service Provider 10:01:30 jim
Account Servicing Payment Service Provider 09:15:39 jim
Payment Transaction 09:12:14 jim
Payment Initiation Service 09:00:36 jim
Account Information Service 08:56:04 jim
Account owner 08:54:49 jim
Bank 08:52:24 jim
Federal Reserve Bank 08:51:13 jim Banks ==> Bank
Federal Reserve Board of Governors 08:51:13 jim Banks ==> Bank
Federal Reserve Member Banks 08:51:13 jim Banks ==> Bank
Office of the Comptroller of the Currency 08:51:13 jim Banks ==> Bank
Clearing House Interbank Payments System 08:51:12 jim Banks ==> Bank
Depository Institutions Deregulation and Monetary Control Act of 1980 08:51:12 jim Banks ==> Bank
Electronic Identity Verification 08:51:12 jim Banks ==> Bank
Federal Deposit Insurance Corporation 08:51:12 jim Banks ==> Bank
Custodian 08:49:09 jim
Deposit Account 08:44:56 jim
Transaction Account 08:44:28 jim
10.06.2018
TSDB 10:09:14 jim
DOB 10:02:00 jim
NCIC 09:59:57 jim
Immigration Violator File 09:56:33 jim
United States Customs and Border Protection 09:50:06 jim
Immigration 09:49:28 jim
Driver License 09:47:06 jim
Homeland Advanced Recognition Technology 09:15:05 jim
HART 09:08:12 jim
09.06.2018
Web Blog_comments_290712_1 22:40:05 Danielwrold
06.06.2018
Expires_in 09:26:43 jim
SasUpdateLoginTimeInterval 07:04:34 Karl Making the Server chappter more readable
04.06.2018
OAuth 2.0 Mutual TLS Client Authentication and Certificate Bound Access Tokens 14:30:31 jim
Mutual TLS Profiles for OAuth Clients 14:25:34 jim
Web Blog_blogentry_120218_1 14:25:09 jim Mutual TLS for OAuth Client Authentication ==> OAuth 2.0 Mutual TLS Client Authentication and Certificate Bound Access Tokens
03.06.2018
Trust No One 17:44:24 jim
TNO 17:43:36 jim
Nuclear fusion 10:17:23 jim
Energy Density 10:16:53 jim
USNO 09:45:48 jim
United States Naval Observatory 09:45:26 jim
Time And Epochs 09:43:52 jim
Year 1858 09:35:51 jim
OpenVMS 09:31:40 jim
Wikipedia 09:29:58 jim
System time 09:29:04 jim
Year 1582 09:24:48 jim
Year 1965 09:20:23 jim
TNBT 09:19:59 jim
The Next Big Thing 09:19:42 jim
OKR 09:08:04 jim
DNS Queries over HTTPS 08:22:49 jim
DoH 08:09:35 jim
02.06.2018
Entitlement Example 15:18:41 jim
LDAP Searches 09:54:11 jim
Web Blog_blogentry_020618_1 08:28:27 jim
OAuth 2.0 Software Statement 08:24:49 jim
FIDO2 08:08:31 jim
FIDO 07:56:11 jim
01.06.2018
Identify and Authenticate access to system components 11:45:32 jim
Windows Logon 11:39:37 jim
Wendy 11:38:55 jim
Service Account 11:38:34 jim
Privileged User Management 11:38:02 jim
Privileged Access Management 11:37:44 jim
Policy Administration Point 11:37:29 jim
Local Administrative Accounts 11:37:06 jim
Kerberos Service Account 11:36:49 jim
Kerberos Forged Ticket 11:36:34 jim
Internal Attacker 11:35:49 jim
IDSA Integration Framework 11:33:55 jim
Emergency Identity 11:33:31 jim Emergency Accounts ==> Emergency Identity
Privileged Identity 11:33:31 jim Emergency Accounts ==> Emergency Identity
Elevated Token 11:32:43 jim
