jspωiki
FullRecentChanges

These are all of the changes made to these pages. A much shorter list is available in RecentChanges.

19.09.2020
Message Passing Interface 08:59:28 jim
Broadcast 08:48:41 jim
Frame 08:40:29 jim
Frame Relay 08:36:30 jim
IP Address 08:19:08 jim
Internet Protocol Address 08:17:00 jim
15.09.2020
Private Communications Technology 13:26:56 jim
PCT 13:24:19 jim
Netlogon Remote Protocol 13:13:28 jim
MS-NRPC 13:13:03 jim
Schannel SSP 13:10:38 jim
MSRPC 12:08:00 jim
PKCS12 09:37:43 jim
PKCS7 09:33:06 jim
Privacy-Enhanced Mail 09:30:11 jim
Distinguished Encoding Rules 09:29:41 jim
Certificate Formats 09:15:43 jim
OpenSSL 09:09:54 jim
Edirectory Certificate Management 09:08:25 jim
Converting Certificate Formats 09:08:07 jim
Certificate Keystores 09:07:38 jim
Certificate 09:05:26 jim
13.09.2020
Ephemeral Device 08:08:03 jim
Device 07:57:14 jim
05.09.2020
Active Directory Service Interfaces 07:55:06 jim
MS-ADSA 07:38:43 jim
AccountExpires 07:36:24 jim
LDAP Object Identifier Descriptors 07:30:38 jim
02.09.2020
Mandatory Integrity Control 09:38:55 jim
Securable object 09:34:58 jim
Security Descriptor 09:33:28 jim
Access Control Model-Microsoft Windows 09:08:13 jim
Integrity Level 09:01:44 jim
27.08.2020
Kerberos 11:01:35 jim
23.08.2020
Evidence 15:59:29 jim
20.08.2020
NIST.SP.800-207 12:24:22 jim
Zero Trust 12:19:46 jim
Member Attribute 11:24:55 jim
Groups Are Bad 11:19:37 jim
18.08.2020
TreeKey 13:58:13 jim
14.08.2020
GHz 09:39:36 jim
Novell Access Manager 09:38:41 jim
Z-Wave 09:38:01 jim
Gigahertz 09:36:25 jim
Physical Layer 09:21:47 jim
IEEE 802.11 09:18:21 jim
Orthogonal frequency-division multiple access 09:12:11 jim
OFDMA 09:09:55 jim
Universal Terrestrial Radio Access Network 09:07:13 jim
Universal Subscriber Identification Module 09:04:39 jim
Base Station Controller 09:04:16 jim
Base Transceiver Station 09:01:05 jim
LTE 08:54:33 jim
4G 08:25:24 jim
10.08.2020
Active Directory Schema Related LDAP Searches 15:14:43 jim
26.07.2020
NTLM SSP 08:42:54 jim
ONC 08:37:49 jim
OncRpc 08:37:13 jim
Getent 08:30:14 jim
ONC-RPC 08:28:50 jim
NIS Maps And LDAP Attributes 08:23:28 jim
WikiRPCInterface 08:19:09 jim
24.07.2020
Country Code 08:07:39 jim
Mobile Country Code 07:54:48 jim
MVNO 07:43:56 jim
Mobile Virtual Network Operator 07:43:37 jim
23.07.2020
Windows Authentication Package 08:58:40 jim
DLL 08:57:51 jim
Dynamic-Link Library 08:57:01 jim
Loadable Module 08:55:30 jim
19.07.2020
Certificate Extensions 09:13:16 jim
Subject Public Key Info 09:08:57 jim
Certificate Subject 09:06:22 jim
Certificate Issuer 09:00:38 jim
Certificate Algorithm ID 08:55:50 jim
Certificate Version 08:51:57 jim
Certificate Validity Period 08:46:06 jim
TBSCertificate 08:42:23 jim
X.509v3 08:21:05 jim
16.07.2020
AD Determining Password Expiration 09:49:42 jim
13.07.2020
Password Anti-Pattern 20:09:09 jim
Password Maximum Length 19:57:31 jim
Password Periodic Changes 19:53:59 jim
12.07.2020
Microsoft Active Directory 09:04:37 jim
09.07.2020
Next Generation Access Control 10:31:41 jim
03.07.2020
ExtensibleMatch 21:16:32 jim
DistinguishedNameMatch 21:10:14 jim
28.06.2020
Verify DNS Records 08:36:37 jim
26.06.2020
Trust 08:52:05 jim
24.06.2020
Web Blog_blogentry_011118_1 16:50:18 jim
Social Justice 16:49:45 jim
Group of 7 16:49:28 jim
Harvard University 16:48:59 jim
Wealth 16:47:57 jim
Social Engineering Attack 16:38:38 jim
22.06.2020
User Application 16:11:09 jim
Installing-RBPM-4.x 16:09:54 jim
JAVA_HOME 16:05:20 jim
Java KeyStore 15:51:53 jim
11.06.2020
Active Directory RISK Related Searches 14:50:51 jim
INTERDOMAIN_TRUST_ACCOUNT 14:39:10 jim
09.06.2020
Electronic Signatures 18:48:52 jim
05.06.2020
LdapPermissiveModify 18:42:04 jim
Net Address 18:29:39 jim
Tagged Data 18:28:12 jim
LoginIntruderAddress 18:26:37 jim
2.16.840.1.113719.1.1.5.1.12 18:13:49 jim
02.06.2020
LDAP_MATCHING_RULE_IN_CHAIN 17:02:03 jim
Forward link 17:00:50 jim
LinkID 16:59:29 jim
Linked Attribute 16:58:18 jim
BackLink 16:57:20 jim
DirectReports 16:38:18 jim
Manager 16:36:49 jim
01.06.2020
1.2.840.113556.1.5.69 16:11:13 jim
NTDSSiteSettings 16:10:52 jim
LDAP policy in Active Directory 16:02:22 jim
1.2.840.113556.1.5.106 15:59:30 jim
1.2.840.113556.1.4.607 15:58:57 jim
1.2.840.113556.1.4.843 15:58:32 jim
LDAPAdminLimits 15:51:09 jim
QueryPolicyObject 15:45:51 jim
QueryPolicy 15:44:44 jim
30.05.2020
LDAP Query Examples for AD 17:17:17 jim
ObjectClass vs ObjectCategory 17:15:48 jim
29.05.2020
MaxPageSize 13:36:33 jim
28.05.2020
Electronic IDentification Authentication and trust Services 16:42:05 jim
Primary Access Token 14:22:05 jim
Impersonation Token 14:19:11 jim
TRUSTED_FOR_DELEGATION 14:17:13 jim
TRUSTED_TO_AUTHENTICATE_FOR_DELEGATION 14:14:42 jim
SECURITY_IMPERSONATION_LEVEL 14:13:59 jim
25.05.2020
F A Hayek 10:24:25 jim
Government Benefit 10:12:30 jim
Social Security 10:07:17 jim
If men were angels 07:59:30 jim
Berkman Center for Internet & Society 07:49:12 jim
False Non-Match Rates 07:26:35 jim
21.05.2020
Secure Element 15:39:44 jim
Personal Identification Number 15:38:24 jim
Security Support Provider 12:42:43 jim
Windows Credential Provider 12:42:17 jim
Security Support Provider Interface 12:07:32 jim
Windows Client Authentication Architecture 11:25:15 jim
Windows Logon 10:52:25 jim
Windows.Security.Credentials.UI 10:42:23 jim
Winlogon 10:25:07 jim
SAS 10:13:43 jim
Secure Attention Sequence 10:13:03 jim
20.05.2020
Windows Hello 17:04:05 jim
19.05.2020
Web Authentication API 10:46:00 jim
17.05.2020
CTAP2 21:16:11 jim
Offline_access 08:41:38 jim
16.05.2020
NBS 08:39:24 jim
National Bureau of Standards 08:38:31 jim
DES 08:36:14 jim
Data Encryption Standard 08:33:57 jim
GSA 08:31:02 jim
United States General Services Administration 08:30:09 jim
United States Federal Standard 08:27:42 jim
Draft Standard 08:19:10 jim
HTML Living Standard 08:18:02 jim
Standard 08:16:49 jim
Open Standard 08:08:32 jim
Bluetooth 08:05:32 jim
12.05.2020
PBKDF2 09:11:36 jim
10.05.2020
Macaroons 09:11:57 jim
08.05.2020
Proof Key for Code Exchange by OAuth Public Clients 10:03:56 jim
OAuth 2.0 Security Best Current Practice 10:01:22 jim
Code injection 09:59:33 jim
02.05.2020
SAML Holder of Key 09:16:29 jim
Proof-of-Possession 09:09:30 jim
Demonstration of Proof-of-Possession 09:07:31 jim
Credential Holder 09:04:04 jim
HoK 08:54:47 jim
Holder-of-Key 08:54:28 jim
DPoP 08:37:56 jim
OAuth 2.0 Demonstration of Proof-of-Possession at the Application Layer 08:37:21 jim
30.04.2020
MaxConnections 08:41:28 jim
27.04.2020
Schannel 14:51:57 jim
Public Key Cryptography Based User-to-User 13:45:27 jim
25.04.2020
Relationship 23:24:19 jim
Digital Identity 23:21:18 jim
24.04.2020
Bot 22:06:27 jim
State of the Internet-Security Report 22:00:50 jim
23.04.2020
SSL Handshake Failed 10:19:08 jim
How SSL-TLS Works 09:45:00 jim
MaxBatchReturnMessages 09:34:27 jim
LDAP_SERVER_BATCH_REQUEST_OID 09:31:16 jim
LDAP_SERVER_DOWN 09:19:45 jim
20.04.2020
Negotiate SSP 16:16:58 jim
Event 4624 15:20:07 jim
NO_IMPERSONATION_TOKEN 15:07:14 jim
Delegation vs Impersonation 15:04:39 jim
MaxConnIdleTime 12:29:56 jim
LDAP_SERVER_DIRSYNC_OID 10:09:50 jim
SupportedControl 10:05:34 jim
1.2.840.113556.1.4.2090 10:04:14 jim
Directory Synchronization Control Extended 10:03:29 jim
LDAP_SERVER_DIRSYNC_EX_OID 09:57:58 jim
1.2.840.113556.1.4.841 09:54:43 jim
Directory Synchronization Control 09:52:16 jim
MaxQueryDuration 09:40:48 jim
InitRecvTimeout 09:37:03 jim
MaxActiveQueries 09:34:37 jim
NTDSDSA 09:33:14 jim
PwdChangedTime 08:31:30 jim
PasswordExpirationTime 08:20:01 jim
19.04.2020
HTTP PUT 19:28:47 jim
United States PATRIOT Act 08:09:06 jim
17.04.2020
URL 11:46:19 jim
Name 11:30:04 jim
NAME 11:29:06 jim
RFC 33 11:23:54 jim
Network Control Program 11:22:42 jim
15.04.2020
UidNumber 15:57:19 jim
Subject_type 14:30:54 jim
DID Subject 14:29:32 jim
Data subject 14:27:04 jim
Identity Correlation 14:24:25 jim
Anonymity Set 09:43:41 jim
14.04.2020
OAuth Scope Example 09:20:01 jim
Long Short Term Memory networks 09:18:38 jim
Directed Acyclic Graph 09:17:59 jim
Contract of Adhesion 09:17:25 jim
Dependency 09:11:42 jim
The Twelve-Factor App 08:58:59 jim
Dependent variables 08:56:23 jim
12.04.2020
Authorization 09:18:00 jim
AuthZ 09:15:07 jim
AuthN 09:14:07 jim
Authentication 09:13:30 jim
Privilege 09:03:06 jim
Access Control Models 08:57:28 jim
11.04.2020
Internet of Things 09:31:33 jim
07.04.2020
Common Active Directory Bind Errors 13:25:21 jim
Event 4625 13:23:59 jim
05.04.2020
Cable Connections 12:38:54 jim
TV and Video Cables 12:37:15 jim
01.04.2020
MSA 10:16:26 jim
RFC 2759 10:14:27 jim
21.03.2020
Non-functional requirement 11:58:54 jim
NFR 11:46:12 jim
19.03.2020
Resource Owner 13:53:55 jim
Account owner 13:53:11 jim
Owner 13:52:08 jim
Linux Files and File Permissions 13:49:37 jim
Create Read Update Delete 13:38:13 jim
Linux Umask Settings 13:34:35 jim
OAuth Scopes 12:06:48 jim
17.03.2020
MaxTempTableSize 08:30:45 jim
Virtual List View Control 08:29:49 jim
10.03.2020
SearchResultReference 18:07:57 jim
Dereference Policy 17:39:27 jim
About this Wiki 10:13:18 jim
DS_HIDDEN_ATTR 08:47:04 jim
X-NDS_HIDDEN 08:46:01 jim
LdapGroupDN 08:24:05 jim
2.16.840.1.113719.1.27.4.2 08:23:08 jim
2.16.840.1.113719.1.27.6.2 08:19:11 jim
LdapGroup 08:18:33 jim ldapGroup ==> LdapGroup
Ldapconfig 08:14:24 jim
LdapServer 08:12:59 jim
EDirectory Ports 08:06:17 jim
Edirectory Usefull Linux Commands 08:03:22 jim
08.03.2020
Crypto AG 09:42:14 jim
06.03.2020
JNDI Examples 13:38:15 jim
05.03.2020
ModifyTimestamp 13:05:30 jim
POP 08:56:21 jim
04.03.2020
LDAP Request 14:38:56 jim
Scrum Event 13:20:21 jim
Mobile Network Operators 13:18:15 jim
Softcard 13:17:49 jim
Sprint 13:03:33 jim
Sprint Corporation 13:03:16 jim
Red Green Refactor 12:56:13 jim
Product Backlog 12:55:51 jim
Iteration Planning 12:52:43 jim
DevOps 12:51:50 jim
Continuous Development 12:51:09 jim
Sprint Backlog 12:50:03 jim
Agile Task 12:43:29 jim
User Story 12:41:50 jim
Epic 12:38:33 jim
Features 12:35:06 jim
Business value 12:34:14 jim
27.02.2020
Clearview AI 17:41:19 jim
26.02.2020
LDAP schema used by autofs 12:43:53 jim
1.3.6.1.1.1.2.9 12:42:05 jim
1.3.6.1.1.1.1.26 12:41:34 jim
1.3.6.1.1.1.2.10 12:40:45 jim
NisObject 12:39:48 jim
1.3.6.1.1.1.1.27 12:38:44 jim
NisMapEntry 12:38:14 jim
NisMapName 12:22:30 jim
NisMap 12:19:37 jim
25.02.2020
LDAP_CONTROL_NOT_FOUND 12:09:09 jim
LDAP_NOT_SUPPORTED 12:05:18 jim
LDAP_CONNECT_ERROR 12:03:37 jim
LDAP_FILTER_ERROR 11:37:41 jim
LDAP_TIMEOUT 11:34:47 jim
LDAP_DECODING_ERROR 11:34:13 jim
LDAP_ENCODING_ERROR 11:33:35 jim
LDAP_LOCAL_ERROR 11:33:04 jim
LDAP Result Codes 11:30:23 jim
LDAP Error Codes 11:28:09 jim
LDAP Client Error And Result Codes 11:26:33 jim
LDAP_ADMINLIMIT_EXCEEDED 11:18:42 jim
LDAP_SIZELIMIT_EXCEEDED 11:16:06 jim
Maximum Database Record Size 10:54:34 jim
Microsoft Active Directory Anomalies 10:37:19 jim
22.02.2020
United States Cabinet Department 11:29:01 jim
EPA 11:23:36 jim
United States Environmental Protection Agency 11:23:21 jim United States Department of Environmental Protection Agency ==> United States Environmental Protection Agency
Central Intelligence Agency 11:15:11 jim
United States Director of National Intelligence 11:08:10 jim
United States Department of Homeland Security 10:48:09 jim
United States Department of Veterans Affairs 10:44:45 jim
United States Department of Education 10:41:10 jim
United States Department of Energy 10:39:42 jim
United States Department of Transportation 10:39:01 jim
United States Department of Housing and Urban Development 10:38:21 jim
United States Department of Health and Human Services 10:37:16 jim
United States Department of Labor 10:35:41 jim
United States Department of Commerce 10:34:56 jim
United States Department of Agriculture 10:34:18 jim
United States Department of the Interior 10:33:44 jim
United States Department of Justice 10:33:03 jim
United States Department of Defense 10:31:22 jim
United States Department of the Treasury 10:30:29 jim
United States Federal Executive Department 10:25:28 jim
Mike Lee 10:15:26 jim
20.02.2020
Key-Exchange 09:42:16 jim
Key agreement 09:40:29 jim
Password-authenticated Key Agreement 09:30:33 jim
NMAS_E_MISSING_KEY 09:29:32 jim
Password-authenticated Key Exchange 09:24:06 jim
Constrained Nodes 09:22:24 jim
X25519 08:58:57 jim
19.02.2020
Password Flow From Active Directory to eDirectory 16:37:20 jim
ADDriver 16:35:02 jim
DirXML PassSync Agent 16:34:39 jim
DirXML PWFILTER.DLL 16:34:04 jim
PassSyncConfig.cpl 16:33:43 jim
AutomountMapName 12:24:44 jim
AutomountKey 12:20:16 jim
AutomountInformation 12:17:38 jim
AutomountMap 12:13:50 jim
Automount 12:09:04 jim
