jspωiki
FullRecentChanges

These are all of the changes made to these pages. A much shorter list is available in RecentChanges.

13.08.2018
Language-Tag 11:19:43 jim
Social contract 09:55:46 jim
Rights 09:53:34 jim
Legal right 09:51:50 jim
Entitlement 09:49:17 jim
Natural rights 09:46:09 jim
Jurisdiction 09:38:32 jim
Legal 09:36:26 jim
Law 09:35:48 jim
12.08.2018
Office of Management and Budget 20:28:53 jim
OMB 20:27:18 jim
FedRAMP 20:25:10 jim
Federal Risk and Authorization Management Program 20:23:47 jim
Web Blog_blogentry_120818_1 20:20:45 jim
Regulation 20:00:35 jim
RFC 4880 08:37:04 jim
OpenPGP 08:36:09 jim
Pretty Good Privacy 08:35:26 jim
PGP 08:34:47 jim
Hybrid cryptosystem 08:30:53 jim
DataEncipherment 08:29:21 jim
Key Encapsulation Method 08:24:26 jim
KEM 08:23:59 jim
DEM 08:21:29 jim
Data Encapsulation Method 08:21:01 jim
Cryptography 07:50:38 jim
Symmetric Key Cryptography 07:43:19 jim
Asymmetric Key Cryptography 07:36:01 jim
11.08.2018
0-RTT Handshakes 16:47:36 jim
Quick UDP Internet Connections 16:44:02 jim
TLS 1.3 16:38:25 jim
RFC 8446 16:34:47 jim
Human-Centered Design 09:37:04 jim
Donald A. Norman 09:32:23 jim
Web Blog_blogentry_110818_1 09:28:39 jim
Book 09:21:28 jim
Attack 09:01:27 jim
Homograph attack 09:01:09 jim
Punycode 08:57:43 jim
Phishing 08:47:40 jim
Identity questions 08:46:23 jim
Side-channel attacks 08:45:23 jim
SS7 hack 08:42:14 jim Social Engineering Attacker ==> Social Engineering Attack
Social Engineering Attack 08:42:13 jim Social Engineering Attacker ==> Social Engineering Attack
10.08.2018
Feedback 21:59:16 jim
Discoverability 21:53:06 jim
HCD 21:37:46 jim
Human Interconnection Model 21:37:19 jim
Web Blog_blogentry_100818_1 14:46:46 jim
RFC 2551 14:44:10 jim
IMPS 14:43:18 jim
The Infinite Monkey Protocol Suite 14:42:48 jim
RFC 2795 14:40:59 jim
RFC 1216 14:39:17 jim
RFC 1121 14:38:25 jim
RFC 1097 14:37:43 jim
RFC 968 14:37:03 jim
RFC 748 14:35:56 jim
RFC 527 14:35:08 jim
Internet Toaster 14:27:01 jim
INTEROP 14:18:02 jim
The Reliable Internetwork Troubleshooting Agent 13:54:49 jim
RFC 2321 13:54:30 jim
Hyper Text Coffee Pot Control Protocol 13:52:47 jim
Compliance Layer 13:44:01 jim
OSI-Model 13:42:59 jim
HIM 13:42:14 jim
Organization Layer 13:34:39 jim
2.5.6.4 13:32:29 jim
Organization 13:32:03 jim
User Layer 13:23:14 jim
RITA 13:13:03 jim
User error 11:41:23 jim
Human 09:15:48 jim
Hu 09:15:32 jim
Problem Exists Between Keyboard And Chair 09:05:53 jim
PEBKAC 08:59:54 jim
Strict-Transport-Security 08:29:41 jim
09.08.2018
DirXML-DriverStartOption 14:31:50 jim
08.08.2018
Code injection 11:37:25 jim
Arbitrary code execution 11:28:52 jim
Web Blog_blogentry_080818_1 11:19:25 jim
Commitment Scheme 11:01:20 jim
Second Preimage Resistance 10:49:04 jim
Preimage Resistance 10:45:21 jim
One-Way Hash Function 10:39:43 jim
Cryptographic Primitive 10:24:10 jim
Mix network 10:20:10 jim
Nonce 10:07:16 jim
Initialization Vector 10:03:33 jim
Block Cipher Mode 09:54:23 jim
NIST.SP.800-38 09:52:20 jim
OCB 09:47:39 jim
OFB 09:46:55 jim
CFB 09:46:35 jim
PCBC 09:46:05 jim
Offset Codebook Mode 09:26:30 jim
IAPM 09:19:33 jim
Integrity Aware Parallelizable Mode 09:17:02 jim
EAX 09:14:45 jim
CWC 09:06:48 jim
Authenticated Encryption with Associated Data 09:03:34 jim
CTR 08:43:30 jim
CCM 08:43:08 jim
AE 08:36:54 jim
Authenticated Encryption 08:36:20 jim
Output FeedBack 08:19:37 jim
Cipher FeedBack 08:18:54 jim
Propagating Cipher Block Chaining 08:17:50 jim
Counter mode 08:16:11 jim
XTS 08:14:18 jim
NIST Special Publication 08:03:11 jim
Cipher 07:53:10 jim
07.08.2018
Message Number 15:03:45 jim
Web Blog_blogentry_070818_1 14:59:03 jim
Cryptographic Hash Function 14:51:42 jim
Hash Function 14:48:54 jim
Hash Function Security Properties 14:48:06 jim Hash Function Security ==> Hash Function Security Properties
Key size 14:48:06 jim Hash Function Security ==> Hash Function Security Properties
Fingerprint 14:44:10 jim
Cryptographic Hash Function Comparison 14:38:05 jim Cryptographic Hash Function Comparrison ==> Cryptographic Hash Function Comparison
Block Cipher 14:17:01 jim Block cipher mode of operation ==> Block Cipher Mode
Meet-in-the-Middle Attack 14:08:34 jim
Birthday Attack 13:56:07 jim
Birthday Paradox 13:54:54 jim
Authentication 13:31:53 jim
Authentication/authentication.png 13:05:11 jim
Applied Cryptography 12:17:37 jim
Encryption 12:14:35 jim
Encryption/encryption.png 12:03:29 jim
Kerckhoffs principle 11:56:37 jim
Encryption Scheme 11:55:20 jim
Data and Goliath 11:26:05 jim Book I read ==> Book
Lean Enterprise 11:26:05 jim Book I read ==> Book
Thriving on Chaos 11:26:05 jim Book I read ==> Book
Perfect Security 11:16:12 jim
OAuth 2.0 Vulnerabilities 10:09:48 jim
Bad Actor 10:09:10 jim
Plenum Byzantine Fault Tolerant Protocol 10:08:32 jim
Cryptographic Collision 10:07:55 jim
Kerberos Pre-Authentication 10:07:33 jim
Redundant Byzantine Fault Tolerance 10:06:09 jim
DNS cache poisoning 10:05:00 jim
Internationalized Resource Identifiers 10:04:01 jim
IDN homograph attack 10:03:36 jim
Mallory 10:01:40 jim
Malicious Software 10:00:24 jim
Malicious Endpoint 09:58:41 jim
Malicious PAC 09:57:21 jim
Malicious 09:56:36 jim
Security 09:36:33 jim
Online Certificate Status Protocol 09:33:30 jim
CAP theorem 09:32:09 jim
Device Inventory Service 09:30:46 jim
Asynchronous Transfer Mode 09:30:18 jim
Join AD Domain 09:29:30 jim
Token Revocation 09:28:21 jim
Transmission Control Protocol 09:27:49 jim
Practical Byzantine Fault Tolerance 09:27:17 jim
GCP Cloud CDN 09:26:51 jim
TLS Abbreviated Handshake 09:26:25 jim
Latency 09:25:39 jim
A Standard for the Transmission of IP Datagrams on Avian Carriers 09:22:58 jim
Token68 09:18:17 jim
Ciphertext stealing 09:17:13 jim
Base64 09:16:28 jim
Certificate Algorithm ID 09:14:41 jim
Padded 09:12:34 jim
LM hash 09:09:18 jim
Lucky 13 09:07:10 jim
PKCS 1 09:06:18 jim
Poodle 08:52:41 jim
Verifying Certificate Signatures 08:51:34 jim