Domain Administrative Accounts 11:32:26 jim
Payment Card Industry Data Security Standard 11:20:05 jim
PCI Data Security Standard v3.2.1 11:00:27 jim
OpenID Connect Federation Async 08:00:45 jim
31.05.2018
Definitions of Managed Objects for Drip-Type Heated Beverage Hardware Devices using SMIv2 16:04:26 jim
RFC 2325 16:03:21 jim
Web Blog_blogentry_310518_1 16:02:12 jim
HTCPCP-TEA 14:04:58 jim
HTCPCP 14:03:53 jim
RFC 2324 14:03:24 jim
RFC 7168 14:03:07 jim
HTTP 401 14:02:39 jim
HTTP 418 13:58:31 jim
HTTP 403 13:54:59 jim
OAuth Error 12:41:12 jim
Forbidden 12:05:37 jim
Microsoft Disk Operating System 11:55:49 jim
MS-DOS 11:54:34 jim
OSX 11:52:31 jim
US-ASCII 11:50:14 jim
American Standard Code for Information Interchange 11:49:41 jim
27.05.2018
Automated Teller Machine 09:48:56 jim
ATM 09:48:24 jim
EMV Terms 09:47:18 jim
Demand Deposit Account 09:37:57 jim
European Banking Authority 09:23:37 jim
EBA 09:22:27 jim
26.05.2018
CommonName 09:22:41 jim
Cn 09:14:00 jim
LDAP_SERVER_RANGE_OPTION_OID 08:56:03 jim
Anomaly 08:53:37 jim
25.05.2018
UCC 10:18:26 jim
Unique Country Code 10:17:23 jim
Electronic Payments Network 10:03:50 jim
Automated Clearing House 10:01:21 jim
Financial Settlement 10:00:39 jim
Clearing house 10:00:11 jim
Financial transaction 09:54:14 jim
Agreement 09:53:13 jim
Trustee 09:36:44 jim
Beneficiary 09:34:28 jim
Fiduciary Responsibility 09:31:26 jim
Asset 09:11:16 jim
Data 08:57:01 jim
Cookie 08:46:41 jim
24.05.2018
Symmetric cipher 15:28:50 jim
Asymmetric cipher 15:28:29 jim
Electronic Code Book 12:07:27 jim
ECB 12:03:35 jim
OAuth 2.0 Incremental Authorization 11:11:27 jim
Italy 10:07:37 jim
Japan 10:06:52 jim
Germany 10:03:40 jim
France 10:00:10 jim
Replacement fertility rate 09:51:35 jim
Web Blog_blogentry_240518_1 09:49:16 jim
23.05.2018
FIPS 202 12:31:48 jim
Extendable-Output Function 12:30:14 jim
XOF 12:14:58 jim
Secure Hash Algorithm 12:12:27 jim
RFC 4634 12:07:35 jim
RFC 6234 12:07:19 jim
FIPS 180 12:02:34 jim
Federal Information Processing Standard 11:56:18 jim
HMAC-SHA 11:53:18 jim
RFC 4529 11:38:41 jim
Turn Operation 11:31:29 jim
RFC 4531 11:25:01 jim
RFC 4616 11:23:46 jim
EdirMIBTraps 11:21:40 jim
MIB 11:20:36 jim
RFC 2605 11:18:49 jim
RFC 2222 11:17:06 jim
Collective Attribute 11:16:28 jim
LDAP Server Standards and Specifications 11:14:54 jim
Network Information Service 11:05:33 jim
KRACKs 11:01:44 jim
Key Reinstallation AttaCKs 11:01:27 jim
Wi-Fi Protected Access 2 11:01:12 jim
WPA2 10:54:18 jim
Public Wi-Fi 10:53:27 jim
Proxy Auto-Config 10:37:53 jim
Web Proxy Auto-Discovery Protocol 10:32:21 jim
DHCP 10:29:13 jim
WPAD 10:27:30 jim
PAC 10:04:00 jim
Web Blog_blogentry_230518_1 10:03:27 jim
22.05.2018
WAR 13:52:02 jim
Web Blog_blogentry_220518_1 13:35:54 jim
Year 2019 09:26:38 jim
21.05.2018
Michael B. Jones 12:50:56 jim
20.05.2018
Best Practices OpenID Connect 18:56:01 jim
OAuth 2.0 Security Considerations 18:55:41 jim
17.05.2018