1.3.6.1.1.1.2.17 12:08:50 jim
Autofs 12:04:34 jim
PAMSchemaModifications 11:53:24 jim
MigratingFromNISToLDAP 11:51:36 jim
LDIF Examples Of NIS Migrated Entries 11:50:05 jim
LDAPSchemasForNISInLDAP 11:28:54 jim
DIT Locations For NIS 11:27:34 jim
LDAPAutomountInformation 11:25:47 jim
18.02.2020
SunOS 13:18:34 jim
Guest 13:14:26 jim
Nobody 13:13:50 jim
Everybody 13:13:18 jim
Netgroup 13:11:13 jim
X-NDS_ACL_TEMPLATES 12:47:33 jim
Object ACL 12:45:07 jim
Extended Flags 12:32:07 jim
17.02.2020
Client Secret 22:08:01 jim
JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants 22:06:08 jim
JSON Web Tokens 21:56:57 jim
RFC 7253 21:52:50 jim
16.02.2020
CodeSigning 22:42:01 jim
Authenticode 22:33:19 jim
LSA Protection 22:25:04 jim
MsCodeInd 22:24:27 jim
MsCodeCom 22:23:55 jim
1.3.6.1.4.1.311.2.1.22 22:21:26 jim
ExtendedKeyUsage 22:21:06 jim
1.3.6.1.4.1.311.2.1.21 22:18:42 jim
Microsoft Account 21:52:27 jim
Local Security Authority 11:44:01 jim
X-SCHEMAFLAGSEx 11:34:57 jim
FLAG_ATTR_IS_CRITICAL 11:32:57 jim
SchemaFlagsEx 11:30:50 jim
OMObjectClass 11:22:06 jim
OMSyntax 11:21:43 jim
AttributeSyntax 11:21:22 jim
SchemaIDGUID 10:59:37 jim
AttributeTypes 10:54:08 jim
RdnAttId 10:41:29 jim
FLAG_ATTR_IS_RDN 10:40:09 jim
Bounded Context 10:27:37 jim
Naming Attributes 10:13:23 jim
Best Practices For LDAP Naming Attributes 10:08:50 jim
Distinguished Names 09:53:12 jim
Escaping Distinguished Name 09:32:03 jim
14.02.2020
Member 11:46:20 jim
Active Directory Group Related Searches 11:38:48 jim
ManagedBy 11:28:50 jim
Active Directory Groups 10:50:28 jim
Financial Crimes Enforcement Network 10:21:05 jim
United States Secret Service 10:20:39 jim
13.02.2020
Encryption key 16:49:09 jim
CALG_RC4 16:31:48 jim
Publisher Channel 16:14:07 jim
11.02.2020
AD Password Filters 10:37:38 jim
10.02.2020
Device Inventory Service 10:04:39 jim
09.02.2020
Cookie 21:56:56 jim
Why Use Tokens 20:13:03 jim
BeyondCorp 15:40:36 jim
Resource Inventory Service 13:55:25 jim
Trust Inferer 13:30:11 jim
Contextual Attributes 12:49:20 jim
Context Provider 12:39:28 jim
DID Context 12:24:51 jim
JSON-LD 12:23:08 jim
08.02.2020
LDAP Query Examples 11:25:39 jim
Year 2038 11:15:38 jim
2,147,483,647 11:14:02 jim
PosixGroup 11:12:21 jim
POSIX time 11:11:28 jim
Unix Time 11:10:03 jim
Time And Epochs 11:04:13 jim
LargeInteger Date 11:02:25 jim
Nano 11:00:53 jim
Nanosecond 11:00:16 jim
International System of Units 10:58:31 jim
Week 10:55:20 jim
Seconds 10:54:52 jim
Minute 10:53:58 jim
Hour 10:52:56 jim
Day 10:52:15 jim
Year 10:51:46 jim
Web Blog_blogentry_080220_1 09:17:35 jim
07.02.2020
Access Control 20:21:14 jim
XACML 15:34:52 jim
Policy Based Management System 15:31:15 jim
RFC 2753 15:21:15 jim
Policy Enforcement Point 15:19:38 jim
06.02.2020
SudoRole 16:33:40 jim
Sudo 16:31:01 jim
LDAP Modify-Increment Extension 15:12:51 jim
DirXML Fan-Out System Intercept 11:41:50 jim
IDMLinuxUnixPlatformServices 11:41:07 jim
IDM Fan Out Unix Receiver Scripts 11:39:58 jim
DirXML Platform Services 11:38:58 jim
Overview Of Linux-Unix Fanout Driver 11:37:59 jim LinuxPlatformServices ==> DirXML Platform Services
BiDirectionalDriver 11:36:59 jim
2.16.840.1.113719.1.39.43.4.305 09:57:30 jim
NspmPolicyAgentAIX 09:56:35 jim
Installing Platform Services 09:48:16 jim
AIX Configuration 09:47:01 jim
05.02.2020
DNSName 20:10:32 jim
9,223,372,036,854,775,807 13:26:19 jim
MsDS-UserPasswordExpiryTimeComputed 13:20:58 jim
FILETIME 13:16:46 jim
LargeInteger 13:14:38 jim
2.5.5.16 13:05:21 jim
DONT_EXPIRE_PASSWORD 12:58:56 jim
04.02.2020
Universal Password 17:54:59 jim
Binary 16:01:14 jim
02.02.2020
DS_FLAG 11:58:23 jim
Netlogon attribute 11:58:02 jim
LDAP ping 11:49:36 jim
How Domain Controllers Are Located in Windows 11:46:40 jim
MS-ADDM 11:14:54 jim
Active Directory Site 11:01:01 jim
ClientSiteName 10:58:42 jim
DcSiteName 10:58:16 jim
NETLOGON_SAM_LOGON_RESPONSE_EX 10:40:26 jim
NTDSSettings 10:39:35 jim NDTSSettings ==> NTDSSettings
RFC 1035 10:36:58 jim
File Replication Service Protocol 09:58:35 jim
FRS 09:55:59 jim
DefaultNamingContext 09:38:33 jim
01.02.2020
SOA 13:57:15 jim
Sources of Authority 13:56:48 jim
Domain Name server 13:54:36 jim
Domain Name System 13:52:39 jim
8.8.8.8 13:45:56 jim
DNS record type 13:39:24 jim
DNS Resource Records 13:22:03 jim
Private-Use Networks 13:16:21 jim
Unique Local IPv6 Unicast Addresses 13:11:06 jim
ApplicationObjectSchema 13:06:33 jim
CIDR 13:03:43 jim
Special-Use Domain Names 13:02:12 jim
Example.com 12:33:56 jim
Top-Level Domain 12:32:35 jim
2.16.840.1.113719.1.1.4.1.68 11:55:53 jim
Hypertext Transfer Protocol 10:57:16 jim
Fetch API 10:55:30 jim
Web Hypertext Application Technology Working Group 10:49:27 jim
Document Object Model 10:36:49 jim
Web Origin 10:35:30 jim
Same-site Cookies 10:16:57 jim
Same Origin Policy 10:12:15 jim
29.01.2020
Cellebrite 10:06:58 jim
Palantir Technologies 09:54:05 jim
23.01.2020
Active Directory Account Lockout 12:40:32 jim
MsDS-LockoutThreshold 12:33:45 jim
Active Directory Locked Accounts 12:31:36 jim
Administratively Disabled 12:28:46 jim
LOCKOUT 12:25:52 jim
CryptoAPI 09:42:59 jim
BoringSSL 09:17:24 jim
Tink 09:15:40 jim
Cryptosystem 09:13:23 jim
Network Security Services 09:08:41 jim
Channel Binding 08:22:17 jim
LDAP Signing 08:20:06 jim
22.01.2020
Windows Security Log Event 17:05:05 jim
ADV190023 16:38:44 jim
Agile 14:12:22 jim
Deming 14:03:07 jim
PDCA 14:00:32 jim
Web Blog_blogentry_160718_1 13:56:05 jim
Leadership 13:26:07 jim
Command-and-Control Management 13:25:23 jim
Web Blog_blogentry_220120_1 13:04:36 jim
Web Blog_blogentry_100818_1 10:32:45 jim
Humorous RFCs 10:30:45 jim
Culture 10:15:23 jim
Financial API 09:37:29 jim
DirXML Driver 09:14:17 jim
NxsettingsDriver 09:13:05 jim
Web Distributed Authoring and Versioning 09:09:29 jim
WebDAV 09:05:47 jim
HTTP Method 09:04:32 jim
IETF 09:01:17 jim
Idempotent 08:42:18 jim
21.01.2020
RFC 4556 12:03:03 jim
PKINIT 12:02:11 jim
Kerberos SSP 11:55:01 jim
CredSSP 11:47:19 jim
Token Binding Protocol 10:29:20 jim
LDAPServerIntegrity 10:10:38 jim
Event 2889 10:08:36 jim
Event 2888 10:06:41 jim
Event 2887 10:04:34 jim
Event 2886 09:57:42 jim
Simple Authentication 09:08:55 jim
20.01.2020
Passing Credentials To Imanager 12:51:13 jim
18.01.2020
RFC 5929 16:04:55 jim
Channel Bindings for TLS 16:04:07 jim
Kerberos Error Codes 15:03:28 jim
SASL 12:54:57 jim
Extended Protection for Authentication 12:38:19 jim
SPNEGO 11:49:56 jim
GSS-SPNEGO 11:44:08 jim
Integrity 11:04:21 jim
IEEE 802.1X 10:59:08 jim
LDAP_STRONG_AUTH_REQUIRED 10:47:50 jim
Replay attack 10:15:13 jim
Web Blog_blogentry_170120_1 08:50:59 jim
17.01.2020
NT LAN Manager 11:53:04 jim
RFC 5056 11:25:46 jim
Crypt32.dll 09:46:14 jim
15.01.2020
AD Driver version 4.0.0.4 19:17:23 jim
Notification 09:20:25 jim
12.01.2020
Deprecating TLSv1.0 and TLSv1.1 09:05:13 jim
RFC 8447 09:00:31 jim
TLS 1.0 08:48:21 jim
11.01.2020
Main 15:30:13 jim
Encrypted Server Name Indication 09:30:04 jim
Issues and Requirements for SNI Encryption in TLS 09:29:40 jim
ENSI 09:27:51 jim
Server Name Indication 09:13:36 jim
10.01.2020
LDAP Query Basic Examples 15:11:03 jim
09.01.2020
Year 1928 09:56:31 jim
Nondelegation doctrine 09:54:39 jim
REAL ID 09:44:56 jim
2.16.840.1.113719.1.203.4.27 09:12:13 jim
DhcpDomainName 09:11:47 jim
07.01.2020
Mobile Device Management 11:19:45 jim
Mobile Device 11:18:40 jim
MDM 11:16:07 jim
Client Device 10:15:44 jim
06.01.2020
Microsoft Passport 11:43:46 jim
Interactive 09:44:49 jim
Digest SSP 09:25:01 jim
Netlogon service 09:23:55 jim
Windows Logon Types 09:12:50 jim
04.01.2020
MsDS-User-Account-Control-Computed 12:37:38 jim
1.2.840.113556.1.4.1460 12:36:46 jim
1.3.6.1.4.1.1466.115.121.1.38 11:18:23 jim
SubschemaSubentry 11:13:26 jim
02.01.2020
Forward Reference 15:28:06 jim
01.01.2020
Health Level Seven 11:49:52 jim
LONIC 11:47:44 jim
CEN TC 251 11:42:51 jim
NFC Data Exchange Format 11:29:41 jim
Data exchange format 11:28:22 jim
Data exchange 11:25:54 jim
LDAP Data Interchange Format 11:18:10 jim
Logical Observation Identifiers Names and Codes 11:03:07 jim
Fast Healthcare Interoperability Resources 10:57:50 jim
31.12.2019
Attack Groups 10:16:20 jim
Advanced Persistent Threat 10:02:18 jim
SHA-3 09:37:59 jim
30.12.2019
Copyright And Intellectual Property Page 14:53:55 jim
Crypt 12:14:02 jim
Password Storage Scheme 12:12:49 jim
29.12.2019
Grant Types 10:04:13 jim
Resource Owner Password Credentials Grant 10:01:03 jim
Extensible Authentication Protocol 09:08:49 jim
RFC 1994 09:03:10 jim
27.12.2019
Prompt Parameter 12:03:27 jim
Time slicing 10:32:25 jim
Concurrency 10:30:42 jim
Processes 10:22:22 jim
Light-Weight Process 10:20:59 jim
Multitasking 10:19:55 jim
Shared Memory 10:15:33 jim
Thread 09:53:40 jim
Asynchronous Operation 09:32:51 jim
Principal 09:24:17 jim
Agile Principles 09:19:09 jim
Web Blog_blogentry_271219_1 09:10:22 jim
24.12.2019
Authorization Code Flow 09:56:10 jim
Code_verifier 09:54:45 jim
Code_challenge 09:52:39 jim
RFC 8418 09:40:00 jim
OAuth Public Client 09:27:15 jim
ArXiv.1901.11520 09:15:24 jim
ArXiv.1601.01229 09:11:10 jim
OAuth 2.0 Threat Model and Security Configurations 09:08:11 jim
OAuth 2.0 for Native Apps 08:53:27 jim
Covert Redirect Vulnerability 08:48:00 jim
23.12.2019
Single-Page Application 14:38:35 jim
17.12.2019
Digital Wallet 10:33:46 jim
Agent 10:26:50 jim
Truststore 10:17:13 jim
15.12.2019
Hard tokens 11:44:46 jim
Multi-Factor Authentication 11:29:43 jim
Troy Hunt 11:11:23 jim
Have I been pwned 11:07:43 jim
Password Dictionary 11:05:06 jim
Password Quality 11:00:43 jim
Password Spraying 10:59:10 jim
Attack 10:58:54 jim
Password Reuse 10:49:06 jim
What To Do About Passwords 10:30:08 jim
Two-Factor Authentication 10:25:47 jim
RSA SecurID 10:14:24 jim
Password 10:03:49 jim
12.12.2019
Oauth.xyz 19:51:19 jim
08.12.2019
Web Blog_blogentry_111017_1 11:30:25 jim
Need to know 11:27:28 jim
Spying 11:26:26 jim
Espionage 11:25:51 jim
Rap Back 11:25:10 jim
United States Intelligence Community 11:20:01 jim
Office of the National Coordinator for Health Information Technology 11:18:46 jim
NATE 11:17:21 jim
Mobile Operator Discovery, Registration & Authentication 11:14:34 jim
OpenID Foundation 11:14:13 jim
Attribute Based Access Control 11:13:40 jim
AppConfig Community 11:13:06 jim
Object Management Group 11:12:37 jim
NIST Cybersecurity Framework 11:12:18 jim
ProjectVRM 11:11:36 jim
Uniform Commercial Code 11:10:58 jim
Initiative for Open Authentication 11:10:12 jim
Identity Assurance Work Group 11:09:38 jim
Adoption 11:09:07 jim
API Adoption 11:07:46 jim
Data Provenance 11:02:56 jim
Provenance 11:00:57 jim
02.12.2019
MemberUid 13:22:29 jim
28.11.2019
MITRE Corporation 10:13:50 jim
NCSD 10:12:02 jim
US-CERT 10:11:01 jim
United States Computer Emergency Readiness Team 10:10:23 jim
EINSTEIN 10:06:54 jim
National Cyber Security Division 10:02:57 jim
CWE 09:54:11 jim
Common Weakness Enumeration 09:53:41 jim
NCF 09:36:00 jim
Common Vulnerabilities and Exposures 09:35:04 jim
National Cybersecurity FFRDC 09:34:06 jim
22.11.2019
Scrum Master 07:47:57 jim
Scrum Team 07:47:34 jim
Scrum 07:47:07 jim
Scrum Guide 07:45:09 jim
Product Owner 07:26:04 jim
21.11.2019
Iteration Demo and Review 13:03:11 jim
19.11.2019
Thunderbolt 11:49:34 jim
18.11.2019
App2app 12:11:15 jim
OpenID Connect Client Initiated Backchannel Authentication Flow 11:59:15 jim
16.11.2019
Cloud Information Model 13:08:10 jim
Data model 13:05:20 jim
Schema 13:04:19 jim
CIM 12:38:28 jim
Common Information Model 12:37:50 jim
Homomorphic Encryption 12:35:21 jim
15.11.2019
SMSC 11:13:43 jim
Short Message Service Center 11:09:45 jim
Mobile Application Part 11:08:07 jim
Authentication Center 11:06:37 jim
14.11.2019
Velocity 14:42:12 jim
Capacity 14:38:17 jim
12.11.2019
ObjectGUID 09:17:41 jim
1.2.840.113556.1.4.2 09:16:28 jim
05.11.2019
Enable UserPassword in Microsoft Active Directory 09:57:17 jim
UnicodePwd 09:25:52 jim
04.11.2019
Copyright 17:40:47 jim
Copyleft 17:33:45 jim
Original work 17:31:20 jim
Data Ownership 17:29:49 jim
Product 17:26:14 jim
Possession Factor 17:25:19 jim
Royalty Fee 17:22:43 jim
Work For Hire 17:13:34 jim
Access 17:06:48 jim
Corporate Censorship 13:15:38 jim
Organizational Censorship 13:14:28 jim
Censorship 13:13:24 jim
Royalty-free 13:07:50 jim
RFC 1738 12:21:43 jim
RFC 2396 12:19:25 jim
RFC 4266 12:13:49 jim
RFC 4248 12:12:59 jim
RFC 8089 12:12:03 jim
03.11.2019
Functional Programming 10:45:05 jim
Software design 10:39:35 jim
Programming 10:38:10 jim
Vector 09:32:35 jim
31.10.2019
OpenID Connect Federation 11:58:35 jim
Chain of trust 11:54:01 jim
Certificate Chain 11:52:40 jim
OAuth 2.0 Authorization Server Metadata 11:21:54 jim
Now 11:09:57 jim
Simultaneity 11:09:29 jim