Padding bit 08:50:38 jim
Packed Encoding Rules 08:48:07 jim
Certificate Pinning 08:39:07 jim
CacheCtl 08:35:27 jim
CacheCtl/Screen Shot 2018-08-07 at 04.30.46.png 08:32:50 jim dbCacheStats
Science Applications International Corporation 08:26:28 jim
SAIC 08:25:01 jim
VeriSign 08:23:55 jim
MasterCard 08:22:29 jim
VISA 08:21:45 jim
Secure Electronic Transaction 08:21:18 jim
3D Secure 08:19:02 jim
Exploitability Metrics 08:08:05 jim
Threat Model 08:04:59 jim
06.08.2018
Frame 21:26:57 jim
Packet 21:26:13 jim
Sex 17:50:45 jim
EDirectory 9.1.1.0 (40102.29) 15:59:29 jim
EDirectory Version 15:56:41 jim
Component Syntax 12:58:01 jim
VolumeName Field 12:57:36 jim
Xdasauditds 12:57:10 jim
X-NDS_READ_FILTERED 12:57:01 jim
X-NDS_PUBLIC_READ 12:56:50 jim
X-NDS_NONREMOVABLE 12:56:38 jim
X-NDS_NAME 12:56:26 jim
X-NDS_BOTH_MANAGED 12:52:13 jim
EDirectory 12:51:36 jim
NspmPasswordPolicy 12:48:10 jim
NspmConfigurationOptions 12:47:57 jim
Novell Secure Password Manager 12:47:44 jim
Novell Modular Authentication Service 12:47:34 jim
Novell Directory Services 12:47:01 jim
Novell Certificate Server 12:44:08 jim
Nldap 12:43:46 jim
NetWare Core Protocol 12:42:19 jim
NetWare 12:41:50 jim
Ndsmodules.conf 12:41:39 jim
Ndsconfig Parameters 12:41:26 jim
Nds.conf 12:41:15 jim
Ncpengine 12:41:02 jim
NMAS_LOGIN 12:40:33 jim
NMAS 12:40:05 jim
NICI Version 12:39:50 jim
NICI 12:39:35 jim
NDSD Loadable Module 12:39:09 jim
NDSD 12:38:52 jim
NDSBACKUP 12:38:36 jim
LDAP Metrics 12:37:06 jim
DirectoryTreeName 12:35:30 jim
NDS Unknow Entries 12:33:32 jim
NDS Tree-name 12:29:53 jim
Ndstrace Log Searches 12:21:14 jim
NDS Threads 12:20:25 jim
NDS Result Code 12:19:50 jim
NDS Partition 12:19:40 jim
NDS Obituary State 12:19:29 jim
NDS Obituaries Type 12:18:42 jim
NDS Obituaries 12:18:16 jim
NDS Login Methods 12:18:04 jim
NDS Informational Obituaries 12:17:24 jim
NDS External References 12:02:53 jim
NDAP 12:02:37 jim
N4u.server.listen-on-loopback 12:02:21 jim
N4u.server.interfaces 12:02:08 jim
N4u.server.idle-threads 12:01:11 jim
N4u.server.configdir 12:01:01 jim
N4u.nds.server-name 12:00:47 jim
N4u.nds.dofsync 12:00:36 jim
N4u.nds.backlink-interval 12:00:24 jim
Importing Certificates In Imanager 11:59:17 jim
Import Conversion Export 11:57:28 jim
Imanager Roles And Tasks 11:56:44 jim
Imon 11:56:33 jim
Imonitor 11:56:22 jim
Static Cache Mode 11:55:37 jim
Hard cache limit 11:53:26 jim
Groups Edirectory 11:53:08 jim
GetEffectivePrivilegesRequest 11:52:51 jim
Gams 11:52:30 jim
Files In Dib Directory 11:52:06 jim
Roll-Forward Log 11:49:07 jim
Maxdirtycache 11:48:44 jim
Lowdirtycache 11:48:29 jim
Cpinterval 11:48:12 jim
FLAIM checkpoint 11:47:56 jim
FLAIM Cache 11:37:56 jim
FLAIM Attribute Containerization 11:37:42 jim
FLexible Adaptable Information Management 11:36:56 jim
FLAIM 11:36:36 jim
EdirectoyFHSAndLSBCompliance 11:34:29 jim
EdirectoryPasswords 11:34:17 jim
EdirectoryMonitoringMIB 11:34:04 jim
EdirectoryLoginUpdate 11:29:47 jim
Edirectory Usefull Linux Commands 11:29:15 jim
Edirectory Replicas 11:28:49 jim
Edirectory Performance Counters 11:28:34 jim
Edirectory Password Policy 11:28:18 jim
Edirectory Indexes 11:27:48 jim
Edirectory Extensible Match Rules 11:27:19 jim
Edirectory Anomalies 11:26:54 jim
Edirectory Administrative Password Changes 11:26:13 jim
EDirectory and NDS Client Error Codes 11:25:53 jim
EDirectory Synchronization 11:25:15 jim
EDirectory Multiple Instance 11:24:54 jim
EDirectory Performance Tuning 11:24:26 jim
EDirectory Password Expiration 11:24:11 jim
EDirectory LDAP Transaction 11:23:45 jim
EDirectory Extended LDAP Flags 11:23:30 jim
EDirectory DIB 11:23:12 jim
LDAP Indexes 11:22:19 jim
Glossary Of LDAP And Directory Terminology 11:21:27 jim
Presence Index 11:20:19 jim
DefinitionSubstringIndex 11:18:14 jim
DefinitionIDList 11:16:13 jim
DefinitionEntryID 11:14:50 jim
DSE_LOGIN_EX 11:13:01 jim
DSE_AUTHENTICATE 11:12:43 jim
Common Edirectory Bind Errors 11:11:54 jim
Creating KMO Signed By An External Certificate Authority 11:11:29 jim
DHost 11:10:15 jim
DIB 11:09:56 jim
BACKLINK Obituary 11:07:35 jim
NDS Authentication 11:06:37 jim
EDirectory Privileges 11:06:22 jim
ACL (eDirectory Attribute) 11:05:07 jim
Installing And Configuring Edirectory 11:04:39 jim
NDSTRACE Examples 11:03:55 jim
Edirectory Instance Management 11:01:40 jim
2.5.4.43 08:01:16 jim
Initials 07:56:34 jim
DirXML Code Snippets 07:51:31 jim
Ndsrepair 07:50:41 jim
03.08.2018
APEX 23:23:36 jim
RFC 3550 23:22:49 jim
Real-time Transport Protocol 23:21:43 jim
RTP 23:21:02 jim
Encapsulating Security Payload 23:18:44 jim
ESP 23:15:29 jim
PRESSUREWAVE 23:12:01 jim
ECHELON 23:09:04 jim
HAMMERCHANT 23:07:36 jim
TURBINE 22:56:38 jim
KEYCARD 22:54:15 jim
HAMMERSTEIN 22:52:29 jim
TOYGRIPPE 22:51:01 jim
H.323 22:47:28 jim
FASCIA 22:44:07 jim
Cell ID 22:42:58 jim
LAC 22:41:39 jim
Location Area Code 22:08:02 jim
CELLID 22:04:07 jim
Universal Terrestrial Radio Access Network 22:03:01 jim
UTRAN 22:01:35 jim
SIGDEV 21:45:20 jim
Voice over IP 21:39:31 jim
VoIP 21:39:12 jim
Internet Key Exchange 21:28:44 jim
IKE 21:25:13 jim
SIGINT 21:11:25 jim
National Security Agency 21:07:05 jim
TURMOIL 21:05:02 jim
TURBULENCE 21:00:01 jim
FAIRVIEW 20:59:15 jim
Five Eyes Intelligence Alliance 20:54:08 jim
Edward Snowden 20:52:19 jim
Public Key Infrastructure Weaknesses 20:49:37 jim
Signalling System No. 7 20:48:25 jim
BOUNDLESSINFORMANT 20:47:05 jim
PRISM 20:43:28 jim
Office of Tailored Access Operations 20:35:00 jim
XKEYSCORE 20:29:41 jim
Communication Surveillance 20:26:00 jim
02.08.2018
HTTP Header Field 13:49:20 jim
HTTP Header Directive 13:48:07 jim
01.08.2018
HTTP Request 20:12:44 jim
HTTP Conditional Request 20:09:28 jim
Etag 20:07:52 jim
Entity-tag 20:04:25 jim
31.07.2018
LDAP 11:23:01 jim
Data Store 11:13:05 jim
NoSQL 11:11:53 jim
Key-value 11:09:34 jim
Redis 10:37:11 jim
GCP Storage Products 10:33:33 jim
RFC 6797 10:06:41 jim