Security Token Service 09:10:43 jim
Architecture 09:08:38 jim
Enterprise Access Manager Product 09:03:33 jim
Identity and Access Management 09:01:34 jim
Security Token 08:28:49 jim
16.05.2018
Law of Consistent Experience Across Contexts 16:57:59 jim
Law of Pluralism of Operators and Technologies 16:56:46 jim
NOFORN 16:55:43 jim
AS_REQ 15:39:20 jim
AS_REP 15:39:02 jim
AP_REP 15:38:50 jim
TGS Exchange 15:14:58 jim
TGS_REP 15:13:55 jim
TGS_REQ 15:11:10 jim
Kerberos Cryptosystem Negotiation Extension 14:51:53 jim
AP_REQ 14:46:19 jim
Kerberos Encryption Types 14:25:06 jim
Kerberos Encryption Types/as_resp-kerberos.png 13:54:52 jim as_req-kerberos
Kerberos Encryption Types/as_req-kerberos.png 13:54:36 jim as_req-kerberos
Etype 13:46:36 jim
DES3 10:37:55 jim
NIST.SP.38 10:36:43 jim
Cipher-based Message Authentication Code 10:34:39 jim
CMAC 10:28:45 jim
RFC 4757 10:24:08 jim
RFC 3962 10:22:44 jim
RFC 3961 10:21:41 jim
Anonymous Cipher Suite 09:42:33 jim
TLS_NULL_WITH_NULL_NULL 09:41:55 jim
Cyclic Redundancy Check 09:38:10 jim
CRC 09:31:22 jim
SHA1 09:28:38 jim
CTS 08:50:09 jim
MsDS-SupportedEncryptionTypes/MMC-msDS-SupportedEncryptionTypes.png 08:37:26 jim MMC-msDS-SupportedEncryptionTypes
1.2.840.113556.1.4.1963 08:33:20 jim
FLAG_ATTR_IS_CRITICAL 08:32:47 jim
Web Blog_blogentry_160518_1 08:15:14 jim
14.05.2018
Marketing 09:11:57 jim
Account-Based Marketing 09:05:24 jim
Advertising 09:03:34 jim
Advertisement 09:03:14 jim
Goods 08:59:16 jim
Payment 08:55:48 jim
Advertising technology 08:47:35 jim
13.05.2018
Data processing 19:40:29 jim
Data In Process 19:29:34 jim
Adtech 19:09:08 jim
Web Blog_blogentry_130518_1 19:08:19 jim
BitShares 10:48:46 jim
USD 10:39:40 jim
DAC 10:27:54 jim
Decentralized Autonomous Organization 10:26:30 jim
BTS 10:10:14 jim
Control 08:20:22 jim
12.05.2018
Martin Hellman 20:41:15 jim
Whitfield Diffie 20:40:10 jim
Year 1975 20:39:03 jim
Diffie-Hellman 20:38:41 jim
HTTP Strict Transport Security 18:12:46 jim
Governance 08:56:22 jim
Federation 08:46:59 jim
Data aggregator 08:35:25 jim
Data Pedigree 08:30:30 jim
Actionable Intelligence 08:25:22 jim
Data Swamp 08:15:44 jim
11.05.2018
Username 11:25:55 jim
Password Validator 11:25:13 jim
Memorized secrets 11:03:27 jim
Verifier 10:44:32 jim
Verification 10:43:02 jim
Authenticator 10:36:28 jim
Life cycle 10:13:58 jim
NIST.SP.800-63 10:13:20 jim
NIST Electronic Authentication Guideline 10:11:50 jim
FIPS 199 10:08:56 jim
Magnitude of the Potential loss 10:03:50 jim
NIST.SP.800-122 09:55:45 jim
Patient 09:37:42 jim
Health Insurance Portability and Accountability Act 09:36:58 jim
United States Cryptography Export-Import Laws 09:29:12 jim
RSA_EXPORT 09:27:03 jim
Self-regulating Provisioning 09:25:23 jim
Criminal action 09:15:36 jim
United States Federal Standard 09:14:48 jim
LdapStdCompliance 09:13:45 jim
2.16.840.1.113719.1.27.4.82 09:08:29 jim
Regulatory Burden 09:03:40 jim
Compliance Burden 09:01:58 jim
Compliance 08:57:52 jim