Time 11:02:00 jim
Single Sign-On 09:25:18 jim
Active Directory Federation Services 09:22:48 jim
Event 08:40:21 jim
ISO 8601 07:43:07 jim
DateTime 07:42:36 jim
30.10.2019
Cryptographic Key 11:50:21 jim
Key-Establishment 11:38:33 jim
Key-wrapping key 11:30:07 jim
KEK 11:29:43 jim
Key Encrypting Key 11:29:14 jim
Key 10:23:33 jim
NSA Suite B Cryptography 10:14:31 jim
RFC 8423 10:13:44 jim
Commercial National Security Algorithm Suite 10:09:17 jim
CNSA 10:05:30 jim
29.10.2019
United States Congressional Delegation of Power 10:34:47 jim
Our Lost Constitution 10:32:53 jim
NEA 10:20:55 jim
IEEPA 10:20:24 jim
United States Congress 10:17:25 jim
National Emergencies Act 10:11:58 jim
Export restrictions 09:58:00 jim
International Emergency Economic Powers Act 09:54:24 jim
28.10.2019
Distributed system 15:07:40 jim
Data Scraping 15:07:22 jim
AWS API 15:07:10 jim
API versioning 15:06:54 jim
API Economy 15:06:42 jim
Observability 15:06:24 jim
OAuth 2.0 Actors 15:06:12 jim
Messaging Application Programming Interface 15:05:51 jim
Java Card 15:05:22 jim
Interface Description Language 15:05:02 jim
Hardware Abstraction Layer 15:04:19 jim
GCP Permission 15:04:01 jim
Polyglot 15:03:36 jim
Operating-system-level virtualization 15:03:15 jim
Openliberty.org 15:02:54 jim
Ten Hundred Words 12:01:15 jim
Web Blog_blogentry_281019_1 11:18:25 jim
Thing Explainer 11:14:03 jim
IG 10:34:23 jim
Implicit Grant 10:33:59 jim
ACG 10:32:49 jim
Authorization Code Grant 10:32:12 jim
CCG 10:31:22 jim
Client Credentials Grant 10:31:01 jim
Real-Time Bidding 09:47:30 jim
Advertising ID 09:38:01 jim
Advertising technology 09:33:33 jim
Search Engine Marketing 09:28:15 jim
Advertising 09:24:51 jim
Protocol ossification 09:19:30 jim
27.10.2019
E.164 15:18:43 jim
Monitoring 10:35:13 jim
Application Metrics 10:31:11 jim
Telemetry 10:29:45 jim
API 10:27:33 jim
Transmission Control Protocol 10:27:12 jim Application Programing Interface ==> Application Programming Interface
Application Programming Interface 10:27:09 jim Application Programing Interface ==> Application Programming Interface
Lets encrypt 09:00:23 jim
Certificate Renewal 08:55:14 jim
26.10.2019
Data transparency 12:38:11 jim
Transparency 12:22:39 jim
Identity Broker 11:53:12 jim
Data aggregator 11:52:10 jim
Data Visibility 11:51:13 jim
Data Valuation 11:22:23 jim
Data 11:13:38 jim
Law Enforcement Consideration 11:04:37 jim
Data Breach 11:00:17 jim
Privacy 10:40:31 jim
21.10.2019
Equifax 10:30:33 jim
Open Identity Exchange 10:28:29 jim
DNS over HTTPS 10:07:22 jim
SSL-TLS Interception 10:00:14 jim
Relative IDentifier 09:58:33 jim
Short Message Service 09:57:41 jim
Authenticator App 09:56:11 jim
SessionData 09:55:10 jim
Web Blog_blogentry_150816_1 09:54:47 jim
Hijack 09:53:51 jim
RFC 7857 09:39:16 jim
17.10.2019
Subject 09:12:41 jim
Digital Subject 09:11:39 jim
Law of agency 09:01:39 jim
Account Linking 08:46:30 jim
14.10.2019
Phone subscriber 20:26:20 jim
Mobile Equipment Identifier 20:20:41 jim
Mobile 20:20:08 jim
0.9.2342.19200300.100.1.41 20:18:57 jim
Mobile Subscriber Identification Number 20:08:12 jim
Mobile Station 20:07:35 jim
MSID 20:06:36 jim
Home Location Register 20:00:58 jim
Mobile Station International Subscriber Directory Number 13:42:10 jim
Home Network Identity 13:34:47 jim
Public Land Mobile Network 13:33:52 jim
International Mobile Subscriber Identity 13:31:29 jim
Location Area Identity 13:26:51 jim
Mobile Connect 13:12:59 jim
Subscriber Identification Module 13:01:47 jim
CHV 12:58:52 jim
Passwordless SMS Authentication 12:39:32 jim
Mobile TAN 12:18:36 jim
SS7 hack 12:17:38 jim
NIST.SP.800-63C 12:16:17 jim
Password Authentication 11:48:29 jim Passwordless Connection ==> Passwordless SMS Authentication
Password-based 11:11:29 jim
Messaging Layer Security 09:25:27 jim
Security Layer 08:56:15 jim
MLS 08:50:56 jim
DID Authentication 08:44:14 jim
Self-Issued OpenID Provider 08:26:56 jim
SIOP 07:59:30 jim
Decentralized Identity Foundation 07:48:44 jim
13.10.2019
USB Type-C 10:24:02 jim
DisplayPort 10:23:07 jim
PCI Express 10:20:53 jim
PCI 10:15:19 jim
Universal Serial Bus 10:02:23 jim
USB-C 09:43:15 jim
Mini DisplayPort 09:34:44 jim
11.10.2019
UserInfo Response 10:26:43 jim
UserInfo Request 10:22:42 jim
Userinfo_endpoint 10:17:18 jim
AccountNameHistory 09:56:45 jim
Locality 09:25:29 jim
2.5.4.7 09:21:57 jim
L 09:20:34 jim
OrganizationalUnit 09:06:49 jim
Ou 08:57:36 jim
2.5.4.11 08:57:34 jim
OrganizationalUnitName 08:50:49 jim
Identity Token 08:05:28 jim
10.10.2019
AttributeSelection 09:25:10 jim
Retrieving All Attributes 09:23:46 jim
08.10.2019
Customer Identity and Access Management 10:11:48 jim
CIAM 10:05:15 jim
General Data Protection Regulation 10:01:43 jim
Knowledge-Based Authentication 09:58:16 jim
Separation of Duty 09:57:49 jim
Identity Verification Service 09:56:22 jim
Security Information and Event Management 09:54:49 jim
Cross-site request forgery 09:54:12 jim
Accountability 09:53:06 jim
Data Protection 09:52:45 jim
Telemarketing and Consumer Fraud and Abuse Prevention Act 09:51:49 jim
Data Loss Prevention 09:46:49 jim
Prevention 09:44:48 jim
SIM Swap 09:41:43 jim
07.10.2019
IDM Related Compliance Items 14:22:33 jim
SAFE-BioPharma 14:19:39 jim
United States Food and Drug Administration 14:14:31 jim
Clinical Decision Support 14:14:06 jim
USFDA 14:09:57 jim
FDA 14:09:37 jim
Clinical Data 13:59:53 jim
Poverty 09:12:46 jim
OPAL Project 09:08:11 jim
International Monetary Fund 09:07:45 jim
Facial recognition 09:05:29 jim
COPPA 09:00:16 jim
Childrens Online Privacy Protection Act 08:56:40 jim
Web Blog_blogentry_071019_1 08:42:11 jim
Privacy And Security Conflicts 08:33:30 jim
End-to-end Encryption 08:27:45 jim
State secrets privilege 08:10:03 jim
Five Eyes Intelligence Alliance 07:26:58 jim
Privacy and Economics 07:22:50 jim
06.10.2019
NISTIR 8112 17:52:57 jim
FVEY 17:48:30 jim
Releasability 17:45:20 jim
NIST Interagency Report 17:39:10 jim
World Bank Group 10:10:09 jim
World Bank 10:05:16 jim
WBG 10:04:56 jim
United Nations Economic and Social Council 10:02:46 jim
ECOSOC 10:00:51 jim
Organization for Economic Cooperation and Development 09:55:45 jim
United Nations 09:55:19 jim
G20 09:44:40 jim G-20 ==> G20
Group of 20 09:44:40 jim G-20 ==> G20
Financial Action Task Force 09:42:56 jim
GAFI 09:40:40 jim
FATF 09:40:27 jim
G7 09:38:27 jim
ACH 09:28:35 jim
ISO 15022 09:19:08 jim
Society for Worldwide Interbank Financial Telecommunication 09:05:33 jim
03.10.2019
2.16.840.1.113730.3.4.9 08:44:33 jim
MemberOf 08:42:14 jim
02.10.2019
ISO 7498 09:12:16 jim
NIST Privacy Framework 08:13:32 jim
User-agent 07:56:03 jim
30.09.2019
EnhancedSearchGuide 11:07:42 jim
Enhanced Guide 11:07:00 jim
1.3.6.1.4.1.1466.115.121.1.21 11:05:54 jim
SearchGuide 10:58:43 jim
BaseDN 10:51:28 jim
Russian Federation 10:47:06 jim
Union of Soviet Socialist Republics 10:46:16 jim
Commonwealth of Independent States 10:44:53 jim
2.5.4.14 10:42:36 jim
Country 10:37:53 jim
USSR 10:23:51 jim
National Security 09:35:45 jim
Legitimacy 09:35:12 jim
Propaganda 09:34:40 jim
FAIRVIEW 09:32:28 jim
IDM and the Organization Dilemma 09:31:19 jim
Politics 09:29:23 jim
System 09:28:39 jim
26.09.2019
National Provider Identifier 10:29:39 jim
Medicare Beneficiary Identifier 10:27:45 jim
Medicare Number 10:18:49 jim
Unique Health IDentifier 10:17:54 jim
MBI 10:16:42 jim
Patient matching 09:15:13 jim
24.09.2019
DPPA 22:38:11 jim
Drivers Privacy Protection Act 22:37:51 jim
Digital Asset 14:35:03 jim
Revised Uniform Fiduciary Access to Digital Assets Act 14:33:50 jim
Client Operator 14:20:19 jim
Resource Servere Operator 14:19:24 jim
Authorization Server Operator 14:17:47 jim
Resource Rights Administrator 14:16:21 jim
OAuth Client 14:11:13 jim
Requesting Party 14:09:20 jim
Authorization Server 14:07:06 jim
Resource Server 14:05:42 jim
Network Crossover Cable 09:44:27 jim
Patch Cable 09:43:27 jim
Smart endpoints and dumb pipes 09:40:19 jim
Distributed-Queue Dual-Bus 09:39:16 jim
BUS 09:37:14 jim
I2C 09:27:20 jim
PC Hardware Cables 09:24:07 jim
IEEE 802 09:21:39 jim
23.09.2019
OAuth Confidential Client 13:15:58 jim
Web Authentication 13:08:22 jim
AppAuth 13:00:29 jim
Native application 12:52:58 jim
OAuth 2.0 Device Profile 12:49:45 jim
OpenID Connect 12:23:01 jim
Risk Assessment 10:46:44 jim
Risk 10:30:33 jim
22.09.2019
Logging 20:45:56 jim
Metrics 20:42:42 jim
Auditing 20:37:04 jim
Common Event Format 20:31:03 jim
19.09.2019
Web Services Dynamic Discovery 08:39:24 jim
17.09.2019
1.2.840.113556.1.4.1941 16:32:21 jim
Discrimination 15:56:27 jim
Intolerance 15:44:07 jim
Web Blog_blogentry_170919_1 15:29:58 jim
Cell-Site Simulators 10:22:42 jim
Free Expression 10:09:11 jim
Merkle DAG 08:59:44 jim
16.09.2019
Law 15:03:00 jim
United States Privacy Act 13:19:31 jim
ISO 2382 12:41:03 jim
ISO 7816 12:37:55 jim
United States Code 11:05:07 jim
Public Law 11:02:39 jim
Infrastructure 09:21:09 jim
Infrastructure As Code 09:13:33 jim
Cloud Native 09:09:06 jim
Software Version Number 09:07:30 jim
Version 09:00:48 jim
14.09.2019
War on Poverty 10:37:52 jim
War on 10:24:37 jim
Copyrighted 09:21:03 jim
Social Websites 09:02:35 jim
Sociality 08:58:45 jim
Delegation 08:54:17 jim
DunbarS Numbers 08:51:25 jim
Hunter-gather 08:49:46 jim
Sympathy group 08:49:04 jim
Social network 08:47:33 jim
12.09.2019
Department of Motor Vehicle 08:26:38 jim
OPSG 08:14:59 jim
Operation Stonegarden 08:14:36 jim
FirstNet 08:06:45 jim
First Responder Network Authority 08:06:26 jim
Government Surveillance 07:56:36 jim
10.09.2019
Unauthorized 10:08:00 jim
Access Control Service 10:07:38 jim
Computer Fraud and Abuse Act 10:04:00 jim
09.09.2019
Tribe 11:07:40 jim
Megaband 11:07:25 jim
Friends 11:07:09 jim
Clique 11:06:09 jim
Social contract 10:45:28 jim
Spam 10:42:09 jim
Solid 10:40:59 jim
JF2 Post Serialization Format 10:39:40 jim
Identity Web Services Framework 10:39:17 jim
Google 10:37:54 jim
Blinding Identity Taxonomy 10:35:26 jim
DNS Privacy Considerations 09:31:53 jim
DNSCurve 09:22:13 jim
OpenDNS 09:11:45 jim
CISCO 09:08:48 jim
07.09.2019
Terrorist Screening Database 10:55:45 jim
National Crime Information Center 10:54:21 jim
CJIS 10:39:19 jim
Criminal Justice Information Services 10:38:41 jim
Facial Analysis, Comparison, and Evaluation 10:34:17 jim
FACE 10:26:11 jim
GAO 10:14:58 jim
United States Government Accountability Office 10:14:38 jim
Next Generation Identification 10:09:43 jim
Repository for Individuals of Special Concern 09:57:45 jim
Advanced Fingerprint Identification Technology 09:57:11 jim
Interstate Photo System 09:56:46 jim
International Association for Identification 09:52:38 jim
Tenprint 09:50:32 jim
IPS 09:45:05 jim
Surveillance 09:31:20 jim
Video Data Intelligence 09:27:03 jim
03.09.2019
FAPI Read Write API Security Profile 20:08:02 jim
FAPI Read Only API Security Profile 20:03:59 jim
FAPI Pushed Request Object 19:58:31 jim
RFC 3112 13:50:22 jim
Authentication Password Syntax 13:45:28 jim
Identifier 10:52:37 jim
Indirect Identifier 10:51:46 jim
Pseudonymous 10:50:56 jim
Attribute 10:47:10 jim
Metadata 10:44:01 jim
Unidirectional identifier 10:29:14 jim
Omnidirectional identifier 10:26:45 jim
Identity Attributes 10:02:21 jim
PIID 09:44:10 jim
Personal data 09:20:22 jim
02.09.2019
Informed Consent 09:57:33 jim
Consent vs Authorization 09:53:58 jim
Health information 09:48:05 jim
ADA Amendments Act of 2008 09:45:40 jim
Protected Health Information 09:44:41 jim
Treatment, Payment and Health care Operations 09:43:31 jim
Health Insurance Portability and Accountability Act 09:39:03 jim
HHSOCR 09:12:29 jim
01.09.2019
Nucleotide 08:26:47 jim
DNA 08:12:58 jim
Ownership 07:51:23 jim
31.08.2019
Project Zero 08:57:12 jim
30.08.2019
Transport Layer Security 09:29:32 jim
NIST.SP.800-52 09:13:20 jim
Floating-point 08:41:17 jim
IEEE 754 08:31:35 jim
29.08.2019
American Medical Association 10:34:38 jim
Web Blog_blogentry_290819_1 10:31:42 jim
28.08.2019
Sexual orientation 13:04:23 jim
Americans with Disabilities Act 12:45:04 jim
ADA 12:41:51 jim
Civil Right 12:37:28 jim
Disability 12:34:12 jim
Race 12:30:00 jim
Skin color 12:14:40 jim
BirthDate 12:09:37 jim
Sovrin 12:08:21 jim
OpenID Connect Standard Claims 12:08:06 jim
JSON Web Token Claims 12:07:09 jim
Gender 12:06:47 jim
Default Profile Claims 12:06:13 jim
Gender identity 12:01:26 jim
Ethnic 11:59:26 jim
Hate speech 11:57:19 jim
Ageism 11:39:44 jim
Age 11:37:09 jim
Amendment I 11:25:46 jim
Data Privacy 11:24:33 jim
Legal right 11:21:07 jim
Religion 11:16:44 jim
STORMBREW 11:09:17 jim
Automated Targeting System 11:08:36 jim
Foreign Intelligence Surveillance Act 11:06:11 jim
Electronic Identity Verification 11:05:07 jim