HSTS 10:04:12 jim
HTTP 301 09:55:21 jim
HTTP 302 09:53:26 jim
Found 09:53:04 jim
Moved Permanently 09:52:45 jim
Permanent Redirect 09:52:18 jim
HTTP Status Code 09:51:06 jim
HTTP 308 09:48:06 jim
RFC 7538 09:44:23 jim
30.07.2018
Intermediary 12:09:47 jim
Reverse Proxy 12:07:23 jim
End-to-end Encryption 12:05:41 jim
Netstat 11:52:16 jim
29.07.2018
The LDAP Controller 09:06:09 jim
LDAP Java Code 09:04:29 jim
Version Control System 09:01:46 jim
Microsoft Windows 09:00:12 jim
Pic 08:57:51 jim
Linux 08:52:44 jim
Kernel 08:50:34 jim
Linus Torvalds 08:46:25 jim
Git 08:46:06 jim
Codebase 08:37:10 jim Version Control Systems ==> Version Control System
VCS 08:37:10 jim Version Control Systems ==> Version Control System
Revision 08:30:55 jim
Open Software Foundation 08:27:10 jim
Software Architecture Model 08:26:18 jim
Software design pattern 08:24:42 jim
Software design 08:23:54 jim
Open Source 08:20:51 jim
Source code 08:13:36 jim
The Twelve-Factor App 08:08:08 jim
Web Blog_blogentry_290718_1 08:03:22 jim
28.07.2018
1900s 09:57:56 jim
1910s 09:57:19 jim
1920s 09:56:51 jim
Decade 09:56:16 jim
1930s 09:55:32 jim
1940s 09:54:44 jim
1960s 09:51:58 jim
1950s 09:50:16 jim
Year 1958 09:48:07 jim
Responsive Organizations 09:47:16 jim
Continuous Delivery 09:43:35 jim
DevOps 09:36:05 jim
Continuous Development 09:30:35 jim
Continuous integration 09:28:02 jim
CD 09:25:05 jim
Ethernet 09:14:16 jim
History of LDAP 09:11:59 jim
Kubernetes 09:10:42 jim
26.07.2018
ISO 10646 09:07:26 jim
1. 08:58:05 jim
Roots of Trust 08:53:53 jim
RoT 08:51:59 jim
Trust Anchor 08:50:03 jim
Secure Enclave 08:49:22 jim
ISO Publicly Available Standards 08:36:11 jim
ISO 11889 08:34:27 jim
Cloud 08:28:11 jim
TCG 08:24:19 jim
Trusted Computing Group 08:24:00 jim
Trusted Platform Module 08:17:04 jim
Key Management Service 08:14:20 jim
Key Management 08:09:03 jim
Google Key Management Service 08:07:23 jim
Zero Trust 08:03:57 jim
25.07.2018
Web Blog_blogentry_140415_1 13:42:28 jim
Disablemovetoattrcontainer 13:41:41 jim
Preventing eDirectory from Auto Adding Indexes 13:39:20 jim
IndexDefinition 13:23:05 jim indexDefinition ==> IndexDefinition
24.07.2018
Google Cloud Functions 10:20:17 jim
Enterprise Integration Patterns 10:00:20 jim
Factory 09:59:10 jim
Request-Response 09:57:45 jim
Publish-Subscribe 09:57:10 jim
Messaging pattern 09:56:28 jim
Serverless 09:51:40 jim
SPML 09:50:14 jim
IDMDeveloperInfo 09:49:17 jim
IDM Tricks 09:49:04 jim
IDM Start-Stop 09:48:51 jim
Dxcmd 09:48:21 jim
Dirxml-uACHomedirRequired 09:47:52 jim
Dirxml-uACEncryptedTextPasswordAllowed 09:47:37 jim
Dirxml-uACDontExpirePassword 09:47:26 jim
DirXML-NTAccountName 09:47:13 jim
DirXML-JavaDebugPort 09:47:02 jim
DirXML-Association States 09:46:36 jim
DirXML and Oracle (OID) 09:46:19 jim
DirXML Trace File Searches 09:46:06 jim
DirXML Toolbox 09:45:55 jim
DirXML Required Reading 09:45:45 jim
DirXML PWFILTER.DLL 09:45:20 jim
DirXML Out-of-Band Requests 09:45:03 jim
DirXML Merge-Resync Process 09:44:44 jim
DirXML Examples 09:43:57 jim
DirXML Error 09:43:32 jim
DirXML Engine Version 09:42:53 jim
DirXML 4.0.2.0 09:42:30 jim
DirXML 09:40:38 jim
Transaction 09:36:41 jim
Event sourcing 09:33:07 jim
Event System 09:26:05 jim
Event Sequencer 09:18:38 jim
Event-Driven Architecture 09:13:01 jim
XDAS 09:05:44 jim
State 08:58:49 jim
Event 08:57:55 jim
Domain 08:48:04 jim
Domain-Driven Design 08:46:19 jim
22.07.2018
Automatic Certificate Management Environment 22:18:40 jim
Certbot 22:18:07 jim
Recursive name server 12:24:40 jim
8.8.8.8 12:20:28 jim
1.1.1.1 12:20:04 jim
Domain Name System 12:13:37 jim
DNS SRV Records 12:04:04 jim
DNS Resource Records 12:03:17 jim
Domain Name server 12:03:05 jim
CloudFlare 11:40:54 jim
Representational State Transfer 11:17:01 jim
GraphQL 11:15:35 jim
21.07.2018
GCP Compute Products 19:47:46 jim
Google Cloud Pub-Sub 19:47:32 jim
Firebase 19:47:05 jim
Web Blog_blogentry_210718_1 19:40:20 jim
Google Cloud SDK 19:28:23 jim
ISO 19944 09:51:47 jim
Personally Identifiable Information 09:47:24 jim
20.07.2018
LDAP Modify-Increment Extension 22:04:41 jim
Point-to-Point Protocol over Ethernet 11:01:31 jim
Point-to-Point Protocol 10:35:34 jim
Message Passing Interface 10:34:36 jim
Ontology 10:24:06 jim
Schema 10:23:25 jim
Web Ontology Language 10:14:08 jim
Semantic WEB 10:08:44 jim
Linked Data 10:01:36 jim
Link Relation Types 09:50:26 jim
RFC 5988 09:42:57 jim
Web Linking 09:41:51 jim
The Atom Syndication Format 09:35:02 jim
Atom 09:33:02 jim
RFC 4287 09:28:54 jim
RFC 8288 09:26:58 jim
17.07.2018
OAuth Scope Example 13:40:27 jim
Access Control 11:02:23 jim
External Security Managers (ESM) 10:50:55 jim
Mainframe 10:48:58 jim
XACML 10:44:44 jim
Trust Tier 10:33:45 jim
NGAC 09:16:02 jim
16.07.2018
Next Generation Access Control 18:55:19 jim
NIST.SP.1800-3 18:47:20 jim
Attribute Based Access Control 18:39:42 jim
NIST.SP.800-162 18:38:13 jim
CISCO Commands 16:33:17 jim
OpenSSL Commands 16:30:47 jim
PAM module-arguments 16:29:54 jim
NAM Troubleshooting 16:28:34 jim
Syslog Facility 16:27:00 jim
Ndstrace 16:21:50 jim
Fanout Core Driver Debugging 16:20:52 jim
Fanout Platform Debugging 16:20:09 jim
Debugging Fanout Driver 16:18:06 jim
2.16.840.1.113719.1.14.4.1.27 16:15:16 jim
Debug 16:14:21 jim
NAV 16:12:52 jim
Network Analysis 16:12:21 jim
Web Blog_blogentry_160718_1 14:45:30 jim
Web Blog_blogentry_280717_1 13:47:05 jim
Disruptive technology 13:38:42 jim
Nordic APIs 13:35:20 jim
Alice And Bob 12:53:35 jim
Marc Andreessen 12:06:14 jim
CI 11:35:28 jim
XP 11:34:57 jim
Extreme Programming 11:34:10 jim
Dev 11:15:41 jim
Ops 11:15:06 jim
Operations Team 11:14:31 jim
Continuous testing 11:12:01 jim
Velocity 10:58:44 jim
SDLC 10:48:03 jim
Software Development Life Cycle 10:47:31 jim
BDUF 10:34:36 jim
Big Design Up Front 10:34:19 jim
Waterfall model 10:33:29 jim
Conways law 09:53:15 jim
API Economy 09:48:56 jim
15.07.2018