Regulatory compliance 08:51:20 jim
10.05.2018
NDSPKISDKeyServerDN 17:46:43 jim
SASSecurity 17:36:42 jim
NDSPKISDKeyAccessPartition 17:27:59 jim nDSPKISDKeyAccessPartition ==> NDSPKISDKeyAccessPartition
Key Access Partition 17:20:05 jim
SAS Data Flow Manager 17:06:17 jim
SASService 16:59:39 jim
Data Processing Agreement 12:28:10 jim
Pseudonymization 12:22:50 jim
Curators 11:58:28 jim
Data Collection 11:57:55 jim Content curation ==> Data curation
Data subject 11:42:33 jim
09.05.2018
2.16.840.1.113719.1.48.4.1.9 15:09:03 jim
NDSPKIKeyMaterialDN 15:07:49 jim
NovellS Challenge Response System 15:03:19 jim
2.16.840.1.113719.1.1.4.1.120 15:00:56 jim
2.16.840.1.113719.1.39.6.1.2 14:55:13 jim
SAS 14:44:37 jim
Secure Authentication Services 14:44:19 jim
SASLoginSecretKey 14:35:48 jim
Loadable Module 13:57:11 jim
Session Key 13:48:56 jim
Server Storage Key 13:45:07 jim
TreeKey 13:41:35 jim
SDI Key 13:38:36 jim
Security Domain Infrastructure 13:30:44 jim
NICISDI Keys 13:29:05 jim
Niciext 12:34:38 jim
NDS Connection States 12:18:36 jim
Curses 11:21:40 jim
Utility 11:18:27 jim
ReplicaUpTo 11:03:46 jim replicaUpTo ==> ReplicaUpTo
RFC 8392 00:15:10 jim
CBOR Web Token 00:14:19 jim
08.05.2018
CTAP 13:47:16 jim
1.2.840.113556.1.4.805 11:04:33 jim
LDAP_SERVER_TREE_DELETE_OID 11:04:05 jim
Subtree Delete Control 11:02:36 jim
Deleted object 11:00:41 jim
1.2.840.113556.1.4.2058 10:53:23 jim
IsRecycled 10:52:55 jim
Deleted-objects 10:49:52 jim
Tombstone 10:48:34 jim
Recycled-object 10:47:48 jim
FLAG_ATTR_IS_CONSTRUCTED 10:21:13 jim
FLAG_ATTR_REQ_PARTIAL_SET_MEMBER 10:20:43 jim
1.2.840.113556.1.2.48 10:13:23 jim
IsDeleted 10:13:07 jim
1.2.840.113556.1.5.72 10:02:32 jim
NTDSService 10:01:31 jim
1.2.840.113556.1.2.54 09:54:46 jim
TombstoneLifetime 09:54:29 jim
Microsoft Active Directory 09:40:12 jim
Mutual TLS 08:48:04 jim
JSON Web Token Best Current Practices 08:06:11 jim
07.05.2018
NICI 3.0 23:28:24 jim
Key server 23:14:17 jim
NICISDITreeKeyProviderFaultTolerance 23:12:21 jim
NICITreeKeyProvider 22:33:55 jim
SDIDIAG 22:10:02 jim
DirXML-DriverVersion 18:14:02 jim
Assurance Level 14:48:41 jim
Financial damage 14:45:53 jim
Real Risk 14:44:57 jim
Level Of Assurance 14:31:10 jim
High 14:04:25 jim
Moderate 14:03:51 jim
Low 14:03:20 jim
Level of Assurance (LoA) Profiles 13:58:50 jim
M-04-04 Level of Assurance (LOA) 13:48:41 jim
Evaluation Assurance Level 13:45:24 jim
Identity Ecosystem Framework 13:40:25 jim
Identity Assurance Framework 13:39:29 jim
Identity Assurance Level 13:38:44 jim
Best Practices for LDAP Security 13:36:24 jim
Contingency Planning 13:31:27 jim
Controlled Unclassified Information 13:22:55 jim
Federation Assurance Level 12:21:14 jim
GOST 11:30:13 jim
Social Websites 11:28:51 jim
Russia 11:28:04 jim
Russian Federation 11:27:31 jim
Soviet Union 11:26:16 jim
CIS 11:21:35 jim
Commonwealth of Independent States 11:21:10 jim
RFC 4491 11:13:00 jim
RFC 4055 11:10:26 jim
EncipherOnly 11:03:09 jim