Operational Risk 11:03:51 jim
Countering the Financing of Terrorism 11:03:09 jim
Terrorism 11:00:52 jim
United States Immigration and Customs Enforcement 10:57:36 jim
Behavioral analytics 10:55:16 jim
Executive order 10:52:04 jim
President of the United States of America 10:40:04 jim
United States Executive Branch 10:38:46 jim
Integrated Automated Fingerprint Identification System 09:23:05 jim
Analytics 09:19:02 jim
User and Entity Behavior Analytics 09:09:31 jim
Behavioral Characteristics 09:08:38 jim
27.08.2019
Telegram 09:20:37 jim
GRAM 09:07:00 jim
TON 09:05:49 jim
Telegram Open Network 09:05:32 jim
Elasticity 08:20:28 jim
Container 08:19:02 jim
Load Balancing 08:14:15 jim
Scalability 08:13:33 jim
Sharding 08:10:54 jim
Shard 08:07:46 jim
Web Blog_blogentry_270819_1 07:53:41 jim
26.08.2019
ISR 19:05:12 jim
IL 19:04:33 jim
Israel 19:03:09 jim
Mellanox Technologies 18:53:08 jim
OpenPOWER Foundation 18:50:13 jim
Linux Foundation 18:34:17 jim
Family Educational Rights and Privacy Act 12:51:26 jim
Portable Document Format 12:44:43 jim
PDF 12:41:37 jim
The Next Big Thing 12:40:36 jim
Consent Receipts 12:23:45 jim
Public Key Infrastructure Weaknesses 09:13:22 jim
Web Blog_blogentry_260819_1 08:51:09 jim
24.08.2019
Universal Second Factor Challenges 10:49:55 jim
Reflection Style 10:48:58 jim
Firebug 10:47:53 jim
Opera 10:46:15 jim
Cross Origin Resource Sharing 10:42:10 jim
HTTP OPTIONS 10:22:03 jim
23.08.2019
Calling Number Delivery 10:37:38 jim
CDN 10:37:27 jim
CND 10:37:10 jim
VSC 10:26:58 jim
Vertical Service Code 10:26:42 jim
Caller ID 10:21:00 jim
Telecommunications Network Chain 10:18:33 jim
Local Exchange 10:16:12 jim
Customer Premises Equipment 10:14:40 jim
CPE 10:07:07 jim
POTS 09:58:15 jim
Public Switched Telephone Network 09:57:18 jim
Loop Start 09:55:44 jim
Land Line 09:48:32 jim
Spoofing 09:32:07 jim
Artificial Conversational Entity 09:18:23 jim
Virtual assistant 09:18:04 jim
Voice 09:15:33 jim
Implicit Flow 08:52:04 jim
22.08.2019
Public Interest Registry 07:50:47 jim
ISOC 07:44:17 jim
Internet Society 07:43:40 jim
Internet Corporation for Assigned Names and Numbers 07:39:54 jim
.org 07:38:01 jim
21.08.2019
Web Blog_blogentry_210819_1 08:51:23 jim
19.08.2019
Verified_claims 12:30:39 jim
Tracking 12:25:05 jim
AdvertisingIdentifier 11:21:18 jim
Identifier for Advertisers 11:20:38 jim
Advanced Message Queuing Protocol 09:39:39 jim
AMQP 09:39:05 jim
WebSocket 09:25:33 jim
Publish-Subscribe 09:21:41 jim
Google Cloud Pub-Sub 09:19:59 jim
Pub-sub 09:17:49 jim
17.08.2019
Input-constrained device 09:36:24 jim
OAuth 2.0 Device Authorization Grant 09:36:01 jim
RFC 8628 09:34:09 jim
15.08.2019
North American Numbering Plan 11:43:12 jim
National Destination Code 10:54:32 jim
Number Plan Area 10:47:32 jim
NXX 10:39:05 jim
Data Leakage 08:57:48 jim
What is missing in OAuth 2.0 08:47:14 jim
Wendy 08:46:43 jim
TLS Client Authentication 08:45:57 jim
Side-channel attacks 08:44:36 jim
Privacy Considerations Distributed Ledger Technology 08:40:56 jim
Passive attacker 08:40:07 jim
OAuth 2.0 Vulnerabilities 08:39:28 jim
Computational Hardness Assumption 08:37:18 jim
CRIME 08:36:50 jim
Block Cipher Mode 08:36:32 jim
Whistleblower 08:34:07 jim
Credential Leakage 08:29:55 jim
Tokenization Service 08:28:08 jim
Tokenization 08:27:42 jim
14.08.2019
Body Worn Cameras 15:42:24 jim
Automated License Plate Reader 11:18:21 jim
Motorola Solutions 11:17:38 jim
Vigilant Solutions 11:14:17 jim
Web Blog_blogentry_081018_1 11:07:41 jim
12.08.2019
Zero-day 09:31:19 jim Zero-day exploits ==> Zero-day
Rowhammer 09:15:10 jim
Google Native Client 09:09:49 jim
Web Blog_blogentry_120819_1 08:54:02 jim
11.08.2019
Fiat Currency 08:35:54 jim
10.08.2019
Money 20:02:01 jim
08.08.2019
Foundational ID 11:03:57 jim
Government Identity 10:53:57 jim
MOSIP 10:51:43 jim
National Identification Number 10:50:57 jim
Legal Entity Identifier 10:49:32 jim
Modular Open Source Identity Platform 10:38:08 jim
Good ID 09:48:24 jim
Identity Custodian 09:40:38 jim
Self-Sovereign Identity 08:46:37 jim
05.08.2019
Amazon Web Services 15:04:26 jim
RDS 14:26:35 jim
AWS Relational Database Services 14:26:15 jim
AWS IAM 14:24:56 jim
AWS Role 14:24:23 jim
AWS CLI 14:23:55 jim
AWS Security Group 13:40:47 jim
FanOutDriver 11:17:27 jim
FanOutDriverPlatformReceiverRunModes 11:14:02 jim
CIBA 10:18:26 jim
04.08.2019
Toyota Production System 09:19:02 jim
DNS cache poisoning 09:07:09 jim
Nationality 08:39:24 jim
Citizen 08:38:35 jim
Citizenship 08:35:20 jim
Nationals 08:29:33 jim
American Samoa 08:22:45 jim
United States Virgin Islands 08:21:05 jim
Palmyra Atoll 08:12:21 jim
02.08.2019
Currency 08:59:55 jim
01.08.2019
Serverless 09:48:53 jim
Functions as a Service 09:07:34 jim
Cloud functions 09:04:40 jim
31.07.2019
Graphics Cables 12:17:10 jim
2.16.840.1.113719.1.4.0.3.2.48 12:06:28 jim Resolution ==> Resolution_AttrubuteType
2.16.840.1.113719.1.4.2.2.0 12:06:28 jim Resolution ==> Resolution_AttrubuteType
Resolution_AttrubuteType 12:06:28 jim Resolution ==> Resolution_AttrubuteType
Decentralized Identifier 12:06:01 jim
Credential Reuse 12:04:59 jim
Liability 09:12:50 jim
Accountable 09:05:43 jim
EMV Liability Shift 09:05:24 jim
Telecommunications 08:58:55 jim
Web Blog_blogentry_240815_1 08:47:34 jim
RUFADAA 08:45:16 jim
Fiduciary Responsibility 08:26:55 jim
30.07.2019
Blue-Green Deployment 17:31:18 jim
Kubernetes Service 17:13:10 jim
YAML 17:06:41 jim
Kubernetes 16:56:41 jim
Kubernetes Pod 16:44:31 jim
Kubernetes Node 16:44:10 jim
Software library 15:22:53 jim
Continuous Improvement 15:06:04 jim
TokenGroups 10:52:00 jim
Group-AD 09:38:45 jim
Boolean Sensitivity 09:14:29 jim
Web Blog_blogentry_300719_1 09:04:47 jim
Server-side TLS configuration guide 07:57:17 jim
27.07.2019
Proxy Server 08:54:11 jim
Reverse Proxy 08:48:26 jim
Gateway 08:44:18 jim
Application Load Balancing 08:36:27 jim
GCP Virtual Private Cloud 08:11:51 jim
Proxy 08:07:34 jim
26.07.2019
Key Generation 17:49:18 jim
ROPC 08:27:05 jim
25.07.2019
Knowledge Consistency Checker 12:54:07 jim
Forest functional levels 12:35:28 jim
KCC 12:32:04 jim
Global Catalog 12:28:36 jim
AD DOMAIN 12:26:45 jim
2.16.840.1.113719.1.1.4.1.172 11:59:23 jim
DsRevision 11:12:21 jim
Determine LDAP Server Vendor 11:07:14 jim
Verifiable Credentials 09:43:08 jim
Verifiable Claims 09:42:41 jim
Web Blog_blogentry_250719_1 09:26:39 jim
23.07.2019
English 09:08:33 jim
En 09:08:01 jim
Language-Tag 09:06:46 jim
Language-subtag 09:01:24 jim
GB 08:55:17 jim
Blockchain 08:49:19 jim
Video Surveillance 08:44:29 jim
License 08:36:38 jim
Licence 08:32:21 jim
Firearms License 08:24:07 jim
Nautical License 08:23:23 jim
Examples of Evidence 08:21:00 jim
Workplace Surveillance 08:09:54 jim Surveillance in the Workplace ==> Workplace Surveillance
ANPR 08:04:44 jim
Emotion 07:36:21 jim
Convolutional Neural Network 07:31:37 jim
22.07.2019
United States Constitution 13:10:40 jim
Amendment XI 13:08:15 jim
Amendment X 12:58:17 jim
Amendment IX 12:57:45 jim
Amendment II 12:57:00 jim
Amendment VIII 12:56:37 jim
Amendment VII 12:56:01 jim
Amendment VI 12:55:23 jim
Amendment V 12:54:41 jim
Amendment IV 12:54:08 jim
Amendment III 12:53:07 jim
Bill of Rights 12:48:36 jim
Transcription United States Constitution 12:25:53 jim
Government abuse 12:10:00 jim
Usurpation 12:07:51 jim
INA 11:51:07 jim
Immigration and Nationality Act 11:50:44 jim
Lawful Permanent Resident 11:48:17 jim
Open-source intelligence 11:40:30 jim
OSINT 11:39:57 jim
Investigative Data Warehouse 11:38:06 jim
Translingual Information Detection, Extraction and Summarization 11:36:17 jim
TIDES 11:34:42 jim
System of Records Notice 11:16:24 jim
Web Blog_blogentry_260816_1 11:02:57 jim
Best Practices For Unique Identifiers 11:01:50 jim
Government Data Store 10:49:00 jim
Right to Financial Privacy Act 10:45:45 jim
Customer Identification Program 10:45:18 jim
Web Blog_blogentry_220719_1 10:22:51 jim
Government 10:19:23 jim
Bitcoin network genesis block 09:27:04 jim
Nakamoto consensus 09:24:43 jim
SHA-2 09:23:30 jim
Paul Calder Le Roux 09:07:48 jim
Satoshi Nakamoto 08:56:45 jim
Encryption for the Masses 08:31:52 jim
E4M 08:29:56 jim
21.07.2019
Location Area Code 13:31:26 jim
User Equipment 13:27:13 jim
Tracking Area 13:21:05 jim
Tracking Area Code 13:15:58 jim
TAC 13:05:42 jim
CELLID 12:46:04 jim
FASCIA 12:41:45 jim
DROPOUTJEEP 12:41:09 jim
Web Blog_blogentry_210719_1 12:18:19 jim
AWS Shield 11:57:35 jim
0-RTT Handshakes 11:54:35 jim
Network Address Translation 11:51:59 jim
Interconnection 11:50:15 jim
Carrier-Sense Multiple Access 11:49:43 jim
LDAP Protocol dependencies 11:49:08 jim
No CVM required 11:48:31 jim
Google Global Cache 11:47:45 jim
HAMMERCORE 11:44:15 jim
HAMMERSTEIN 11:43:35 jim
SYNC 11:42:53 jim
Firewall 11:42:10 jim
HTTP Over TLS 11:40:18 jim
Web Blog_blogentry_021117_1 11:39:36 jim
Traffic 11:38:23 jim
Network traffic 11:37:52 jim
Edge Proxy 11:34:31 jim
Payload 11:32:43 jim
Network devices 11:24:46 jim
Network Switches 11:20:37 jim
Node 11:18:01 jim
2.16.840.1.113719.1.1.4.1.55 11:16:39 jim
Internet 11:15:38 jim
NetworkAddress 11:13:52 jim
Bridging 11:02:05 jim
Routing 10:57:18 jim
End-to-End Security 09:56:23 jim
Email Address 09:42:54 jim
20.07.2019
ARCOS 21:55:49 jim
18.07.2019
Legal Person 14:45:41 jim
Limber 12:02:53 jim
NdsStatusLimber 11:55:19 jim
LDAP Extensions and Controls Listing 11:40:27 jim
Ndstrace 11:37:56 jim
LMBR 11:32:56 jim
2.16.840.1.113719.1.1.4.1.517 11:10:45 jim
Continuous Delivery 10:30:50 jim
Continuous integration 10:17:20 jim
Continuous testing 10:14:46 jim
Software development practice 10:01:04 jim
Operating System 09:43:19 jim
DOS 09:26:13 jim
DECnet 09:13:51 jim
ARP Poisoning 09:07:49 jim
Address Resolution Protocol 09:06:17 jim
VINES Internetwork Protocol 09:03:35 jim
ARP 08:57:22 jim
Domain-based Message Authentication, Reporting & Conformance 08:52:15 jim
RFC 6376 08:50:12 jim
DomainKeys Identified Mail 08:48:54 jim
DKIM 08:34:29 jim
RFC 7208 08:33:17 jim
Sender Policy Framework 08:31:29 jim
SPF 08:21:15 jim
RFC 7489 08:12:18 jim
DMARC 08:08:04 jim
Web Blog_blogentry_180719_1 08:07:29 jim
17.07.2019
LDAP and Active Directory 11:55:00 jim
Cyber Attack as a Service 09:00:49 jim
CAaaS 08:49:49 jim
Web Blog_blogentry_170719_1 08:45:14 jim
16.07.2019
OAuth 2.0 NOT an Authentication protocol 10:11:32 jim
Data disclosure 09:40:19 jim
Data loss 09:39:03 jim
Right of access 09:03:54 jim
Disclosure-Alteration-Destruction 08:42:56 jim
NIST.SP.800-122 08:22:28 jim
15.07.2019
Cloud Pricing 19:21:16 jim
Cloud computing 19:12:07 jim
NIST.SP.800-63B 13:44:35 jim
14.07.2019
State 09:40:09 jim
Constitutional Order 09:38:00 jim
Sovereignty 09:37:32 jim
DHS Office of Intelligence and Analysis 09:15:53 jim
Fusion centers 09:06:33 jim
13.07.2019
Palantir Gotham 09:52:04 jim
DMV 09:41:41 jim
FEMA 09:26:00 jim
United States Federal Emergency Management Agency 09:25:29 jim
Palantir Metropolis 08:51:36 jim
Web Blog_blogentry_130719_1 08:35:56 jim
E2EE 08:21:38 jim
12.07.2019
Entanglement 07:57:51 jim
2.5.6.3 07:48:07 jim
10.07.2019
Id_token_hint 15:19:07 jim
Certification Authority Browser Forum 10:27:58 jim
Extended Validation Certificate 10:26:20 jim
Certificate Level Of Assurance 10:25:04 jim
Organization Validated Certificate 10:17:35 jim
Domain Validated Certificate 10:15:38 jim
08.07.2019
Tomcat And LDAP 14:15:53 jim
Keystore 14:00:12 jim
AWS Elastic Kubernetes Service 13:18:14 jim
AWS VPN 13:10:33 jim
AWS Direct Connect 12:59:05 jim
AWS Virtual Private Cloud 12:57:20 jim
AWS Elastic File System 12:47:47 jim
AWS Elastic Cloud Compute 12:23:50 jim
On demand 12:16:16 jim
Microservice 12:14:47 jim
AWS Elastic Block Store 12:11:54 jim
S3 09:28:29 jim
Object storage 09:28:03 jim
Data-lake 09:27:36 jim
AWS Simple Storage Service 09:27:00 jim Amazon Simple Storage Service ==> AWS Simple Storage Service
Java Cryptography Extensions 09:24:36 jim
JCE 09:23:07 jim
Java Authentication and Authorization Service 09:22:44 jim
AWS CloudHSM 09:19:30 jim
AWS API-Gateway 09:09:27 jim
AWS Web Application Firewall 09:03:29 jim
OSI-Model 09:00:23 jim
07.07.2019
AWS Application Load Balancer 21:08:55 jim
EC2 21:00:16 jim Amazon Elastic Cloud Compute ==> AWS Elastic Cloud Compute
Virtual Private Cloud 21:00:16 jim Amazon Elastic Cloud Compute ==> AWS Elastic Cloud Compute
EBS 20:59:36 jim
AWS Amazon MQ 20:58:34 jim
AWS Route 53 20:52:36 jim
NFS 20:48:55 jim
RFC 7862 20:48:39 jim
Network File System 20:47:43 jim
AWS Serverless Application Repository 20:38:49 jim
ECR 20:34:04 jim
AWS Elastic Container Registry 20:33:39 jim AWS Amazon Elastic Container Registry ==> AWS Elastic Container Registry
ECS 20:33:23 jim