Service 17:42:14 jim
Facade pattern 16:58:03 jim
API-Gateway 16:55:24 jim
Web Blog_blogentry_150718_1 09:10:07 jim
14.07.2018
Bounded Context 09:07:40 jim
Monolithic Architecture 08:57:28 jim
Identity Relationship Management 08:53:05 jim
Holacracy 08:40:22 jim
13.07.2018
Cloud Access Security Broker 08:09:43 jim
12.07.2018
Red Green Refactor 16:26:11 jim
Emergent Design 16:22:06 jim
Web Blog_blogentry_120718_1 16:17:44 jim
LRM 10:43:48 jim
Last Responsible Moment 10:43:32 jim
Alibaba 09:48:15 jim
Uber 09:47:24 jim
Airbnb 09:46:55 jim
Microservice 09:44:26 jim
Load Balancing 09:02:39 jim
11.07.2018
Web Blog_blogentry_110718_1 15:11:04 jim
Data-centric 14:47:45 jim
Test Page 10:59:29 jim
MyStartPage 10:58:49 jim
LDAP Result Codes 10:56:11 jim
Error 10:54:52 jim
Cheat Sheets 10:44:17 jim
SQL Quick Help 10:43:25 jim
Cable Connections 10:41:19 jim
Jim 10:40:18 jim
AdminsPage 10:24:26 jim
Allowed Inlined Images 10:18:03 jim
Costs of Wiki 10:15:24 jim
Modify-password 10:11:44 jim
Modify-association 10:09:52 jim
LDAPWiki Images 10:08:27 jim
Combined DNA Index System 09:38:04 jim
DNA 09:31:49 jim
CODIS 09:29:39 jim
Token 09:24:36 jim
Facial recognition 09:20:10 jim
Something You Are 09:12:40 jim
Deoxyribonucleic Acid 09:10:42 jim
Genome 09:08:32 jim
10.07.2018
DomainFunctionality 13:30:55 jim
ForestFunctionality 13:30:40 jim
DomainControllerFunctionality 13:30:28 jim
Active Directory Functional Levels 13:22:42 jim
AES-256 13:21:47 jim
AES-192 13:21:31 jim
AES-128 13:21:18 jim
AES 13:19:24 jim
PDC Emulator FSMO Role 13:08:09 jim
Infrastructure Master FSMO Role 13:04:53 jim
Domain Naming Master FSMO Role 13:03:42 jim
RID Master FSMO Role 13:02:53 jim
Schema Master FSMO Role 13:00:14 jim
Flexible Single Master Operation 12:26:35 jim
Single-master 12:24:03 jim
Multi-master 12:22:22 jim
FSMO 12:08:18 jim
Photo 10:18:38 jim
0.9.2342.19200300.100.1.60 10:14:40 jim
JpegPhoto 10:14:03 jim
Image 10:07:16 jim
Audio 10:04:18 jim
Application 10:03:41 jim
Video 10:02:50 jim
Font 10:01:08 jim
Multipart 09:58:48 jim
Media-type 09:54:04 jim
IANA.MediaTypes 09:27:32 jim
Structured Syntax Suffix 09:15:39 jim
Security Event Token 08:57:05 jim
RFC 6838 08:55:13 jim
RFC 8417 08:14:43 jim
09.07.2018
RFC 1149 13:51:41 jim
Web Blog_blogentry_090718_1 13:47:21 jim
ISO 8601 13:43:53 jim
Timestamp 13:37:51 jim
LDAP Filter Choices 13:27:27 jim
Sid 09:47:08 jim
07.07.2018
RCS Universal Profile 20:57:03 jim
Organizational Identity 20:50:26 jim
Third-party Identity Provider 20:48:06 jim
Identity Relationship Framework 20:45:35 jim
Sovereign-source Identity 20:41:09 jim
Self-Sovereign Identity 20:40:02 jim
Electronic IDentification Authentication and trust Services 20:29:09 jim
05.07.2018
CIA 17:30:57 jim
Central Intelligence Agency 17:27:55 jim
United States Social Security Administration 17:21:13 jim
Independent United States Federal Agency 17:17:31 jim
Federal Communications Commission 16:57:23 jim
FCC 16:51:34 jim
Global Positioning System 16:51:12 jim
National Vulnerability Database 10:56:49 jim
Security Content Automation Protocol 10:54:39 jim
CVSS 10:48:42 jim
Common Vulnerability Scoring System 10:48:07 jim
Attack Effort 10:21:07 jim
Acceptable risk 10:00:15 jim
Tomcat And LDAP 09:55:32 jim
PreInstall Check List 09:53:46 jim
B003281 09:48:16 jim
Risk Assessment 09:39:38 jim
Threat 09:38:22 jim
Internet Threat Model 09:31:50 jim
Probability of Loss 09:30:15 jim
Authenticator Assurance Levels 09:23:46 jim
Data Security Impact 09:20:38 jim
Access Control Models 09:14:16 jim
04.07.2018
Open Banking 11:34:46 jim
OBIE 11:33:43 jim
Open Banking Implementation Entity 11:33:26 jim
Web Blog_blogentry_040718_1 09:58:09 jim
Cloud Data Store 09:50:44 jim
Google Cloud Storage 09:49:57 jim
RFC 8414 08:53:29 jim
OAuth 2.0 Authorization Server Metadata 08:52:03 jim
United States Territories 08:40:00 jim
District of Columbia 08:38:41 jim
US States 08:36:35 jim
United States federal government 08:34:57 jim
United States Cabinet Department 08:23:58 jim
United States 08:21:55 jim
United States Constitution 08:15:45 jim
Vice President of the United States 08:14:31 jim
President of the United States of America 08:06:41 jim
CAN 08:00:00 jim
CA 07:59:31 jim
Canada 07:58:27 jim
Country Code 07:57:13 jim
Cryptographic Module Validation Program 07:55:11 jim
03.07.2018
Digital Signature 15:13:11 jim
Signature Verification 15:06:54 jim
Signature Generation 15:05:34 jim
Message Authentication Code 14:19:54 jim
Digital Signature Algorithm 14:18:37 jim
Probabilistic Signature Scheme 13:57:07 jim
How SSL-TLS Works 13:29:06 jim
Wi-Fi Alliance 10:36:02 jim
Wi-Fi 10:35:21 jim
Trademark 10:33:42 jim
Intellectual Property Rights 10:31:37 jim
USPTO 10:31:09 jim
United States Patent and Trademark Office 10:30:40 jim
Open Protocol for Access Control, Identification, and Ticketing with privacY 10:27:51 jim
Main 10:19:02 jim
02.07.2018
ACE 16:26:04 jim
1.2.840.113556.1.4.1669 16:25:33 jim
ACE-OAuth 16:08:30 jim
Authentication and Authorization for Constrained Environments 16:05:46 jim
Web Blog_blogentry_020718_1 15:47:06 jim
01.07.2018
Photography 10:01:52 jim
Surveillance 09:57:01 jim
Video Surveillance 09:55:37 jim
One-party consent 09:55:00 jim
Two-party consent 09:54:47 jim
Wiretapping 09:54:29 jim
Recording 09:53:31 jim
Legal Consideration 09:48:05 jim
Audio Surveillance 09:46:15 jim
Photographs 09:39:24 jim
Signals Intelligence 09:24:59 jim
Logging 09:11:00 jim
Data Protection 09:07:22 jim
CFAA 08:50:31 jim
Computer Fraud and Abuse Act 08:49:53 jim 18 U.S.C. ==> U.S. Code Title 18
U.S. Code Title 18 08:49:53 jim 18 U.S.C. ==> U.S. Code Title 18
U.S. Code 08:46:56 jim
United States Code 08:46:28 jim
18 U.S. Code 2511 08:41:50 jim 18 U.S.C. 2511 (d) ==> 18 U.S. Code 2511
Web Blog_blogentry_010718_1 08:35:10 jim
28.06.2018
Bandit-project.org 20:02:16 jim
Higgins Project 19:58:57 jim
CardSpace 19:51:15 jim
Information Cards 19:50:08 jim