DecipherOnly 11:02:56 jim
CRLSign 10:59:18 jim
KeyAgreement 10:57:32 jim
PathLenConstraint 10:53:22 jim
KeyCertSign 10:36:09 jim
KeyEncipherment 10:32:55 jim
06.05.2018
DEA 10:58:44 jim
Drug Enforcement Administration 10:57:55 jim
United States Attorney General 10:56:50 jim
Attorney General 10:56:18 jim
VPOTUS 10:47:18 jim
United States Congress 10:38:02 jim
United States Department of Education 10:31:49 jim
Family Educational Rights and Privacy Act 10:28:47 jim
Protected Data 10:04:22 jim
Data Access Governance 10:03:48 jim
NIST.SP.800-53 09:58:22 jim
Controlled Technical Information 09:57:47 jim
Cardholder Data 09:56:17 jim
Export restrictions 09:53:52 jim
Financial Data 09:52:44 jim
Data Classification 09:49:28 jim Data Constraint ==> Protected Data
FTI 09:40:50 jim
EAR 09:34:05 jim
ECCN 09:27:20 jim
CCL 09:24:16 jim
Export Administration Regulations 09:15:26 jim
Code of Federal Regulations 08:38:41 jim
Federal Register 08:34:34 jim
CFR 08:28:10 jim
Treatment, Payment and Health care Operations 08:24:16 jim
Federal Acquisition Regulation 08:22:04 jim
FAR 08:17:09 jim
DFARS 08:10:49 jim
Defense Federal Acquisition Regulation Supplement 08:10:17 jim
CTI 08:06:47 jim
05.05.2018
Disclosure-Alteration-Destruction 11:33:30 jim
Data Loss Prevention 11:33:06 jim
DSI 11:31:50 jim
Availability 11:31:18 jim
Data Disposal 11:18:20 jim
Data Management 10:20:40 jim
Information Rights Management 10:13:24 jim
DAD 09:53:03 jim
Identity Attributes 09:42:33 jim
04.05.2018
Sexual orientation 15:58:41 jim
Gender 15:57:36 jim
Genetic Data 15:51:51 jim
EC 15:49:18 jim
European Commission 15:48:59 jim
03.05.2018
Privacy Policy 11:42:42 jim
02.05.2018
Individual 15:11:52 jim
Creative Network 15:05:53 jim
Friends 14:55:01 jim
Tribe 14:53:51 jim
Megaband 14:53:32 jim
Hunter-gather 14:53:00 jim
Sympathy group 14:52:10 jim
Clique 14:51:35 jim
If men were angels 13:23:39 jim
Web Blog_blogentry_020518_1 13:21:55 jim
Bruce Schneier 13:13:25 jim
Liars and Outliers 13:02:34 jim
Trust 12:26:01 jim
Key-Exchange 09:23:05 jim
Key-Establishment 09:20:25 jim
NIST.SP.800-56A 09:17:05 jim
ECMQV 09:11:01 jim
HMQV 09:07:00 jim
MQV 09:04:45 jim MenezesQuVanstone ==> Menezes-Qu-Vanstone
Fully Hashed Menezes-Qu-Vanstone 08:59:51 jim
FHMQV 08:54:24 jim
Elliptic Curve Menezes-Qu-Vanstone 08:53:05 jim
Elliptic Curve 08:47:03 jim
Cryptanalysis 08:31:08 jim
01.05.2018
NIST.SP.800-107 09:11:42 jim
Secret-key 09:06:16 jim
Keying material 09:04:15 jim
Key agreement 08:56:55 jim
Shared Secret 08:54:28 jim
Key Derivation Function 08:46:23 jim
NIST.SP.800-70 08:35:21 jim
Collision Resistance 08:26:15 jim
Message-Digest 08:17:47 jim
30.04.2018
Yadis ID 17:09:16 jim
Yet Another Distributed Identity System 17:08:21 jim
Drummond Reed 16:53:28 jim
XDI 16:50:06 jim
Respect Network CORP 16:48:36 jim
Respect Trust Framework 16:42:13 jim
Evernym INC. 16:40:35 jim
Decentralized Public Key Infrastructure 16:33:03 jim Evernym ==> Evernym INC.