AWS Elastic Container Service 20:32:53 jim
AWS Management Console 15:56:51 jim
AWS Elastic Beanstalk 15:32:06 jim
AB Testing 15:21:58 jim
AWS Trusted Advisor 14:40:28 jim
Reliability 14:36:35 jim
Durability 14:35:38 jim
RFC 793 12:03:33 jim
TIME-WAIT 12:02:48 jim
MSL 12:00:07 jim
Connection 10:35:31 jim
LISTEN 10:29:33 jim
SYN-RECEIVED 10:27:14 jim
SYN-ACK 10:23:16 jim
SYN-SENT 10:20:06 jim
ASCII Table 10:17:57 jim SYN ==> SYN-SENT
Control character 10:17:57 jim SYN ==> SYN-SENT
Temp 10:17:57 jim SYN ==> SYN-SENT
ESTABLISHED 10:13:49 jim
Shared Responsibility Model 09:55:55 jim
AWS Inspector 09:30:09 jim
06.07.2019
Privacy Paradox 13:38:58 jim
Internet Trends Report 13:37:33 jim
Venture Capitalist 13:30:38 jim
Mary Meeker 13:29:29 jim
Privacy by Design 12:54:39 jim
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 09:52:13 jim
HMQV 09:49:02 jim
Elliptic Curve 09:48:27 jim
Backdoor 09:43:53 jim
EvilRegime 09:42:16 jim
Web Blog_blogentry_021017_1 09:41:11 jim
Optic Nerve 09:40:16 jim
Dual Elliptic Curve Deterministic Random Bit Generator 09:33:18 jim
Dual_EC_DRBG 09:28:57 jim
Trapdoor Function 09:09:08 jim
05.07.2019
Enterprise Service Bus 09:53:58 jim
Message-oriented Middleware 09:48:58 jim
Message queue 09:38:24 jim
Queue 09:30:59 jim
ActiveMQ 09:28:42 jim
AWS Simple Notification Service 09:27:31 jim
Backend as a Service 09:25:50 jim
Cloud Services Model 09:21:57 jim
Service 09:18:37 jim
04.07.2019
AWS Simple Queue Service 16:36:00 jim
Cloud Zone 16:17:16 jim
Cloud Region 16:16:12 jim
GCP Location 16:08:06 jim
GCP Cloud Load Balancing 16:01:57 jim GCP Regional ==> Cloud Region
GCP Multi-Regional 16:01:57 jim GCP Regional ==> Cloud Region
GCP Storage Classes 16:01:57 jim GCP Regional ==> Cloud Region
Fault tolerance 15:50:46 jim
Availability 15:50:18 jim
Edirectory Replicas 15:30:25 jim
Computing platform 13:15:19 jim
Stack 13:14:31 jim
AWS CloudFormation 13:09:47 jim
Production tier 13:08:25 jim
API Planing 13:06:48 jim
Testing tier 13:01:47 jim
Development tier 12:59:11 jim
Local tier 12:58:03 jim
Deployment tier 12:56:16 jim
AWS CloudFront 12:34:35 jim
AWS CloudWatch 12:22:47 jim Amazon Cloudwatch ==> AWS CloudWatch
Google Cloud Dataflow 09:20:57 jim
Google Cloud Platform 09:16:52 jim
ForgeRock 08:55:19 jim
Middleware 08:52:31 jim
Platform as a Service 08:30:47 jim
DynamoDB 08:16:16 jim
AWS Lambda 08:08:00 jim
ACDC Grant type 07:47:16 jim
Web Blog_blogentry_041118_1 07:44:57 jim
Micropub 07:43:44 jim
Touch ID 07:43:10 jim
Google Wallet vs Apple Pay 07:42:30 jim
IPhone 07:41:04 jim
Safari 07:40:36 jim
CHIMNEYPOOL 07:39:15 jim
FREEFLOW 07:38:53 jim
HTTP Request Header 07:29:32 jim
XMLHttpRequest 07:21:18 jim
03.07.2019
Web IDL 20:39:44 jim
RFC 6455 20:36:02 jim
Infrastructure as a Service 15:54:14 jim
Testing 15:09:33 jim
Health-check 14:54:54 jim
Abstraction 14:01:10 jim
Refinement 14:00:19 jim
Throttling 13:20:38 jim
Server-Side Login throttling schemes 13:11:52 jim
Domain 09:33:27 jim
Encapsulation 09:21:04 jim
02.07.2019
Outbound 19:36:48 jim
Inbound 19:36:38 jim
Mechanical Disk 17:04:45 jim
Disk 17:03:58 jim
Block storage 17:02:55 jim
Data Subject Access Request 15:16:39 jim
DSAR 15:15:31 jim
0.9.2342.19200300.100.1.10 10:39:33 jim
Data Accuracy 10:04:18 jim
Verified Claim 10:02:31 jim
Phone_number_verified 09:56:04 jim
Email_verified 09:49:31 jim
Level Of Assurance 09:41:09 jim
Claimant 09:32:23 jim
Identity Assurance Framework 09:26:22 jim
IAWG 09:19:59 jim
Credential Management 09:13:05 jim
Credential Service Provider 09:08:22 jim
Identity Proofing 08:30:33 jim
29.06.2019
Yocto 09:46:19 jim
Zepto 09:46:09 jim
Atto 09:45:59 jim
Femto 09:45:48 jim
Micro 09:45:28 jim
Centi 09:45:17 jim
Deci 09:45:07 jim
Deca 09:44:56 jim
Hecto 09:44:46 jim
Yotta 09:44:36 jim
Zetta 09:44:25 jim
Exa 09:44:14 jim
Peta 09:44:02 jim
Tera 09:43:51 jim
Giga 09:43:38 jim
Kilo 09:43:25 jim
Mega 09:42:36 jim
Milli 09:11:16 jim
Meter 09:09:32 jim
Mm 09:07:18 jim
HTTP 304 07:34:20 jim
Not Modified 07:30:08 jim
Unvalidated redirects and forwards 07:18:46 jim
27.06.2019
Certificate Request Process 21:09:43 jim
Certificate Validation Levels 21:07:12 jim
Well-known 11:04:37 jim
Credential Enrollment 10:17:13 jim
Certificate Authority 10:14:54 jim
25.06.2019
Time synchronization 09:54:35 jim
Malfeasance 09:45:36 jim
Feasance 09:41:16 jim
Time.cloudflare.com 09:29:29 jim
Cloudflare 09:24:13 jim
RFC 7384 09:19:18 jim
Packet Switched Networks 09:18:21 jim
NTS 09:17:44 jim
Cryptographic proof 09:16:21 jim
CIRCL 09:05:12 jim
Roughtime 08:57:29 jim
Web Blog_blogentry_250619_1 08:52:55 jim
Network Time Security 08:50:57 jim
Warp 08:41:28 jim
SHA-1 Deprecation 08:26:54 jim
DNS Queries over HTTPS 08:26:31 jim
1.1.1.1 08:26:02 jim
Requested_token_use 08:04:05 jim
OAuth Parameters Registry 08:02:48 jim
23.06.2019
Configuration Directory Partition 09:43:35 jim
XDAS Setup and Configuration 09:43:18 jim
IManager Server Configuration 09:42:40 jim
DirXML-ConfigValues 09:41:20 jim
Global Configuration Variables 09:36:56 jim
LDAP Client Configuration 09:36:03 jim
Zero-configuration networking 09:33:30 jim
Configuration 09:31:33 jim
Provider Configuration URI 09:30:26 jim
Openid-configuration 09:29:17 jim
Uma-configuration 09:28:27 jim
NAM Configuration Notes 09:26:28 jim
Solaris Configuration 09:24:25 jim
Configuration Management 09:23:33 jim
Change Management 09:20:42 jim
Information Technology Infrastructure Library 09:17:13 jim
ITIL 09:16:11 jim
Service Support 09:13:18 jim
SSD 09:11:40 jim
Solid State Disk 09:11:24 jim
EDirectory Performance Tuning 09:04:08 jim
BIOS 09:03:48 jim
Redhat Configuration 08:59:19 jim
Issuer Action Codes 08:41:40 jim
IAC 08:38:16 jim
22.06.2019
Stateless 09:40:01 jim
Scale 09:16:43 jim
Cloud 08:12:37 jim
Functional Requirement 08:04:47 jim
Requirement 08:01:25 jim
Constraint 07:42:28 jim
Identity Verification 07:31:08 jim
21.06.2019
Claim 10:33:40 jim
Identity Assurance 10:18:11 jim
Codebase 09:04:47 jim
Release 09:04:01 jim
Operations Team 09:03:36 jim
Development Team 09:03:19 jim
Dev 08:57:00 jim
20.06.2019
OAuth and OIDC Adoption 11:31:45 jim
IdentityServer 11:25:26 jim
Web Blog_blogentry_200619_1 10:44:54 jim OAuth Adoption ==> OAuth and OIDC Adoption
AWS Cognito 10:31:37 jim
Cloud Foundry 10:27:29 jim
Red Hat 10:24:20 jim
Keycloak 10:21:58 jim RedHat ==> Red Hat
RPM 10:21:58 jim RedHat ==> Red Hat
Red Hat Directory Server 10:21:58 jim RedHat ==> Red Hat
389 Directory Server 10:21:57 jim RedHat ==> Red Hat
Enterprise Access Manager Product 10:21:57 jim RedHat ==> Red Hat
History of LDAP 10:21:57 jim RedHat ==> Red Hat
19.06.2019
Rich Communication Services 12:03:17 jim
RCS Chat 11:52:37 jim
IMessage 11:21:49 jim
Apple ID 11:09:57 jim
Jibe Platform 11:02:41 jim
18.06.2019
CLOUD Act 13:21:05 jim
Independent contractor 13:11:38 jim
Year 2020 12:54:50 jim
2020s 12:53:34 jim
Libra Cryptocurrency 12:48:35 jim
Libra Blockchain 12:48:07 jim
HotStuff 12:23:21 jim
LibraBFT 12:17:13 jim
Web Blog_blogentry_180619_1 11:50:30 jim
Sign in with Apple 11:03:30 jim
17.06.2019
Data Origin 17:39:00 jim
2.16.840.1.113719.1.1.4.721 14:26:52 jim
NDSRightsToMonitor 14:25:52 jim
X-NDS_NEVER_SYNC 14:23:24 jim
EDirectory Monitor Entry 14:12:11 jim
16.06.2019
Linux Boot Process 13:42:21 jim
BootableDevice 13:27:24 jim
2.16.840.1.113719.1.167.6.6.1 13:25:21 jim
Virtual Disk 13:24:12 jim
Storage device 13:20:31 jim
Disk partition 13:19:41 jim
File System 13:18:47 jim
MBR 13:08:35 jim
Booting 13:07:14 jim
GRUB 13:06:22 jim
Basic Input-Output System 12:39:05 jim
POST 12:31:09 jim
Boot Loader 10:17:41 jim
Hardware 10:06:48 jim
LocalStorage 10:00:13 jim
Master Boot Record 09:57:42 jim
LILO 09:50:10 jim
Firmware 09:45:53 jim
Das u-boot 09:20:26 jim Bootstrapping ==> Booting
Unified Extensible Firmware Interface 09:10:03 jim
Coreboot 09:08:36 jim
Chromium OS 09:03:09 jim
Chrome OS 09:01:13 jim
Chromebook 08:58:02 jim
U-Boot 08:55:20 jim
Booting with GRUB 08:43:24 jim
Media Access Control Address 08:41:07 jim
Roots of Trust 08:37:50 jim
SmartMessage Language 08:36:43 jim
Hypervisor 08:36:20 jim
15.06.2019
Identity Assurance Level 08:11:52 jim
14.06.2019
AAID 16:15:17 jim
Android Advertising ID 16:06:14 jim
IDFA 16:05:10 jim
RTB 16:01:19 jim
Web Blog_blogentry_140619_1 15:48:59 jim
13.06.2019
1.3.6.1.4.1.1466.101.120.111 14:00:05 jim
ExtensibleObject 13:59:31 jim
11.06.2019
N4u.server.idle-threads 15:14:25 jim
N4u.server.active-interval 15:12:23 jim
NDS Thread Pool 14:51:19 jim
Thread delay 14:48:16 jim
Thread pool 14:46:21 jim
Worker thread 14:42:02 jim
Idle thread 14:32:03 jim
Waiting task 14:27:02 jim
Ready task 14:25:26 jim
Task 14:24:06 jim
Byte 11:15:07 jim
Megabyte 11:10:08 jim
Kilobyte 11:09:55 jim
KB 11:06:33 jim
MB 10:46:46 jim
NCP Packet 10:45:39 jim
SSL Overhead 10:40:44 jim
NMAS Login Update Interval 10:37:10 jim
EDirectory Synchronization Tips 10:34:51 jim
Asynchronous Outbound Synchronization 10:33:23 jim
EDirectory Synchronization 10:21:22 jim
ACL (eDirectory Attribute) 10:16:12 jim
DClient 09:46:54 jim
N4u.server.thread-stack-size 09:30:55 jim
N4u.server.start-threads 09:24:40 jim
N4u.server.max-threads 09:21:39 jim
IMonitor Diagnostic Logger 09:11:27 jim
FLAIM checkpoint 08:44:23 jim
Maxdirtycache 08:30:27 jim
EMBox 08:20:50 jim
GAMS 08:14:49 jim Gams ==> GAMS
NDSD Loadable Module 08:14:35 jim
Graded Authentication Management Service 08:14:17 jim
10.06.2019
LOCK 13:27:46 jim
DIB Lock 13:22:53 jim
Lock 13:21:19 jim
2.16.840.1.113719.1.1.6.1.10 13:18:38 jim
EDirCloneLock 13:17:14 jim eDirCloneLock ==> EDirCloneLock
2.16.840.1.113719.1.1.4.1.533 13:08:45 jim
CheckLockTag 13:05:46 jim
Chubby Lock Service 13:04:51 jim
Packet 13:03:46 jim
Dynamic Cache Mode 12:10:13 jim
FLAIM 11:53:24 jim
_ndsdb.ini 11:21:12 jim
Hard cache limit 11:14:52 jim
Cpinterval 11:12:56 jim
Cachecleanupinterval 10:59:13 jim
EDirectory DIB 10:27:18 jim
FLAIM Cache 10:23:34 jim
Ndsconfig Parameters 09:39:45 jim
09.06.2019
MacOS.10.14 09:32:49 jim
MacOS 09:30:31 jim
ICloud 09:19:21 jim
Instant Messaging 09:13:42 jim
Gmail 09:01:51 jim
MacOS.10.15 08:50:25 jim
IOS.13 08:48:48 jim
08.06.2019
Payment Services Directive 13:19:47 jim
Apple 12:56:18 jim
Cyclic Redundancy Check 11:24:07 jim
Keccak 11:21:40 jim
Arbitrary Length Hash 10:36:51 jim
Unkeyed Primitives 10:25:10 jim
Cryptographic Primitive 10:24:18 jim
Cryptographically secure pseudorandom number generator 10:07:55 jim
FIDO Authenticator 10:06:53 jim
Cryptographic pseudo-random number generator 10:06:03 jim
Security 09:38:36 jim
CIA 09:38:10 jim
07.06.2019
Key Life cycle 12:01:18 jim
Key Revocation 11:58:08 jim
Public Key 11:56:09 jim
Asymmetric Key Cryptography 11:54:33 jim
Asymmetric Key 11:43:37 jim
China 10:15:16 jim
Replacement fertility rate 10:13:11 jim
Federal Reserve Bank 10:12:37 jim
Population 10:11:31 jim
United States Census Bureau 10:09:21 jim
ICE 10:05:38 jim
United States Citizenship and Immigration Services 10:02:20 jim
Green Card 09:59:13 jim
Alien 09:55:55 jim
Phone Number 09:30:14 jim
Level of Identity Proofing 09:08:27 jim
CN 08:50:28 jim
Year 1912 08:49:20 jim
PRC 08:48:43 jim
PeopleS Republic of China 08:47:45 jim
Year 1949 08:43:33 jim
LDAP Authentication 08:42:34 jim
06.06.2019
Web Blog_blogentry_060619_1 09:21:27 jim
05.06.2019
National Identity Register 20:06:34 jim
Basic Registry of People 20:03:56 jim
USPS 19:51:28 jim
United States Postal Service 19:50:56 jim
Electronic Identity Credential 19:32:41 jim
EID 19:28:45 jim
BRP 19:27:03 jim
Biometric Passport 19:15:01 jim
ICAO Document 9303 19:12:57 jim
TD1 12:52:26 jim
ICAO 12:52:06 jim Machine-Readable Zone ==> Machine Readable Zone
MRZ 12:52:06 jim Machine-Readable Zone ==> Machine Readable Zone
Machine Readable Zone 12:52:06 jim Machine-Readable Zone ==> Machine Readable Zone
ISO 7501 12:47:37 jim
EMRTD 12:42:29 jim
Electronic Machine Readable Travel Document 12:42:10 jim
Passport 12:36:14 jim
Emergency Travel Document 12:35:45 jim
Visa 12:28:44 jim
Machine Readable Visas 12:15:10 jim
MROTD 12:11:01 jim
MRP 12:08:28 jim Machine-Readable Passport ==> Machine Readable Passport
Machine Readable Passport 12:08:27 jim Machine-Readable Passport ==> Machine Readable Passport
Machine Readable Official Travel Documents 12:06:40 jim
Year 1944 11:54:01 jim
International Civil Aviation Organization 11:53:35 jim
Computer vision 11:51:10 jim
MRTD 11:44:57 jim
OCR 11:44:13 jim
Optical Character Recognition 11:43:53 jim
Machine Readable Travel Document 11:32:06 jim
ISO 29003 11:09:25 jim
International Organization for Standardization 11:05:23 jim
Derivative work 10:00:45 jim
Graphical User Interface 09:59:53 jim
Command-line 09:59:32 jim
GUI 09:55:17 jim
LoginShell 09:54:35 jim