ICards 19:48:32 jim
IDMRelatedOrganizationsAndStandards 19:28:45 jim
Blockchain 10:16:10 jim
27.06.2018
PosixGroup 11:07:58 Martin
26.06.2018
LEC 18:11:20 jim
Local Exchange Carrier 18:10:59 jim
Local Access and Transport Area 18:09:35 jim
Local Exchange 18:08:37 jim
IXC 18:01:59 jim
Point-of-Presence 18:01:19 jim
Interexchange Carrier 17:59:26 jim
Year 1985 17:53:04 jim
Schema MAD 13:36:01 jim
2.5.5.9 13:33:28 jim
OR-Name 13:26:47 jim
DN Syntax 13:24:38 jim
2.5.5.1 13:21:13 jim
Assistant 13:20:50 jim
2.16.840.1.113719.1.8.4.2 13:17:49 jim
25.06.2018
United States Department of Homeland Security 13:54:15 jim
United States Department of Homeland Security/homeland-logo.png 13:53:46 jim homeland-logo.png
24.06.2018
PasswordsUsed 11:30:37 jim
LoginAllowedTimeMap 11:25:49 jim
DIT Content Rule 10:21:50 jim
Name Form Description 10:13:50 jim
Name Form 10:13:27 jim
Extended Flags 10:04:57 jim
X-MIN-VALUE-LENGTH 10:04:36 jim
X-MIN-VALUE-COUNT 10:03:44 jim
X-MIN-INT-VALUE 10:03:21 jim
X-MAX-VALUE-LENGTH 10:02:57 jim
X-MAX-VALUE-COUNT 10:02:30 jim
X-MAX-INT-VALUE 10:01:18 jim
X-ALLOWED-VALUE 10:00:41 jim
X-NOT-HUMAN-READABLE 09:51:42 jim
X-SCHEMAFLAGSEx 09:48:04 jim
23.06.2018
CCC 08:22:24 jim
Key 08:19:07 jim
Digital Key 08:15:00 jim
Lock 08:14:18 jim
MirrorLink 07:49:29 jim
Car Connectivity Consortium 07:47:52 jim
Web Blog_blogentry_230618_1 07:41:46 jim
19.06.2018
SignatureAlgorithm 19:10:39 jim
Example Certificate 19:07:41 jim
Issuer 19:05:25 jim
Certificate Issuer 19:04:13 jim
SignatureValue 19:02:16 jim
TBSCertificate 19:01:35 jim
Basic Certificate Fields 18:54:36 jim
ContentCommitment 18:36:10 jim
NonRepudiation 18:35:21 jim
KeyUsage 18:34:44 jim
CA Constraint 18:11:07 jim Basic Constraints ==> BasicConstraints
BasicConstraints 18:11:06 jim Basic Constraints ==> BasicConstraints
Certificate Extensions 18:10:55 jim
ExtendedKeyUsage 18:06:35 jim
Subject Alternative Name 18:05:56 jim
Certificate Validation 17:43:11 jim
DigitalSignature 15:16:50 jim
Extended Validation Certificate 14:57:50 jim
Certificate Chain 14:42:32 jim
14.06.2018
Microsoft Active Directory Anomalies 12:11:52 jim
Tips using UnboundID LDAP SDK 12:04:57 jim
PS_TOKEN 12:02:47 jim
Server-Side Login throttling schemes 12:00:08 jim
LDAP Connection Maintenance 11:58:19 jim
Standards Based SSO 11:57:37 jim
HttpSessionTimeout 11:56:07 jim httpSessionTimeout ==> HttpSessionTimeout
2.16.840.1.113719.1.3.4.7 11:55:59 jim
LdapServerIdleTimeout 11:51:31 jim
LDAP_TIMEOUT 11:50:56 jim
LDAP_TIMELIMIT_EXCEEDED 11:50:33 jim
LDAP Client Error And Result Codes 11:49:45 jim
13.06.2018
Web Blog_blogentry_030618_1 12:02:29 jim
Measure What Matters 11:57:11 jim
Independent Identity 11:41:12 jim
Decentralized Identity 11:40:42 jim
Hyperledger Indy 11:31:29 jim
DicAppData 11:27:44 jim dicAppData ==> DicAppData
Schema Modifications 11:26:08 jim
1.3.6.1.4.1.8876 11:23:58 jim
1.3.6.1.4.1.8876.2.2.5 11:23:31 jim Schema-willeke ==> Willeke Schema
DicPersonInfo 11:23:31 jim Schema-willeke ==> Willeke Schema
LDAP Schema 11:23:31 jim Schema-willeke ==> Willeke Schema
LDAPAttributetypesWillekeBranchStart 11:23:31 jim Schema-willeke ==> Willeke Schema
Willeke Schema 11:23:30 jim Schema-willeke ==> Willeke Schema
How To Get Your Own OID 11:16:23 jim LDAPAttributetypesBranchStart ==> LDAPAttributetypesWillekeBranchStart
1.3.6.1.4.1.8876.2.1.6 11:12:18 jim
DateOfBirth 11:11:48 jim dateOfBirth ==> DateOfBirth
Date Of Birth 11:06:05 jim
Identification 11:05:10 jim
Attribute 11:04:36 jim
Relationship 11:04:10 jim
Agent 11:03:38 jim
CNCF 09:57:41 jim
Cloud Native Computing Foundation 09:57:26 jim
Protobuf 09:55:33 jim
Protocol Buffers 09:55:16 jim
Google Remote Procedure Call 09:46:04 jim
12.06.2018
Web Blog_blogentry_120618_1 16:39:51 jim
MsDS-UserPasswordExpiryTimeComputed 10:53:13 jim
Date Form 10:44:02 jim
Time 10:42:49 jim
Date 10:40:02 jim
LargeInteger Date 10:39:22 jim
FILETIME 10:38:30 jim
Microsoft TIME 10:37:53 jim
LargeInteger 10:35:39 jim FILETIME ==> LargeInteger Date
AccountExpires 10:35:38 jim FILETIME ==> LargeInteger Date
PwdStartTime 10:20:22 jim
LoginActivationTime 10:19:46 jim
Account Expiration 10:15:16 jim
1.2.840.113556.1.4.159 10:12:17 jim
11.06.2018
OpenID Foundation 22:51:22 jim
Request For Comment 22:41:32 jim
EEA 10:03:38 jim
European Economic Area 10:03:05 jim
Payment Service Provider 10:01:30 jim
Payment Services Directive 09:59:37 jim
Account Servicing Payment Service Provider 09:15:39 jim
Payment Service User 09:14:30 jim
Payment Transaction 09:12:14 jim
Account Information Service Provider 09:03:42 jim
Payment Initiation Service Provider 09:03:10 jim
Third Party Payment Service Provider 09:01:47 jim
Payment Initiation Service 09:00:36 jim
Account Information Service 08:56:04 jim
Account owner 08:54:49 jim
Bank 08:52:24 jim
Federal Reserve Bank 08:51:13 jim Banks ==> Bank
Federal Reserve Board of Governors 08:51:13 jim Banks ==> Bank
Federal Reserve Member Banks 08:51:13 jim Banks ==> Bank
Office of the Comptroller of the Currency 08:51:13 jim Banks ==> Bank
Clearing House Interbank Payments System 08:51:12 jim Banks ==> Bank
Depository Institutions Deregulation and Monetary Control Act of 1980 08:51:12 jim Banks ==> Bank
Electronic Identity Verification 08:51:12 jim Banks ==> Bank
Federal Deposit Insurance Corporation 08:51:12 jim Banks ==> Bank
Custodian 08:49:09 jim
Deposit Account 08:44:56 jim
Transaction Account 08:44:28 jim
10.06.2018
United States Visitor and Immigrant Status Indicator 10:49:35 jim
Advanced Fingerprint Identification Technology 10:12:09 jim
Integrated Automated Fingerprint Identification System 10:11:07 jim
TSDB 10:09:14 jim
Terrorist Screening Database 10:08:58 jim
Web Blog_blogentry_100618_1 10:04:55 jim
DOB 10:02:00 jim
The Automated Biometric Identification System 10:00:39 jim
NCIC 09:59:57 jim
National Crime Information Center 09:59:35 jim