DKMS 16:16:15 jim
Decentralized Key Management System 16:15:59 jim
29.04.2018
Web Services Distributed Management 10:02:05 jim
WSDM 10:01:35 jim
Web Services Resource Framework 10:00:06 jim
WSRF 09:56:20 jim
Web Services Federation 09:54:10 jim
WS-Trust 09:52:51 jim
Web Services Security 09:52:32 jim
Business Process Execution Language 09:51:50 jim
Web Services Addressing 09:50:58 jim
WS-Addressing 09:49:00 jim
Identity Web Services Framework 09:43:56 jim
Circle of Trust 09:36:45 jim
IAF 09:31:21 jim
Openliberty.org 09:24:10 jim
Identity Governance Framework 09:18:38 jim
Liberty Alliance 09:11:17 jim
ID-FF 09:00:55 jim
Identity Federation Framework 09:00:38 jim
Standard compliance 08:53:56 jim
Regulatory technology 08:52:59 jim
Governance Risk Management And Compliance 08:50:40 jim
RegTech 08:28:06 jim
Web Blog_blogentry_290418_1 08:27:31 jim
28.04.2018
Help Desk 09:18:01 jim
Employee Badge 09:16:05 jim
Knowledge-Based Authentication 09:13:50 jim
KBV 08:50:56 jim
Knowledge-Based Verification 08:50:37 jim
NIST.SP.800-63-3 08:45:18 jim
27.04.2018
CaseIgnoreIA5SubstringsMatch 10:07:39 jim
CaseIgnoreListMatch 09:59:57 jim
2.5.13.11 09:56:58 jim
1.3.6.1.4.1.1466.109.114.3 09:49:14 jim
TRUE 09:42:54 jim
1.3.6.1.4.1.1466.109.114.2 09:42:10 jim
CaseIgnoreIA5Match 09:41:20 jim
LDAP Internationalized String Preparation 09:38:16 jim
RFC 4510 09:36:38 jim
LDAP Syntaxes and Matching Rules 09:15:09 jim
Simple Authentication 08:39:16 jim
26.04.2018
AuxiliaryClassFlag 22:33:27 jim
KnowledgeInformation 22:31:09 jim
Web Blog_blogentry_260418_1 14:30:22 jim
23.04.2018
Intruder Detection 21:01:22 jim
Account Restrictions 21:00:30 jim
Managed Service Account 20:58:27 jim
Computer account 20:50:41 jim
Account Inactivity 20:49:53 jim
Application Accounts 16:00:08 jim
Protocol Vulnerability 15:37:59 jim
Thread 15:18:14 jim
Buffer overflow 15:15:34 jim
SQL Injection 15:10:38 jim
Password Generator 14:58:47 jim
SQLi 14:48:02 jim
Page Fault 14:20:08 jim
Swap Space 14:18:18 jim
Virtual Memory 14:05:35 jim
ISO 80000 08:14:17 jim
SI 08:08:04 jim
ISQ 07:53:33 jim
Seconds 07:52:57 jim
International System of Quantities 07:50:31 jim
21.04.2018
Kibibyte 11:55:33 jim
Terminology for Constrained-Node Networks 11:52:32 jim
KiB 11:50:19 jim
Device Flow 08:28:51 jim
20.04.2018
Increment 08:14:32 jim
Release Management 08:13:43 jim
Release 08:11:28 jim
AAL2 07:53:17 jim
AAL1 07:53:13 jim
AAL3 07:52:51 jim
Impersonation-resistant 07:51:29 jim
Web Blog_blogentry_190418_1 07:43:09 jim
Identity Provider (IDP) 07:40:59 jim
Attribute references 07:39:34 jim
Authentication intent 07:35:36 jim
19.04.2018
Risk-Based Authentication 18:45:27 jim