CLI 09:50:25 jim
Bourne Shell 09:45:04 jim
Bash 09:41:59 jim
Z shell 09:39:20 jim
Zsh 09:37:32 jim
04.06.2019
GNU General Public License 11:41:26 jim
GPL 11:40:02 jim
GPLv3 11:33:06 jim
30.05.2019
2.16.840.1.113719.1.39.43.6.4 11:37:36 jim
NspmPasswordAux 11:37:01 jim
NsimChallengeSet 11:33:07 jim
2.16.840.1.113719.1.39.43.4.106 11:29:22 jim
PwdAccountLockedTime 11:27:27 jim
2.16.840.1.113719.1.39.43.4.2 11:15:40 jim
NspmPassword 11:15:13 jim
2.16.840.1.113719.1.39.43.4.1 11:12:17 jim
NspmPasswordKey 11:11:49 jim
NspmDoNotExpirePassword 11:05:12 jim
NspmPasswordHistoryExpiration 11:00:03 jim
NspmPasswordHistoryLimit 10:58:11 jim
NspmPasswordHistory 10:54:56 jim
PwdInHistory 10:42:34 jim
PasswordsUsed 09:24:43 jim
FLAIM Attribute Containerization 09:09:04 jim
RECMAN 09:08:00 jim
RECM 08:58:17 jim
Ndsindex 07:38:30 jim
29.05.2019
Web Blog_blogentry_290519_1 10:50:46 jim
28.05.2019
ObjectSID 09:57:16 jim
24.05.2019
Qbit 09:43:57 jim
Superposition 09:15:15 jim
Computational complexity 08:32:31 jim
Communication complexity 08:31:48 jim
Complexity 08:30:38 jim
23.05.2019
Skulker 09:46:12 jim
Purger 09:31:26 jim
PURG 09:29:43 jim
SKLK 09:27:59 jim
EDirectory Background Processes 09:09:02 jim
LOST ENTRY 08:06:59 jim
22.05.2019
CheckPointThread 21:37:27 jim
Roll-Forward Log 21:37:06 jim
20.05.2019
PseudoServer 10:11:20 jim
SubjectKeyIdentifier 09:15:32 jim
Enablemovetoattrcontainer 08:14:07 jim
19.05.2019
IA5String 20:16:42 jim
Integer 20:15:21 jim
Boolean 20:13:34 jim
XML Object Model 20:08:31 jim
XOM 20:05:00 jim
Extended Data Service 20:02:10 jim
XDS 19:59:30 jim
PosixAccount 19:49:05 jim
UnixHomeDirectory 19:46:00 jim
18.05.2019
Attack Service 11:28:56 jim
LONGHAUL 11:27:24 jim
CGDB 11:21:58 jim
VAO 11:07:53 jim
POISONNUT 11:02:07 jim
ISAKMP 11:00:14 jim
DNC Decryption Flow 10:59:28 jim
Attack Orchestrator 10:57:55 jim
Cryptanalysis and Exploitation Services 10:51:56 jim
CES 10:45:55 jim
Key Recovery 09:55:15 jim
Credential Recovery 09:54:33 jim
Internet Protocol Security 09:29:29 jim
Triple DES 09:28:02 jim
Encapsulating Security Payload 09:27:41 jim
Satellite 09:26:00 jim
COMSAT 09:23:28 jim
TURMOIL 09:19:44 jim
VALIANTSURF 09:10:15 jim
Exploitation 09:06:00 jim
DNC 09:03:46 jim
Data Network Cipher 09:02:27 jim
Atomic SIGINT Data Format 08:52:13 jim
XKEYSCORE 08:47:13 jim
FALLOUT 08:44:24 jim
MARINA 08:41:37 jim
ASDF 08:28:47 jim
APEX 08:22:51 jim
15.05.2019
Target endpoint 16:21:28 jim
Proxy endpoint 16:20:30 jim
Apigee Edge 16:19:14 jim
Web Blog_blogentry_150519_1 16:00:21 jim
Site 15:10:29 jim
1.2.840.113556.1.5.31 15:09:37 jim
Application Directory Partitions 14:42:02 jim
Schema Directory Partition 14:38:54 jim
Directory Partition Hierarchy 14:35:42 jim
Domain Directory Partition 14:25:40 jim
Forest Root Domain 14:12:41 jim
AD Forest 14:08:47 jim
Trusted Domain Object 14:05:42 jim
ObjectClass 11:05:25 jim
ObjectCategory 11:04:09 jim
1.2.840.113556.1.4.783 10:56:33 jim
DefaultObjectCategory 10:56:11 jim
ObjectClass Types 10:40:18 jim
STRUCTURAL 10:38:48 jim
ObjectClassCategory 10:36:34 jim
1.2.840.113556.1.5.34 10:23:32 jim
1.2.840.113556.1.3.23 10:22:37 jim
1.2.840.113556.1.2.26 10:22:06 jim
X-HIDDEN 10:12:23 jim
DefaultHidingValue 10:11:07 jim
MS-ADSC 09:36:12 jim
TrustedDomain 09:34:32 jim
TrustAuthOutgoing 09:28:37 jim
TrustAuthIncoming 09:28:21 jim
TDO 09:21:53 jim
MsDS-TrustForestTrustInfo 09:06:31 jim
14.05.2019
Local Administrative Accounts 17:38:28 jim
Administrative Identity 17:37:17 jim
Service Account 17:22:27 jim
Privileged Identity 17:14:39 jim
NIST.SP.800-57 17:07:28 jim
Symmetric Key Cryptography 15:23:30 jim
Hash Function 15:18:39 jim
Cryptographic Algorithm 15:15:32 jim
Algorithm 14:50:59 jim
13.05.2019
Change-password 12:03:50 jim
Web Blog_blogentry_130519_1 11:58:35 jim
12.05.2019
OpenID Connect for Identity Assurance 10:13:45 jim
11.05.2019
HIPAA Privacy Rule 10:25:36 jim
Key Management 08:25:26 jim
EFS 08:14:46 jim
Encrypted File Systems 08:14:08 jim
Symmetric cipher 07:12:58 jim
10.05.2019
Pairwise Pseudonymous Identifier 14:24:31 jim
Law of Directed Identity 14:17:52 jim
Robotic Process Automation 14:10:40 jim
Robot 14:07:23 jim
Web Blog_blogentry_100519_1 13:57:19 jim
09.05.2019
ERI 15:25:09 jim
Eyring Research Institute 15:23:38 jim
Netware Core Protocol 15:06:32 jim
DHost 15:00:56 jim
Sequenced Packet Exchange 15:00:17 jim
SPX 14:51:19 jim
Ray Noorda 14:46:41 jim
Novell INC 14:46:07 jim
ShareNet 14:42:00 jim
Network Operating System 14:36:47 jim
Drew Major 14:32:16 jim
Internetwork Packet Exchange 14:22:32 jim
ReplicaAddressHint 14:21:49 jim Internet Protocol Exchange ==> Internetwork Packet Exchange
SuperSet Software Group 14:21:49 jim Internet Protocol Exchange ==> Internetwork Packet Exchange
Logical Link Control 14:21:48 jim Internet Protocol Exchange ==> Internetwork Packet Exchange
NDAP 14:21:48 jim Internet Protocol Exchange ==> Internetwork Packet Exchange
IPX 14:21:35 jim
Novell Data Systems Inc 14:13:23 jim
08.05.2019
Well-known Security Identifiers 15:02:09 jim
PrimaryGroupID 14:28:01 jim
Domain Users 14:18:32 jim
Group 14:13:52 jim
07.05.2019
Containerization vs Metadata 10:00:46 jim
Web Blog_blogentry_070519_1 09:55:07 jim Folder vs Search Debate ==> Containerization vs Metadata
Folder 09:32:05 jim
Content 09:31:44 jim
Quantum 08:01:36 jim
Decade 07:58:13 jim
Universal Declaration of Human Rights 07:56:40 jim
Year 1948 07:55:24 jim
Data entropy 07:54:47 jim
Bit 07:22:53 jim
06.05.2019
Relational Database Management System 06:28:29 jim
MariaDB 06:28:07 jim
MySQL 06:24:43 jim
MyMysqlCheatSheet 06:18:00 jim
Pop 06:16:33 jim
RFC 4217 06:05:01 jim
RFC 7817 06:04:03 jim
Opportunistic TLS 06:03:06 jim
1.3.6.1.4.1.1466.20037 05:58:45 jim
05.05.2019
OAuth 2.0 Incremental Authorization 09:06:57 jim
Include_granted_scopes 08:51:58 jim
04.05.2019
International Call Prefix 09:34:59 jim
International Direct Dialling 09:34:23 jim
IDD 09:29:32 jim International Dialing Prefix ==> International Direct Dialling
DDDS 09:15:30 jim
Dynamic Delegation Discovery System 09:15:08 jim
RFC 6116 09:10:45 jim
N11 09:06:54 jim
Easily Recognizable Code 09:06:26 jim
Telephone exchange 09:00:41 jim
Exchange 08:56:07 jim
International Telephone Number 08:45:23 jim
Telephone Numbering Plan 08:36:03 jim
Country Calling Code 08:29:23 jim
03.05.2019
DumpEdirectoryPasswordInformationTool 09:05:01 jim
Nondeterministic algorithms 08:48:45 jim
Turing Machine 08:41:59 jim
Year 1936 08:35:48 jim
MsDS-PasswordComplexityEnabled 08:29:44 jim
Password Complexity 08:28:03 jim
Law of Complexity 08:27:14 jim
Randomized algorithm 08:13:54 jim
Turing test 08:09:32 jim
Monte Carlo algorithm 08:01:00 jim
Las Vegas algorithm 08:00:47 jim
02.05.2019
OAuth 2.0 Token Binding 08:44:53 jim
RFC 8472 08:44:06 jim
Sec-Token-Binding 08:32:26 jim Token Binding Protocol Negotiation ==> Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation
Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation 08:32:25 jim Token Binding Protocol Negotiation ==> Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation
Web Blog_blogentry_020519_1 08:20:03 jim
RFC 8152 08:15:26 jim
CBOR Object Signing and Encryption 08:14:57 jim
Mutual TLS 08:05:56 jim
MTLS 08:04:27 jim
01.05.2019
Observer Node 13:02:19 jim
Sovrin Steward 12:52:35 jim
Validator Node 12:51:24 jim
Sovrin Node 12:46:43 jim
Sovrin Agent 12:35:01 jim
Public Ledger 12:23:43 jim
Hyperledger Indy 12:01:32 jim
Indy Steward 11:49:32 jim
Sovrin Ledger 11:36:39 jim
Signing key 11:27:56 jim
Verkey 11:27:34 jim
Verinym 11:18:18 jim
30.04.2019
Threat Model 10:39:15 jim
Vishing 10:37:12 jim
Robocall 10:24:33 jim
HTML link 10:16:25 jim
Keylogger 10:09:48 jim
USB Attack 10:06:00 jim
Extensible Firmware Interface 10:04:28 jim
Exploit 09:59:08 jim
Botnet 09:56:30 jim
Public Wi-Fi 09:49:13 jim
Phishing 09:45:16 jim
Smishing 09:43:59 jim
Pretexting 09:40:48 jim
Spyware 09:36:04 jim
Tailgating 09:15:48 jim
Cyber 09:10:27 jim
Cybercriminals 09:09:29 jim
Spear-Phishing 09:05:18 jim
Ransomware 08:50:42 jim
27.04.2019
Subscriber Number 20:16:54 jim
National Significant Number 19:44:57 jim
Area Code 09:47:00 jim
Machine Behavior 09:08:58 jim
AI 09:05:46 jim
Anguilla 08:58:26 jim
Web Blog_blogentry_270419_1 08:51:43 jim
24.04.2019
Traveler Verification Service 09:34:08 jim
Airlines 09:22:03 jim
Biometric data 09:19:59 jim
SCOTUS 08:10:10 jim
United States Supreme Court 08:09:45 jim
17.04.2019
DirXML-ShimAuthPassword 09:32:32 jim
DirXML-NamedPasswords 09:32:00 jim
15.04.2019
NdsOperationCheckpoint 19:00:25 jim
13.04.2019
1.2.840.113556.1.4.1413 09:12:14 jim
LDAP_SERVER_PERMISSIVE_MODIFY 09:10:51 jim
10.04.2019
Health Dataset 11:22:28 jim
Continuity of Care Record 11:14:21 jim
CCR 11:12:07 jim
Continuity of Care Document 11:11:43 jim
CCD 11:01:32 jim
Clinical Document Architecture 10:54:37 jim
07.04.2019
Lag HTTP headers 11:33:30 jim
Logs and File Locations 11:31:53 jim Laghttpheaders ==> Lag HTTP headers
LDAPWiki Images 11:28:23 jim
Euclidean Vector 11:19:42 jim
Point 11:14:59 jim
Vector Field 11:12:12 jim
Vector Space 11:07:12 jim
Grin 09:23:43 jim
MimbleWimble 09:17:33 jim
Web Blog_blogentry_070419_1 08:48:08 jim
02.04.2019
SDI Key 15:36:02 jim
NICI server-mode operation 15:27:17 jim
NICI client-mode operation 15:25:46 jim
NICI Configuration Files 15:15:44 jim
Security Domain Infrastructure 15:02:33 jim
NDSPKISDKeyServerDN 14:59:39 jim Niciext ==> NICIEXT
NICI 14:59:39 jim Niciext ==> NICIEXT
NICITreeKeyProvider 14:59:39 jim Niciext ==> NICIEXT
NICIEXT 14:59:38 jim Niciext ==> NICIEXT
WX Entries 14:32:21 jim
NICI Security Domain 14:28:09 jim
EDirectory Tree 14:27:02 jim
Key Access Partition 14:21:35 jim
NDS Tree-name 14:18:49 jim
NICISDI Keys 13:55:12 jim
NMAS Result Codes 13:46:01 jim
NMAS_E_NO_RESOLVE_DN 13:10:46 jim
01.04.2019
Session Key 08:45:31 jim
SASDFM key 08:44:09 jim
SASDFM 08:41:45 jim
SDIDIAGSwitches 08:27:51 jim
SDIDIAG 08:23:04 jim
27.03.2019
Source-code Repository 08:46:57 jim
Source code 08:46:39 jim
Repository 08:42:30 jim
19.03.2019
Ping Identity 14:29:51 jim
1.3.6.1.4.1.30221.2.5.9 14:27:53 jim
Join Request and Result Controls 14:27:16 jim
Differences between LDAP 2 and 3 Protocols 11:12:09 jim
LDAPv3 11:07:50 jim
LDAP Referral 10:48:00 jim
AffectsMultipleDSAs 10:45:52 jim
SaslBindInProgress 10:45:10 jim
ConfidentialityRequired 10:44:29 jim
UnavailableCriticalExtension 10:43:41 jim
AdminLimitExceeded 10:42:05 jim
LDAPv2 10:28:07 jim
Electronic Health Record 08:38:49 jim
Patient Protection and Affordable Care Act 08:38:14 jim
PPACA 08:36:57 jim
10.03.2019
RFC 8174 09:46:25 jim
SHALL 09:45:22 jim
MAY 09:44:53 jim
SHOULD NOT 09:44:28 jim
MUST NOT 09:44:01 jim
MUST 09:43:28 jim
SHOULD 09:42:59 jim
05.03.2019
Password Recovery 13:30:27 jim
WebAuthn Authentication 13:15:59 jim
WebAuthn Registration 13:12:28 jim
Security Key 11:59:12 jim
Platform Authenticator 11:39:16 jim
Roaming Authenticator 11:35:11 jim
WebAuthn Client 10:25:16 jim
CTAP2 Platform Host 10:23:49 jim
Human-palatable 10:18:16 jim
WebAuthn Authenticator 10:16:27 jim
Authorization Gesture 09:56:47 jim
WebAuthn Relying Party 09:56:21 jim
U2F device 09:49:17 jim
WebAuthn Client Device 09:46:07 jim
Clients 09:37:18 jim
Our Clients 09:35:29 jim
WebAuthn Attestation 09:08:38 jim
WebAuthn 09:07:48 jim
Credential Management API 09:07:15 jim
FIDO Standards 09:02:14 jim
Client To Authenticator Protocol 09:01:14 jim
28.02.2019
LDAP_SERVER_SD_FLAGS_OID 09:39:28 jim
DACL_SECURITY_INFORMATION 09:30:08 jim
OWNER_SECURITY_INFORMATION 09:29:29 jim
SACL_SECURITY_INFORMATION 09:28:53 jim
GROUP_SECURITY_INFORMATION 09:25:57 jim
1.2.840.113556.1.4.801 09:04:32 jim
27.02.2019
DID method specification 17:54:25 jim
26.02.2019
2.16.840.1.113719.1.1.4.720 16:19:15 jim
DsContainerReadyAttrs 16:15:38 jim
25.02.2019
Automatic Certificate Management Environment 11:38:53 jim
Boulder 11:32:34 jim
13.02.2019
Imanager 12:38:29 jim
IManager 3.1.2 12:36:23 jim
Web Blog_blogentry_130219_1 08:52:30 jim
09.02.2019
Win32 DOS and OS-2 Result Code 12:20:52 jim
Result Code 12:19:07 jim
04.02.2019
RFC 4373 18:16:58 jim
Bulk Update-Replication Protocol 18:15:47 jim
LBURP 18:13:16 jim
LDAP Server Standards and Specifications 18:10:09 jim
LDAP and Bind Throttling 14:52:32 jim
Supported Novell eDirectory Agent Configuration Parameters 14:40:06 jim
03.02.2019
LDIF Generator 09:53:48 jim
30.01.2019
HAL 17:57:51 jim
Hardware Virtualization 17:51:40 jim
Application Virtualization 17:46:21 jim
Virtualization method 17:38:28 jim
Orchestration 17:34:38 jim
Container Orchestration 17:32:56 jim
Event 4673 12:54:05 jim
28.01.2019
Certificate Validation Tools 08:49:54 jim
Cipher Suite 08:46:16 jim