Immigration Violator File 09:56:33 jim
Repository for Individuals of Special Concern 09:51:13 jim
United States Customs and Border Protection 09:50:06 jim
Immigration 09:49:28 jim
REAL ID 09:48:06 jim
Driver License 09:47:06 jim
State Identification Number 09:40:07 jim
IDENT 09:19:27 jim
Government Data Store 09:16:56 jim
Homeland Advanced Recognition Technology 09:15:05 jim
HART 09:08:12 jim
09.06.2018
Web Blog_comments_290712_1 22:40:05 Danielwrold
06.06.2018
Expires_in 09:26:43 jim
SasUpdateLoginTimeInterval 07:04:34 Karl Making the Server chappter more readable
04.06.2018
OAuth 2.0 Mutual TLS Client Authentication and Certificate Bound Access Tokens 14:30:31 jim
Mutual TLS Profiles for OAuth Clients 14:25:34 jim
Web Blog_blogentry_120218_1 14:25:09 jim Mutual TLS for OAuth Client Authentication ==> OAuth 2.0 Mutual TLS Client Authentication and Certificate Bound Access Tokens
03.06.2018
Trust No One 17:44:24 jim
TNO 17:43:36 jim
Objectives and Key Results 17:36:54 jim
Nuclear fusion 10:17:23 jim
Energy Density 10:16:53 jim
USNO 09:45:48 jim
United States Naval Observatory 09:45:26 jim
Time And Epochs 09:43:52 jim
Year 1858 09:35:51 jim
OpenVMS 09:31:40 jim
Wikipedia 09:29:58 jim
System time 09:29:04 jim
Year 1582 09:24:48 jim
Year 1965 09:20:23 jim
TNBT 09:19:59 jim
The Next Big Thing 09:19:42 jim
OKR 09:08:04 jim
DNS Queries over HTTPS 08:22:49 jim
DoH 08:09:35 jim
DNS over HTTPS 08:09:18 jim
02.06.2018
Entitlement Example 15:18:41 jim
LDAP Searches 09:54:11 jim
Web Blog_blogentry_020618_1 08:28:27 jim
OAuth 2.0 Software Statement 08:24:49 jim
WebAuthn Attestation 08:12:45 jim
FIDO2 08:08:31 jim
Token Binding Protocol 08:06:11 jim
Client To Authenticator Protocol 08:02:14 jim
FIDO 07:56:11 jim
W3C WebAuthn 07:47:32 jim
01.06.2018
Identify and Authenticate access to system components 11:45:32 jim
Windows Logon 11:39:37 jim
Wendy 11:38:55 jim
Service Account 11:38:34 jim
Privileged User Management 11:38:02 jim
Privileged Access Management 11:37:44 jim
Policy Administration Point 11:37:29 jim
Local Administrative Accounts 11:37:06 jim
Kerberos Service Account 11:36:49 jim
Kerberos Forged Ticket 11:36:34 jim
Internal Attacker 11:35:49 jim
IDSA Integration Framework 11:33:55 jim
Emergency Identity 11:33:31 jim Emergency Accounts ==> Emergency Identity
Privileged Identity 11:33:31 jim Emergency Accounts ==> Emergency Identity
Elevated Token 11:32:43 jim
Domain Administrative Accounts 11:32:26 jim
Payment Card Industry Data Security Standard 11:20:05 jim
PCI Data Security Standard v3.2.1 11:00:27 jim
OpenID Provider Issuer Discovery 09:00:56 jim
OpenID Connect Federation Async 08:00:45 jim
OpenID Connect Federation 07:47:44 jim
31.05.2018
Management Information Base 16:07:50 jim
Definitions of Managed Objects for Drip-Type Heated Beverage Hardware Devices using SMIv2 16:04:26 jim
RFC 2325 16:03:21 jim
Web Blog_blogentry_310518_1 16:02:12 jim
HTCPCP-TEA 14:04:58 jim
HTCPCP 14:03:53 jim
RFC 2324 14:03:24 jim
RFC 7168 14:03:07 jim
HTTP 401 14:02:39 jim
HTTP 418 13:58:31 jim
HTTP 403 13:54:59 jim
OAuth Error 12:41:12 jim
Forbidden 12:05:37 jim
Microsoft Disk Operating System 11:55:49 jim
MS-DOS 11:54:34 jim
OSX 11:52:31 jim
US-ASCII 11:50:14 jim
American Standard Code for Information Interchange 11:49:41 jim
ASCII 11:49:07 jim
27.05.2018
Automated Teller Machine 09:48:56 jim
ATM 09:48:24 jim
EMV Terms 09:47:18 jim
Demand Deposit Account 09:37:57 jim
European Banking Authority 09:23:37 jim
EBA 09:22:27 jim
General Data Protection Regulation 09:16:02 jim
26.05.2018
Access Control List 09:26:09 jim
CommonName 09:22:41 jim
Cn 09:14:00 jim
LDAP_SERVER_RANGE_OPTION_OID 08:56:03 jim
Anomaly 08:53:37 jim
25.05.2018
Trillion 10:46:44 jim
UCC 10:18:26 jim
GS1 Company Prefix 10:18:11 jim
Unique Country Code 10:17:23 jim
Uniform Commercial Code 10:09:36 jim
Electronic Payments Network 10:03:50 jim
Automated Clearing House 10:01:21 jim
Financial Settlement 10:00:39 jim
Clearing house 10:00:11 jim
Financial transaction 09:54:14 jim
Agreement 09:53:13 jim
Account 09:51:05 jim
Trustee 09:36:44 jim
Beneficiary 09:34:28 jim
Fiduciary Responsibility 09:31:26 jim
Resource 09:13:16 jim
Asset 09:11:16 jim
Data 08:57:01 jim
Cookie 08:46:41 jim
24.05.2018
Symmetric cipher 15:28:50 jim
Asymmetric cipher 15:28:29 jim
Involutory function 15:12:38 jim
Bitwise operation 15:10:48 jim
Function 15:07:10 jim
Electronic Code Book 12:07:27 jim
ECB 12:03:35 jim
OAuth 2.0 Incremental Authorization 11:11:27 jim
Italy 10:07:37 jim
Japan 10:06:52 jim
Germany 10:03:40 jim
France 10:00:10 jim
Replacement fertility rate 09:51:35 jim
Web Blog_blogentry_240518_1 09:49:16 jim
23.05.2018
FIPS 202 12:31:48 jim
Extendable-Output Function 12:30:14 jim
XOF 12:14:58 jim
Secure Hash Algorithm 12:12:27 jim
RFC 4634 12:07:35 jim
RFC 6234 12:07:19 jim
FIPS 180 12:02:34 jim
Federal Information Processing Standard 11:56:18 jim
HMAC-SHA 11:53:18 jim
Requesting Attributes by Object Class 11:44:08 jim
RFC 4529 11:38:41 jim
Turn Operation 11:31:29 jim
RFC 4531 11:25:01 jim
RFC 4616 11:23:46 jim
EdirMIBTraps 11:21:40 jim
MIB 11:20:36 jim
RFC 2605 11:18:49 jim
RFC 2222 11:17:06 jim
Collective Attribute 11:16:28 jim
LDAP Server Standards and Specifications 11:14:54 jim
Network Information Service 11:05:33 jim
NIS 11:04:44 jim
KRACKs 11:01:44 jim
Key Reinstallation AttaCKs 11:01:27 jim
Wi-Fi Protected Access 2 11:01:12 jim
WPA2 10:54:18 jim
Public Wi-Fi 10:53:27 jim
Access Point 10:44:43 jim
Proxy Auto-Config 10:37:53 jim
Web Proxy Auto-Discovery Protocol 10:32:21 jim
DHCP 10:29:13 jim
WPAD 10:27:30 jim
PAC 10:04:00 jim
Web Blog_blogentry_230518_1 10:03:27 jim
22.05.2018
WAR 13:52:02 jim
Web Blog_blogentry_220518_1 13:35:54 jim
Year 2019 09:26:38 jim
21.05.2018
Michael B. Jones 12:50:56 jim
20.05.2018
Best Practices OpenID Connect 18:56:01 jim
OAuth 2.0 Security Considerations 18:55:41 jim