18.01.2019
User-Account-Control Attribute 12:09:18 jim
User-Account-Control Attribute Values 12:08:18 jim
PASSWD_CANT_CHANGE 11:43:53 jim
17.01.2019
CL Signature 11:39:36 jim
Anonymous Credential 11:31:41 jim
Double Ratchet Algorithm 11:31:29 jim
Identity Mixer 11:13:26 jim
Digital Signature 11:10:29 jim
Signatures with efficient protocols 11:06:18 jim
OpenID Connect User Questioning API 09:44:58 jim
OpenID Connect Account Porting 09:41:07 jim
John Bradley 09:30:13 jim
Private URI Scheme 09:24:36 jim
OpenID Connect Backchannel Authentication 09:18:50 jim
MODRNA 09:06:30 jim
15.01.2019
DirXML Shim 15:09:08 jim
DirXML command 14:54:49 jim
Events vs Commands 14:49:27 jim
PublicationShim 11:28:07 jim
SubscriptionShim 11:23:11 jim
DirXML Engine 11:20:19 jim
Identity Vault 11:12:20 jim
IDV 11:09:48 jim
DirXML 4.7 10:46:19 jim
IDMDeveloperInfo 10:43:06 jim
Temporary Redirect 09:48:04 jim
HTTP 307 09:43:48 jim
13.01.2019
Backslash 19:41:47 jim Backslash () ==> Backslash
UserApplications 19:37:05 jim
10.01.2019
Transport-layer Security Mechanism 17:24:27 jim
E-PHI 17:20:33 jim
HIPAA Security Rule 17:19:09 jim
Do-find-matching-object 16:26:38 jim
Error.do-find-matching-object 16:20:37 jim
07.01.2019
X-SEARCH-FLAGS 13:00:44 jim
X-SYSTEMFLAGS 13:00:16 jim
1.2.840.113556.1.2.3 12:49:16 jim
WhenChanged 12:48:59 jim
ModifiersName 12:34:25 jim
2.5.18.4 12:33:31 jim
03.01.2019
Acute Care 09:47:49 jim
02.01.2019
DIXIE 15:34:11 jim
29.12.2018
Nuclear 09:52:28 jim
DOE 09:42:49 jim
DOL 09:26:37 jim
United States Department of State 09:15:22 jim
27.12.2018
RFC 2606 13:44:06 jim
26.12.2018
Id_token_signing_alg_values_supported 09:43:11 jim
RFC 2119 09:42:13 jim
Id_token_encryption_enc_values_supported 09:04:49 jim
25.12.2018
NameConstraints 10:08:25 jim
Web Blog_blogentry_251218_1 09:55:38 jim Subject Key IDentifier ==> SubjectKeyIdentifier
AuthorityKeyIdentifier 09:54:40 jim
Root Certificate 09:41:10 jim
Certification path 09:39:20 jim
21.12.2018
CommonWell Health Alliance 10:37:36 jim
Epic Systems Corporation 10:24:37 jim
Web Blog_blogentry_211218_1 10:15:04 jim
20.12.2018
Cached and Stored Credentials 19:38:26 jim
MS-WKST 19:35:30 jim
How passwords are used in Windows 19:17:39 jim
Key Distribution Center 18:59:51 jim
Ticket Granting Ticket 18:53:46 jim
Kerberos Authentication Service 18:45:46 jim
19.12.2018
Modify Request 09:46:54 jim
17.12.2018
Cryptocurrency 14:40:56 jim
Independent United States Federal Agency 14:32:20 jim
Federal Trade Commission 14:28:25 jim
Fair Credit Reporting Act 14:24:25 jim
FCRA 14:23:32 jim
Commodity 14:17:28 jim
XRP 14:14:04 jim
Debtor 14:11:06 jim
Creditor 14:10:01 jim
Debt 14:07:42 jim
Interest 14:02:16 jim
Distributism 13:20:08 jim
Taiwan 12:24:22 jim
Web Blog_blogentry_171218_1 11:52:32 jim
NANP 11:28:05 jim
Central Office 11:21:25 jim
Market 11:13:44 jim
Chartered company 11:10:30 jim
Centralized Exchange 11:03:55 jim
Decentralized Exchange 11:01:30 jim
Monopsony 10:59:35 jim
Market structure 10:58:14 jim
Monopoly 10:55:18 jim
Medium of exchange 10:41:37 jim
Oligopoly 10:36:37 jim
16.12.2018
20th Century 11:28:06 jim
21st Century 11:27:16 jim
Century 11:19:46 jim
19th Century 11:16:37 jim
Web Storage 09:01:22 jim
SessionStorage 08:59:43 jim
15.12.2018
1800s 13:45:30 jim
Year 1899 13:44:15 jim
14.12.2018
HTML Colour Names 09:27:34 jim
Web Blog_blogentry_141218_1 09:20:09 jim
11.12.2018
ConfigFilesUnixinfo.log 11:31:36 jim
Jim 10:58:56 jim
MyStartPage 10:49:58 jim
1.3.6.1.4.1.8876.2.1 10:47:36 jim
1.3.6.1.4.1.8876.2.2 10:47:24 jim
1.3.6.1.4.1.8876.2 10:45:43 jim
1.3.6.1.4.1.8876.1 10:45:29 jim
Schema Extensions 10:43:24 jim
09.12.2018
IMF 10:38:45 jim
Web Blog_blogentry_091218_1 10:34:16 jim
Penetration Test 10:19:37 jim
Vulnerability Assessment 10:13:48 jim
Vulnerability 10:13:00 jim
Decentralized system 09:51:27 jim
Common Criteria for Information Technology Security Evaluation 09:42:37 jim
07.12.2018
Coherence 12:09:41 jim
CurveZMQ 11:44:54 jim
Plenum Byzantine Fault Tolerant Protocol 11:37:57 jim
06.12.2018
Organizational friction 16:43:05 jim
Mura 16:21:27 jim
Muda 16:20:10 jim
Muri 16:11:49 jim
Kanban 16:06:26 jim
Friction 15:48:32 jim
NDS Threads 11:55:42 jim
Web Blog_blogentry_061218_1 10:46:18 jim
05.12.2018
N4u.server.listen-on-loopback 15:07:18 jim
04.12.2018
MS Access Mask 12:40:12 jim
MS Access Mask/ms-accctrl4.png 12:37:51 jim MS Access Mask Format
Image Styles 12:32:05 jim
Access Control Entry 12:20:56 jim
Access Control Entry Type 12:15:22 jim
Rights 12:03:35 jim
Discretionary Access Control List 11:37:34 jim
MSFT Access Token 10:34:55 jim
Access Control List 10:14:27 jim
System Access Control List 10:12:27 jim
SID identifier authority 09:55:50 jim
SECURITY_NT_AUTHORITY 09:36:17 jim
Security Identifier 09:29:45 jim
03.12.2018
Mimikatz 17:24:55 jim
Golden Ticket 17:16:31 jim
MLLP 13:44:01 jim
Minimal Lower Layer Protocol 13:42:01 jim
Book 13:32:48 jim
Web Blog_blogentry_200918_1 13:32:24 jim Health Care ==> HealthCare
Web Blog_blogentry_281018_1 13:32:24 jim Health Care ==> HealthCare
Medical ID Card 13:32:23 jim Health Care ==> HealthCare
Personal Health Record 13:32:23 jim Health Care ==> HealthCare
Regulatory Risk 13:32:23 jim Health Care ==> HealthCare
United States Office of Personnel Management 13:32:23 jim Health Care ==> HealthCare
Web Blog_blogentry_030618_1 13:32:23 jim Health Care ==> HealthCare
Integrating the Healthcare Enterprise 13:32:22 jim Health Care ==> HealthCare
Meaningful Use 13:32:22 jim Health Care ==> HealthCare
Health Care Provider 13:32:21 jim Health Care ==> HealthCare
Health Information Technology for Economic and Clinical Health 13:32:21 jim Health Care ==> HealthCare
Industry Specific 13:32:21 jim Health Care ==> HealthCare
Electronic Medical Record 13:32:20 jim Health Care ==> HealthCare
Federal Health Care Law 13:32:20 jim Health Care ==> HealthCare
HIPAA Covered Entity 13:32:20 jim Health Care ==> HealthCare
Health Care Organization 13:32:20 jim Health Care ==> HealthCare
Digital Imaging and Communications in Medicine 13:32:19 jim Health Care ==> HealthCare
Electronic Fitness Device 13:32:19 jim Health Care ==> HealthCare
HealthCare 13:32:19 jim Health Care ==> HealthCare
Data anonymization 13:30:21 jim
Cloud Data Store 13:24:24 jim
Dataset 13:20:17 jim
Windows registry 13:19:18 jim Data Store ==> DataStore
System Authorization Facility 13:19:17 jim Data Store ==> DataStore
Update 13:19:17 jim Data Store ==> DataStore
Web Blog_blogentry_090418_1 13:19:17 jim Data Store ==> DataStore
Web Blog_blogentry_211217_1 13:19:17 jim Data Store ==> DataStore
Password Policy 13:19:16 jim Data Store ==> DataStore
Protocol Buffers 13:19:16 jim Data Store ==> DataStore
Read 13:19:16 jim Data Store ==> DataStore
Replication 13:19:16 jim Data Store ==> DataStore
NoSQL 13:19:15 jim Data Store ==> DataStore
Oracle Unified Directory 13:19:15 jim Data Store ==> DataStore
LDAP Overview 13:19:14 jim Data Store ==> DataStore
HBase 13:19:13 jim Data Store ==> DataStore
Faythe 13:19:12 jim Data Store ==> DataStore
GCP Storage Products 13:19:12 jim Data Store ==> DataStore
Delete 13:19:11 jim Data Store ==> DataStore
Delete Request 13:19:11 jim Data Store ==> DataStore
Distributed Data Store 13:19:11 jim Data Store ==> DataStore
Data Metadata 13:19:10 jim Data Store ==> DataStore
Data Processor 13:19:10 jim Data Store ==> DataStore
Data warehouse 13:19:10 jim Data Store ==> DataStore
Database 13:19:10 jim Data Store ==> DataStore
Create 13:19:09 jim Data Store ==> DataStore
Credential Repository 13:19:09 jim Data Store ==> DataStore
Credential Vault 13:19:09 jim Data Store ==> DataStore
Cryptocurrency wallet 13:19:09 jim Data Store ==> DataStore
Biometric Identification 13:19:08 jim Data Store ==> DataStore
Brocade Communications Systems 13:19:08 jim Data Store ==> DataStore
By-reference 13:19:08 jim Data Store ==> DataStore
American Association of Motor Vehicle Administrators 13:19:07 jim Data Store ==> DataStore
Biometric Enrollment 13:19:07 jim Data Store ==> DataStore
DataStore 13:19:07 jim Data Store ==> DataStore
Personal Information Protection and Electronic Documents Act 10:00:12 jim
02.12.2018
Matrix 10:38:36 jim
Graph 10:32:15 jim
Binary Tree 10:28:27 jim
JSONArray 10:22:47 jim
Array 10:21:28 jim
Linked List 10:20:13 jim
Data Structure 10:13:45 jim
Delivery Team 09:41:58 jim
Software 09:38:09 jim
Perl 09:33:29 jim
Debug 09:31:28 jim
Firebase 09:29:54 jim
Application 09:29:24 jim
Waterfall model 09:28:11 jim
Software Development Kit 09:24:33 jim
Lean Product Development 09:24:02 jim
01.12.2018
Refactoring 13:39:48 jim
Remote Procedure Call 11:16:03 jim
Function 11:13:54 jim
Class 11:10:54 jim
Method 11:09:43 jim
Object 11:08:57 jim
SNMP 11:06:09 jim
Session Management 11:04:55 jim
SAML Web Browser Profiles 11:04:19 jim
Certification Authority Rating And Trust 11:02:48 jim
Binding_message 11:01:51 jim
Commitment Scheme 10:58:55 jim
FAL 2 10:57:33 jim
GS2 Mechanism Family 10:56:35 jim
SAML Bindings 10:54:46 jim
Binding 10:48:50 jim
Subroutine 10:26:54 jim
Backus Normal Form 10:00:52 jim
Inheritance 09:58:05 jim
Python 09:56:53 jim
Property 09:56:35 jim
Object-oriented Programming 09:53:25 jim
Extreme Programming 09:52:32 jim
Software development 09:51:22 jim
Protocol 09:23:52 jim
Protocol Stack 09:22:25 jim
DIAMETER 09:20:21 jim
30.11.2018
Ecash 11:04:38 jim
Store of value 10:48:11 jim
Unit of measurement 10:46:01 jim
Store 10:23:18 jim
Identity Data Store 10:21:37 jim
29.11.2018
Fractional Reserve 17:52:34 jim
OpenLedger 17:48:05 jim
Pwd-Last-Set attribute 14:55:16 jim
PwdLastSet 14:46:06 jim
DID path 14:13:56 jim
DID record 14:13:38 jim
DID Operations 14:13:23 jim
DID reference 14:12:09 jim
DID Fragment 14:11:36 jim
DID Service Endpoint 13:58:02 jim
DID Document 13:55:32 jim
Trust Anchor 13:23:52 jim
27.11.2018
OBIT_COUNT_FROM_DATABASE_INDEX 13:01:45 jim
Cn=Partition, cn=Agent, cn=monitor 13:00:31 jim
ChangeCacheCount 12:59:30 jim
UserAttribute 12:58:06 jim
NDS Obituaries 12:49:40 jim
Change Cache 12:40:50 jim
PerishableData 12:23:25 jim
Glossary Of LDAP And Directory Terminology 12:11:32 jim ReplicaS Perishable Data Delta ==> PerishableData
MaxRingDelta 12:09:16 jim Maximum Ring Delta ==> MaxRingDelta
PurgeVector 11:59:22 jim
2.16.840.1.113719.1.1.4.1.500 11:34:55 jim
ObituaryNotify 11:34:32 jim
PlaceOfBirth 11:13:05 jim
SapAddOnUM 11:11:47 jim
1.3.6.1.4.1.694.2.1.104 11:10:08 jim
BirthName 11:09:07 jim
DateOfBirth 11:04:52 jim
Date Of Birth 11:04:30 jim
Birth Certificate 11:03:21 jim
Birth Record 11:03:02 jim
Monitor Entry 10:07:47 jim
Canada 10:02:13 jim
United States 10:00:11 jim
Earth 09:56:54 jim
Australia 09:56:00 jim
Antarctica 09:53:20 jim
South America 09:52:11 jim
North America 09:50:12 jim
Europe 09:47:43 jim
Africa 09:46:15 jim
Asia 09:44:07 jim
Continent 09:42:28 jim
Estonia 09:36:55 jim
DigiD 09:30:46 jim
Netherlands 09:28:01 jim
National ID 09:13:16 jim
Xdas.properties 09:09:22 jim
XDAS 09:08:14 jim
XDAS for eDirectory 09:06:40 jim
26.11.2018
OBIT_MOVED_PURGEABLE 15:34:23 jim
OBIT_MOVED_OK_TO_PURGE 15:33:46 jim
OBIT_MOVED_NOTIFIED 15:33:29 jim
OBIT_MOVED_ISSUED 15:33:10 jim
OBIT_NEWRDN_PURGEABLE 15:32:43 jim
OBIT_DEAD_ISSUED 15:32:14 jim
OBIT_NEWRDN_NOTIFIED 15:32:07 jim
OBIT_NEWRDN_OK_TO_PURGE 15:31:37 jim
OBIT_NEWRDN_ISSUED 15:31:18 jim
OBIT_DEAD_PURGEABLE 15:30:55 jim
OBIT_DEAD_OK_TO_PURGE 15:30:29 jim
OBIT_DEAD_NOTIFIED 15:30:03 jim
NDS Obituary State 15:28:26 jim
OBIT_NOTIFIED 15:27:28 jim
OBIT_ISSUED 15:26:24 jim
OBIT_PURGEABLE 15:25:51 jim
OBIT_OK_TO_PURGE 15:24:04 jim
NDS Obituaries Type 15:11:54 jim
INHIBIT_MOVE Obituary 15:11:15 jim
OBIT_MOVED 15:10:35 jim MOVED Obituary ==> OBIT_MOVED
NDS Primary Obituaries 15:10:15 jim
OBIT_NEWRDN 15:09:35 jim NEW RDN Obituary ==> OBIT_NEWRDN
OBIT_DEAD 15:07:09 jim DEAD Obituary ==> OBIT_DEAD
NDS Obituaries Classification 14:21:19 jim
25.11.2018
XDAS Security Events 20:36:54 jim
Locked By Intruder 20:33:38 jim
NMAS_LOGIN 12:35:53 jim
RFC 4301 12:31:58 jim
SASL EXTERNAL 12:29:51 jim
22.11.2018
Encoding claims in the OAuth 2 state parameter using a JWT 16:16:31 jim
OAuth 2.0 Mix-Up Attack 16:01:07 jim
21.11.2018
Public Key Credential 10:12:38 jim
UAF 09:46:53 jim
20.11.2018
Policy 12:47:52 jim
17.11.2018
Pic 12:35:38 jim
TitleBox 11:54:49 jim
OSI-Model/OSI Model.svg 10:11:46 jim ODI Model
Kim Cameron 09:17:27 jim
16.11.2018
Edirectory Indexes 10:29:38 jim
SasUpdateLoginInfo 10:11:40 jim
13.11.2018
LDAPSyntaxes 14:57:29 jim
Postal Address_LDAPSyntax 14:56:15 jim
Case Ignore List 14:54:38 jim
1.3.6.1.4.1.1466.115.121.1.41 14:49:18 jim
Counter_LDAPSyntax 14:33:03 jim
2.16.840.1.113719.1.1.5.1.22 14:06:24 jim Counter_AttribuType ==> Counter_LDAPSyntax
Counter 14:01:08 jim XCounter ==> Counter
JSPWikiCorePlugins 14:01:08 jim XCounter ==> Counter
JSPWikiPlugins 14:01:08 jim XCounter ==> Counter
Time To Live 14:01:08 jim XCounter ==> Counter
Edirectory Filtered Replicas 13:57:22 jim
ReplicaType 13:56:48 jim
X-NDS_FILTERED_OPERATIONAL 11:34:17 jim
X-NDS_FILTERED_REQUIRED 11:33:45 jim
ReplicaState 11:08:06 jim
NDS Sparse Read Replica 10:44:02 jim
NDS Sparse Write Replica 10:37:03 jim EdirectoryFilteredReadWriteReplica ==> NDS Sparse Write Replica
NDS Replica Pointer 10:30:07 jim
2.16.840.1.113719.1.1.5.1.16 10:15:35 jim
Replica 10:14:28 jim
Replica number 10:05:33 jim
Replica List 10:03:26 jim
Partition Root Entry 10:01:25 jim
Schema Sync 09:56:21 jim
Removing Failed Server 09:44:51 jim
NDS Subordinate Reference Replica 09:41:58 jim EdirectorySubordinateReferenceReplica ==> NDS Subordinate Reference Replica
NDS Read-Only Replica 09:36:50 jim Edirectory ReadOnly Replica ==> NDS Read-Only Replica
NDS Read-Write Replica 09:33:00 jim EdirectoryReadWriteReplica ==> NDS Read-Write Replica
NDS Master Replica 09:28:52 jim
12.11.2018
Web Blog_blogentry_121118_1 13:50:23 jim
Identifier registry 12:06:28 jim
Web Blog_blogentry_090217_1 11:57:17 jim
Password Statistics 11:41:10 jim
CAPTCHA 11:40:30 jim
Relying Party 11:40:12 jim
OpenAM 11:39:55 jim
Social Login 11:39:33 jim
Best Practices Password 11:39:15 jim
11.11.2018
Office of Tailored Access Operations 18:57:15 jim
QUANTUM 18:43:49 jim
DISHFIRE 18:43:21 jim
National Security Agency 18:33:21 jim
10.11.2018
RFC 269 10:28:44 jim
Foo 10:27:53 jim
RFC 3092 10:23:36 jim
The Twelve Networking Truths 10:04:19 jim
RFC 1925 09:58:18 jim
RFC 1776 09:57:00 jim
RFC 1217 09:53:19 jim
RFC 6214 09:46:31 jim
RFC 2549 09:45:24 jim
A Standard for the Transmission of IP Datagrams on Avian Carriers 09:41:32 jim
09.11.2018
Password Authentication is Broken 12:24:16 jim
Credential Leaked Databases 12:09:21 jim
Web Blog_blogentry_230418_1 12:03:59 jim
Ontology 09:36:07 jim
OperationalAttribute 08:59:07 jim
Requesting Attributes by Object Class 08:56:59 jim
1.3.6.1.4.1.4203.1.5.2 08:45:48 jim
08.11.2018
DirXML-DriverStartOption 18:48:08 jim
07.11.2018
TRAFFICTHIEF 15:33:59 jim
MAINWAY 15:28:54 jim
PINWALE 15:13:58 jim
05.11.2018
Attack Effort 16:56:30 jim Risk Taxonomy ==> Risk Taxonomy Technical Standard
Risk Taxonomy Technical Standard 16:56:30 jim Risk Taxonomy ==> Risk Taxonomy Technical Standard
Open Factor Analysis of Information Risk 16:55:59 jim
The Open Group 16:42:58 jim
2.16.840.1.113719.1.8.4.6 12:29:09 jim
04.11.2018
Web Blog_blogentry_251018_1 12:01:57 jim
Event Data Recorder 10:58:19 jim
EDR 10:57:19 jim
TAO 10:18:53 jim
Attribution 10:02:49 jim
03.11.2018
Host Name Resolution 21:28:53 jim
Hostname 21:19:10 jim
Web Blog_blogentry_021118_1 13:01:01 jim
Loyalty Card 09:56:28 jim
Web Blog_blogentry_031118_1 08:40:51 jim
Human Element 08:19:00 jim
Human 08:12:00 jim
Windows Client Authentication Architecture/Windows Client Authentication Architecture.svg 07:27:13 jim
Security Account Manager 07:24:24 jim
02.11.2018
User mode and Kernel mode 22:04:52 jim
PKU2U 11:53:42 jim
Year 1934 09:43:47 jim
Telecommunications Act 09:43:16 jim
01.11.2018
Encryption 14:14:29 jim
ROT13 14:10:31 jim
Substitution Cipher 14:01:21 jim
Caesar Cipher 13:57:32 jim
Offset Codebook Mode 13:53:44 jim
XorEncryptXor 13:46:18 jim
TBC 13:45:33 jim
Tweakable Block Cipher 13:45:19 jim Tweakable Blockcipher ==> Tweakable Block Cipher
XEX 13:42:53 jim
OCB2 13:37:15 jim
Consent 13:10:09 jim
Contract 13:01:04 jim
Smart contracts 12:37:16 jim
Mutual Authentication 08:12:54 jim
31.10.2018
Web Blog_blogentry_301018_1 12:10:35 jim
Year 1960 09:11:34 jim
Year 2099 09:10:40 jim
Year 1999 09:09:43 jim
1990s 09:05:01 jim
Year 1900 09:03:53 jim
Year 1924 08:49:22 jim
Year 1901 08:48:55 jim
Year 1939 08:48:15 jim
World War II 08:47:35 jim
Great Depression 08:46:33 jim
G.I. Generation 08:45:15 jim
Generation Y 08:43:03 jim
World War I 08:42:18 jim
Lost Generation 08:41:18 jim
Silent Generation 08:36:58 jim
Generation X 08:34:44 jim
Baby boomers 08:29:07 jim
Millennials 08:28:01 jim
Generation 08:26:03 jim
Generation Z 08:22:15 jim
Login_hint 07:53:25 jim
30.10.2018
Millennium 16:45:40 jim
Billion 16:40:57 jim
Million 16:34:56 jim
Number 16:32:18 jim
Thousand 16:29:12 jim
Hundred 16:27:03 jim
One 16:25:15 jim
Trillion 16:11:09 jim
OPM 16:03:36 jim
United States Federal Agency 16:00:54 jim
29.10.2018
PDC Emulator FSMO Role 18:11:11 jim
Infrastructure Master FSMO Role 18:08:24 jim
RID Master FSMO Role 18:08:18 jim
Domain Naming Master FSMO Role 18:08:12 jim
Schema Master FSMO Role 18:08:06 jim
Flexible Single Master Operation 18:05:16 jim
DirXMLState 18:05:08 jim
28.10.2018
Notify and Reset Subscriber Filter 15:16:12 jim
Group Signatures 14:11:08 jim
Blue Button 12:13:25 jim
Patient Data 11:02:28 jim
Registry 09:44:30 jim
Web Blog_blogentry_161018_1 09:00:21 jim
ERROR_DS_ENCODING_ERROR 08:07:15 jim
DN Escape Values 08:06:16 jim
ERROR_DS_NON_BASE_SEARCH 08:01:06 jim
LDAP Dereference Control 07:44:44 jim
1.3.6.1.4.1.4203.666.5.16 07:38:56 jim
27.10.2018
Paper Size 15:38:53 jim
Web Blog_blogentry_271018_1 15:03:55 jim
Guam 11:40:37 jim
Northern Mariana Islands 11:39:19 jim
Puerto Rico 11:39:03 jim
Insular Areas 11:38:17 jim
Year 1954 11:36:57 jim
Unorganized territory 11:20:14 jim
Commonwealth 11:20:05 jim
Organized territory 11:19:45 jim
Incorporated territory 11:13:14 jim
Unincorporated territory 11:13:04 jim
Organic Act 11:12:39 jim
United States Territories 11:03:26 jim
DOI 10:42:51 jim
MP 10:07:55 jim
Indian Reservation 09:51:19 jim
United States Minor Outlying Islands 09:40:43 jim
2.16.840.1.113719.1.8.4.4 09:28:21 jim
City 09:28:05 jim
Townships 09:20:36 jim
County 09:14:10 jim
US States 09:06:41 jim
26.10.2018
Internet User Authorization 13:34:47 jim
IUA 13:34:09 jim
WorkFlow 12:55:44 jim
Trigger 12:51:01 jim
21st Century Cures Act 10:53:20 jim
NIH 10:50:58 jim
National Institutes of Health 10:47:53 jim
NHIN 10:35:08 jim
Nationwide Health Information Network 10:34:20 jim
Federal Risk and Authorization Management Program 09:09:47 jim
Use cases 08:37:08 jim
25.10.2018
Certificate Signing Request 20:33:31 jim
RFC 5967 20:25:46 jim
PKCS10 20:24:35 jim
Federal Information Security and Management Act 14:35:16 jim
Gramm-Leach-Bliley Act 14:29:01 jim
Bank Secrecy Act 14:26:38 jim
BSA 14:24:39 jim
Sarbanes-Oxley Act 14:19:33 jim
Federal Reserve Act 14:14:21 jim
Telephone Consumer Protection Act 14:12:09 jim
Do-Not-Call 14:10:10 jim
NSL 13:24:26 jim
National Security Letter 13:24:02 jim
RFPA 13:20:15 jim
Money laundering 13:11:29 jim
Money Laundering Control Act 13:08:59 jim
Stored Communications Act 11:26:12 jim
SCA 11:21:02 jim
RFC 7292 11:16:37 jim
ECPA 11:15:41 jim
24.10.2018
Federal Tax Information 13:42:02 jim
United States Social Security Administration 13:40:39 jim
Social Security Number 13:40:21 jim
Medicaid 13:39:49 jim
U.S.C. Title 18 13:36:40 jim
Electronic Communications Privacy Act 13:34:22 jim
One-party consent 13:31:02 jim
18 U.S.C. 2511 13:27:05 jim
Social Security Act 13:25:52 jim
U.S.C. 13:25:00 jim
Dialed Number Recorder 13:23:48 jim
Private Law 13:18:30 jim
Act of Congress 13:10:33 jim
Web Blog_blogentry_241018_1 12:57:15 jim
SEPA 10:42:15 jim
Single Euro Payments Area 10:41:42 jim
European Payments Council 10:37:08 jim
The Berlin Group 10:29:35 jim
NextGenPSD2 10:26:11 jim
Four-Party Credit Card System 10:21:06 jim
Access to Account 10:18:12 jim
Payment Service User 10:14:00 jim
XS2A 10:12:59 jim
Payment Initiation Service Provider 10:10:39 jim
Account Information Service Provider 10:10:14 jim
Third Party Payment Service Provider 10:08:51 jim
OAuth 2.0 Proof-of-Possession (PoP) Security Architecture 09:32:48 jim
1.3.6.1.4.1.42.2.27.8.1.23 09:12:00 jim
21.10.2018
Information security 08:37:13 jim
Secure Remote Password Protocol 08:34:49 jim
3rd Generation Partnership Project 08:31:33 jim
Secure by design 08:15:46 jim
European Telecommunications Standards Institute 08:12:23 jim
Web Blog_blogentry_211018_1 07:51:26 jim
20.10.2018
Ten Principles of Self-Sovereign Identity 10:17:46 jim
Web Blog_blogentry_191018_1 10:07:14 jim
Right to be forgotten 10:03:53 jim
19.10.2018
Credential 08:39:31 jim
18.10.2018
Local Security Authority Subsystem Service 12:49:06 jim
HKCU 12:43:53 jim
HIVE 12:43:24 jim
HKEY_DYN_DATA 12:42:55 jim
Windows ME 12:40:31 jim
Windows 9x 12:37:47 jim
Personal Computer 12:35:30 jim
Windows NT 12:34:55 jim
HKEY_PERFORMANCE_DATA 12:30:02 jim
HKEY_CURRENT_CONFIG 12:27:25 jim
HKU 12:25:52 jim
HKEY_USERS 12:25:36 jim
HKCC 12:24:00 jim
HKEY_CURRENT_USER 12:23:37 jim
HKEY_CLASSES_ROOT 12:20:52 jim
HKCR 12:10:01 jim
Security Reference Monitor 11:12:46 jim
Access Token 11:11:23 jim
MSFT 11:09:09 jim
SRM 11:00:16 jim
Local Identity 10:32:28 jim
HKEY_LOCAL_MACHINE 10:00:11 jim
HKLM 09:49:41 jim
17.10.2018
Multiple-Input and Multiple-Output 13:41:49 jim
MIMO 13:41:25 jim
16.10.2018
Sovrin Connector 16:39:43 jim
Key pair 16:13:13 jim
DIGIT 15:18:53 jim
ALPHA 15:16:20 jim
National Motor Vehicle Title Information System 14:16:38 jim
VIN 14:15:46 jim
NMVTIS 14:15:19 jim
AAMVA 14:09:49 jim
State Pointer Exchange Services 13:50:19 jim
SPEXS 13:34:44 jim
BCCH 10:50:31 jim
ARFCN 10:50:00 jim
Absolute Radio-Frequency Channel Numbers 10:49:31 jim
Broadcast Control CHannel 10:47:34 jim
LAI 10:24:32 jim
Integrated Circuit Card Identifier 10:06:45 jim
Temporary Mobile Subscriber Identity 09:40:53 jim
International Mobile Equipment Identity 08:40:41 jim
15.10.2018
Threat landscape 18:07:29 jim
The Seven Laws Of Identity 17:53:32 jim
ISO 29100 17:50:21 jim
Principle of least privilege 17:37:22 jim
UF_ACCOUNTDISABLE 17:15:24 jim
USER_ACCOUNT_DISABLED 17:11:12 jim
Microsoft Active Directory Extensible Match Rules 15:46:48 jim
Holder 08:53:31 jim
W3C Decentralized Identifiers 08:32:54 jim
14.10.2018
RFC 8485 17:25:36 jim
Vectors of Trust 17:25:04 jim
Decentralized Identity 12:47:56 jim
Know Your Customer 12:46:01 jim
Verifiable Claims/vc-ecosystem-overview.png 11:57:44 jim
Entity 11:43:06 jim
Inspector-verifier 11:34:51 jim
Issuer 11:32:35 jim
Key Rotation 11:18:26 jim
CKMS 11:08:35 jim
KMS 11:07:50 jim
Key Management Service 11:07:23 jim
13.10.2018
Attack Surface 18:33:28 jim
API Development 10:40:00 jim
Bad Actor 10:36:38 jim
Attack vectors 10:31:32 jim
11.10.2018
Social Identity 17:27:13 jim
Identity Relationship Framework 17:24:26 jim
User-centric Identity 17:01:33 jim
Responsive Organizations 11:41:15 jim
10.10.2018
ServiceOutput 17:03:16 jim
Profile 16:57:36 jim
PostalCode 16:55:32 jim
Address 16:52:32 jim
Schema.org 16:50:25 jim
Organization 12:42:17 jim
Place 12:38:00 jim
Thing 12:37:04 jim
Yandex 12:21:19 jim
Link Relation Types 12:16:09 jim
StreetAddress 12:07:03 jim
Street 12:05:23 jim
2.5.4.9 11:59:25 jim
Taxonomy 11:12:58 jim
AtMention 11:11:09 jim
Folksonomy 11:09:57 jim
Hashtag 11:08:32 jim
User-generated content 11:03:48 jim
Bug 09:58:55 jim
Implementation Vulnerability 09:44:24 jim
Breach 09:42:09 jim
09.10.2018
Jim Willeke Resume 16:14:54 jim
Custodial Wallet 15:23:11 jim
RFC 8473 14:24:39 jim
RFC 8471 14:23:51 jim
Token Binding over HTTP 14:21:09 jim
Bitcoin address 12:35:21 jim
Web Blog_blogentry_091018_1 12:29:52 jim
Acceptable Use 11:26:10 jim
Unexpected benefit 10:57:56 jim
Data portability 10:31:10 jim
Electronic Health 09:17:27 jim
EHealth 09:05:24 jim
08.10.2018
STRAITBIZARRE 11:21:01 jim
CountryOfResidence 10:56:58 jim
1.3.6.1.4.1.8876.2.1.30 10:56:29 jim
Nonimmigrant Information System 10:50:40 jim
Combined DNA Index System 10:50:06 jim
State Identification Number 10:49:29 jim
OAKSTAR 10:39:30 jim
BLARNEY 10:38:56 jim
TOYGRIPPE 10:36:28 jim
Unified Passenger Module 10:35:18 jim
United States Visitor and Immigrant Status Indicator 10:35:04 jim
Intelligence Agencies 10:34:52 jim
Border Crossing Information 10:34:12 jim
Automated Biometric Identification System 10:33:10 jim
Advance Passenger Information System 10:30:07 jim
KEYCARD 10:29:45 jim
BOUNDLESSINFORMANT 10:12:13 jim
PRISM 10:12:00 jim
ECHELON 10:11:14 jim
TURBULENCE 10:10:21 jim
SIGINT 10:09:50 jim
Implied consent 09:41:55 jim
Express Consent 09:35:42 jim
Explicit consent 09:35:19 jim Express consent ==> Explicit consent
Upstream Surveillance 09:11:32 jim
LPR 08:52:17 jim
ALPR 08:51:52 jim
License Plate 08:49:12 jim
CarLicense 08:45:15 jim
07.10.2018
Web Blog_blogentry_071018_1 11:50:51 jim
UPort 11:18:39 jim
ERC1056 11:12:07 jim
Lightweight Ethereum Identity 11:11:45 jim
Issued_token_type 10:43:20 jim
Want_composite 10:40:30 jim
Subject_token_type 10:38:18 jim