OAuth 2.0 Security Best Current Practice 18:55:26 jim OAuth Security Topics ==> OAuth 2.0 Security Best Current Practice
17.05.2018
Security Token Service 09:10:43 jim
Architecture 09:08:38 jim
Enterprise Access Manager Product 09:03:33 jim
Identity and Access Management 09:01:34 jim
Security Token 08:28:49 jim
OAuth 2.0 Token Exchange 08:24:58 jim
Delegation vs Impersonation 08:19:16 jim
16.05.2018
Bank Secrecy Act 16:59:30 jim
Citizen 16:58:54 jim
Law of Consistent Experience Across Contexts 16:57:59 jim
Law of Pluralism of Operators and Technologies 16:56:46 jim
NOFORN 16:55:43 jim
AS_REQ 15:39:20 jim
AS_REP 15:39:02 jim
AP_REP 15:38:50 jim
TGS Exchange 15:14:58 jim
TGS_REP 15:13:55 jim
TGS_REQ 15:11:10 jim
Kerberos Cryptosystem Negotiation Extension 14:51:53 jim
AP_REQ 14:46:19 jim
Kerberos Encryption Types 14:25:06 jim
Negotiate SSP 14:10:01 jim
Kerberos Encryption Types/as_resp-kerberos.png 13:54:52 jim as_req-kerberos
Kerberos Encryption Types/as_req-kerberos.png 13:54:36 jim as_req-kerberos
Etype 13:46:36 jim
DES3 10:37:55 jim
Triple DES 10:37:38 jim
NIST.SP.38 10:36:43 jim
Cipher-based Message Authentication Code 10:34:39 jim
CMAC 10:28:45 jim
MsDS-SupportedEncryptionTypes 10:26:51 jim
RFC 4757 10:24:08 jim
RFC 3962 10:22:44 jim
RFC 3961 10:21:41 jim
Cipher Suite 09:46:52 jim
Anonymous Cipher Suite 09:42:33 jim
TLS_NULL_WITH_NULL_NULL 09:41:55 jim
Cyclic Redundancy Check 09:38:10 jim
CRC 09:31:22 jim
SHA1 09:28:38 jim
CTS 08:50:09 jim
MsDS-SupportedEncryptionTypes/MMC-msDS-SupportedEncryptionTypes.png 08:37:26 jim MMC-msDS-SupportedEncryptionTypes
1.2.840.113556.1.4.1963 08:33:20 jim
FLAG_ATTR_IS_CRITICAL 08:32:47 jim
SchemaFlagsEx 08:30:27 jim
Web Blog_blogentry_160518_1 08:15:14 jim
14.05.2018
Marketing 09:11:57 jim
Account-Based Marketing 09:05:24 jim
Advertising 09:03:34 jim
Advertisement 09:03:14 jim
Product 09:01:47 jim
Goods 08:59:16 jim
Payment 08:55:48 jim
Advertising technology 08:47:35 jim
13.05.2018
Data processing 19:40:29 jim
Data In Process 19:29:34 jim
Adtech 19:09:08 jim
Web Blog_blogentry_130518_1 19:08:19 jim
BitShares 10:48:46 jim
USD 10:39:40 jim
DAC 10:27:54 jim
Decentralized Autonomous Corporation 10:27:24 jim
Decentralized Autonomous Organization 10:26:30 jim
OpenLedger 10:13:59 jim
BTS 10:10:14 jim
Data Ownership 08:39:39 jim
Possession Factor 08:25:07 jim
Control 08:20:22 jim
12.05.2018
Martin Hellman 20:41:15 jim
Whitfield Diffie 20:40:10 jim
Year 1975 20:39:03 jim
Diffie-Hellman 20:38:41 jim
HTTP Strict Transport Security 18:12:46 jim
Token Binding over HTTP 17:53:24 jim
Governance 08:56:22 jim
Federation 08:46:59 jim
Federated Identity 08:45:09 jim
Law of agency 08:42:10 jim
Data aggregator 08:35:25 jim
Data Pedigree 08:30:30 jim
Data Processor 08:27:57 jim
Actionable Intelligence 08:25:22 jim
Data Swamp 08:15:44 jim
Data Provenance 07:49:02 jim
11.05.2018
Username 11:25:55 jim
Password Validator 11:25:13 jim
Memorized secrets 11:03:27 jim
Verifier 10:44:32 jim
Verification 10:43:02 jim
Authenticator 10:36:28 jim
Life cycle 10:13:58 jim
NIST.SP.800-63 10:13:20 jim
NIST Electronic Authentication Guideline 10:11:50 jim
FIPS 199 10:08:56 jim
Magnitude of the Potential loss 10:03:50 jim
NIST.SP.800-122 09:55:45 jim
HIPAA Covered Entity 09:44:26 jim
Patient 09:37:42 jim
Health Insurance Portability and Accountability Act 09:36:58 jim
United States Cryptography Export-Import Laws 09:29:12 jim
RSA_EXPORT 09:27:03 jim
Self-regulating Provisioning 09:25:23 jim
Financial Industry Regulatory Authority Inc 09:24:28 jim
Regulatory Risk 09:17:35 jim
Criminal action 09:15:36 jim
United States Federal Standard 09:14:48 jim
LdapStdCompliance 09:13:45 jim
2.16.840.1.113719.1.27.4.82 09:08:29 jim
Regulatory Burden 09:03:40 jim
Compliance Burden 09:01:58 jim
Compliance 08:57:52 jim
Regulatory compliance 08:51:20 jim
10.05.2018
NDSPKISDKeyServerDN 17:46:43 jim
SASSecurity 17:36:42 jim
NDSPKISDKeyAccessPartition 17:27:59 jim nDSPKISDKeyAccessPartition ==> NDSPKISDKeyAccessPartition
Key Access Partition 17:20:05 jim
SAS Data Flow Manager 17:06:17 jim
SASDFM 17:04:25 jim
SASService 16:59:39 jim
Data Processing Agreement 12:28:10 jim
Pseudonymization 12:22:50 jim
Data anonymization 12:22:26 jim
Data Controller 12:00:18 jim
Curators 11:58:28 jim
Data Collection 11:57:55 jim Content curation ==> Data curation
Data curation 11:57:55 jim Content curation ==> Data curation
Data subject 11:42:33 jim
09.05.2018
2.16.840.1.113719.1.48.4.1.9 15:09:03 jim
NDSPKIKeyMaterialDN 15:07:49 jim
NovellS Challenge Response System 15:03:19 jim
2.16.840.1.113719.1.1.4.1.120 15:00:56 jim
2.16.840.1.113719.1.39.6.1.2 14:55:13 jim
SAS 14:44:37 jim
Secure Authentication Services 14:44:19 jim
SASLoginSecretKey 14:35:48 jim
Software library 14:23:13 jim
Loadable Module 13:57:11 jim
Session Key 13:48:56 jim
Server Storage Key 13:45:07 jim
TreeKey 13:41:35 jim
SDI Key 13:38:36 jim
Security Domain Infrastructure 13:30:44 jim
NICISDI Keys 13:29:05 jim
Niciext 12:34:38 jim
NDS Connection States 12:18:36 jim
Curses 11:21:40 jim
Utility 11:18:27 jim
ReplicaUpTo 11:03:46 jim replicaUpTo ==> ReplicaUpTo
RFC 8392 00:15:10 jim
CBOR Web Token 00:14:19 jim
08.05.2018
CTAP 13:47:16 jim
1.2.840.113556.1.4.805 11:04:33 jim
LDAP_SERVER_TREE_DELETE_OID 11:04:05 jim
Subtree Delete Control 11:02:36 jim
Deleted object 11:00:41 jim
1.2.840.113556.1.4.2058 10:53:23 jim
IsRecycled 10:52:55 jim
Deleted-objects 10:49:52 jim
Tombstone 10:48:34 jim
Recycled-object 10:47:48 jim
X-SYSTEMFLAGS 10:28:01 jim
SystemFlags 10:25:39 jim
FLAG_ATTR_IS_CONSTRUCTED 10:21:13 jim
FLAG_ATTR_REQ_PARTIAL_SET_MEMBER 10:20:43 jim
1.2.840.113556.1.2.48 10:13:23 jim
IsDeleted 10:13:07 jim
1.2.840.113556.1.5.72 10:02:32 jim
NTDSService 10:01:31 jim
1.2.840.113556.1.2.54 09:54:46 jim
TombstoneLifetime 09:54:29 jim
Microsoft Active Directory 09:40:12 jim
Mutual TLS 08:48:04 jim
JSON Web Token Best Current Practices 08:06:11 jim
07.05.2018
NICI 3.0 23:28:24 jim
Key server 23:14:17 jim
NICISDITreeKeyProviderFaultTolerance 23:12:21 jim
Universal Password 22:38:42 jim
NICITreeKeyProvider 22:33:55 jim
SDIDIAG 22:10:02 jim
DirXML-DriverVersion 18:14:02 jim
Assurance Level 14:48:41 jim
Financial damage 14:45:53 jim
Real Risk 14:44:57 jim
Level Of Assurance 14:31:10 jim
High 14:04:25 jim
Moderate 14:03:51 jim
Low 14:03:20 jim
Level of Assurance (LoA) Profiles 13:58:50 jim
M-04-04 Level of Assurance (LOA) 13:48:41 jim
Evaluation Assurance Level 13:45:24 jim
Identity Ecosystem Framework 13:40:25 jim
Identity Assurance Framework 13:39:29 jim
Identity Assurance Level 13:38:44 jim
Best Practices for LDAP Security 13:36:24 jim
Privacy Considerations 13:34:26 jim
SSL-TLS Interception 13:32:46 jim
Contingency Planning 13:31:27 jim
Controlled Unclassified Information 13:22:55 jim
Federation Assurance Level 12:21:14 jim
GOST 11:30:13 jim
Social Websites 11:28:51 jim
Russia 11:28:04 jim
Russian Federation 11:27:31 jim
Soviet Union 11:26:16 jim
CIS 11:21:35 jim
Commonwealth of Independent States 11:21:10 jim
RFC 4491 11:13:00 jim
RFC 4055 11:10:26 jim
EncipherOnly 11:03:09 jim
DecipherOnly 11:02:56 jim
CRLSign 10:59:18 jim
KeyAgreement 10:57:32 jim
PathLenConstraint 10:53:22 jim
KeyCertSign 10:36:09 jim
KeyEncipherment 10:32:55 jim
06.05.2018
DEA 10:58:44 jim
Drug Enforcement Administration 10:57:55 jim
United States Attorney General 10:56:50 jim
Attorney General 10:56:18 jim
VPOTUS 10:47:18 jim
United States Congress 10:38:02 jim
United States Department of Education 10:31:49 jim
Family Educational Rights and Privacy Act 10:28:47 jim
Personal Information Protection and Electronic Documents Act 10:08:01 jim
Sarbanes-Oxley Act 10:06:25 jim
Protected Data 10:04:22 jim
Data Access Governance 10:03:48 jim
NIST.SP.800-53 09:58:22 jim
Controlled Technical Information 09:57:47 jim
Cardholder Data 09:56:17 jim
Federal Tax Information 09:54:26 jim
Export restrictions 09:53:52 jim
Protected Health Information 09:53:22 jim
Financial Data 09:52:44 jim
Data Classification 09:49:28 jim Data Constraint ==> Protected Data
FTI 09:40:50 jim
Commerce Control list 09:34:10 jim
EAR 09:34:05 jim
ECCN 09:27:20 jim
Export Control Classification Number 09:27:00 jim
CCL 09:24:16 jim
Export Administration Regulations 09:15:26 jim
Code of Federal Regulations 08:38:41 jim
Federal Register 08:34:34 jim
CFR 08:28:10 jim
Treatment, Payment and Health care Operations 08:24:16 jim
Health Care Provider 08:23:13 jim
Federal Acquisition Regulation 08:22:04 jim
FAR 08:17:09 jim
DFARS 08:10:49 jim
Defense Federal Acquisition Regulation Supplement 08:10:17 jim
CTI 08:06:47 jim
05.05.2018
Disclosure-Alteration-Destruction 11:33:30 jim
Data Loss Prevention 11:33:06 jim
DSI 11:31:50 jim
Availability 11:31:18 jim
Data loss 11:21:21 jim
Data Disposal 11:18:20 jim
Data Management 10:20:40 jim
Information Rights Management 10:13:24 jim
DAD 09:53:03 jim
Identity Attributes 09:42:33 jim
Personal data 09:30:12 jim
04.05.2018
Sexual orientation 15:58:41 jim
Gender 15:57:36 jim
Genetic Data 15:51:51 jim
EC 15:49:18 jim
European Commission 15:48:59 jim
03.05.2018
Privacy Policy 11:42:42 jim
02.05.2018
DunbarS Numbers 15:30:16 jim
Individual 15:11:52 jim
Community of Interest 15:07:31 jim
Society 15:06:59 jim
Creative Network 15:05:53 jim
Friends 14:55:01 jim
Tribe 14:53:51 jim
Megaband 14:53:32 jim
Hunter-gather 14:53:00 jim
Sympathy group 14:52:10 jim
Clique 14:51:35 jim
If men were angels 13:23:39 jim
Web Blog_blogentry_020518_1 13:21:55 jim
Bruce Schneier 13:13:25 jim
Liars and Outliers 13:02:34 jim
Trust 12:26:01 jim
Menezes-Qu-Vanstone 09:26:02 jim
Key-Exchange 09:23:05 jim
Key-Establishment 09:20:25 jim
NIST.SP.800-56A 09:17:05 jim
ECMQV 09:11:01 jim
HMQV 09:07:00 jim
MQV 09:04:45 jim MenezesQuVanstone ==> Menezes-Qu-Vanstone
Fully Hashed Menezes-Qu-Vanstone 08:59:51 jim
FHMQV 08:54:24 jim
Elliptic Curve Menezes-Qu-Vanstone 08:53:05 jim
Elliptic Curve 08:47:03 jim
Cryptanalysis 08:31:08 jim
01.05.2018
NIST.SP.800-107 09:11:42 jim
Secret-key 09:06:16 jim
Keying material 09:04:15 jim
Key agreement 08:56:55 jim
Shared Secret 08:54:28 jim
Key Derivation Function 08:46:23 jim
NIST.SP.800-70 08:35:21 jim
Collision Resistance 08:26:15 jim
Message-Digest 08:17:47 jim
30.04.2018
Yadis ID 17:09:16 jim
Yet Another Distributed Identity System 17:08:21 jim
Drummond Reed 16:53:28 jim
EXtensible Data Interchange 16:51:55 jim
XDI 16:50:06 jim
Respect Network CORP 16:48:36 jim
Respect Trust Framework 16:42:13 jim
Evernym INC. 16:40:35 jim
Sovrin 16:34:32 jim
Decentralized Public Key Infrastructure 16:33:03 jim Evernym ==> Evernym INC.
Web of Trust 16:19:29 jim
DKMS 16:16:15 jim
Decentralized Key Management System 16:15:59 jim
29.04.2018
WS-Specifications 10:04:40 jim
Web Services Distributed Management 10:02:05 jim
WSDM 10:01:35 jim
Web Services Resource Framework 10:00:06 jim
WSRF 09:56:20 jim
Web Services Federation 09:54:10 jim
WS-Trust 09:52:51 jim
Web Services Security 09:52:32 jim
Business Process Execution Language 09:51:50 jim
Web Services Addressing 09:50:58 jim
WS-Addressing 09:49:00 jim
Identity Web Services Framework 09:43:56 jim
Circle of Trust 09:36:45 jim
IAF 09:31:21 jim
Openliberty.org 09:24:10 jim
Identity Governance Framework 09:18:38 jim
Liberty Alliance 09:11:17 jim
ID-FF 09:00:55 jim
Identity Federation Framework 09:00:38 jim
Standard compliance 08:53:56 jim
Regulatory technology 08:52:59 jim
Governance Risk Management And Compliance 08:50:40 jim
RegTech 08:28:06 jim
Web Blog_blogentry_290418_1 08:27:31 jim
28.04.2018
Help Desk 09:18:01 jim
Employee Badge 09:16:05 jim
Knowledge-Based Authentication 09:13:50 jim
KBV 08:50:56 jim
Knowledge-Based Verification 08:50:37 jim
NIST.SP.800-63-3 08:45:18 jim
27.04.2018
CaseIgnoreIA5SubstringsMatch 10:07:39 jim
1.2.840.113556.1.4.803 10:06:58 jim
MatchingRule 10:02:48 jim
CaseIgnoreListMatch 09:59:57 jim
2.5.13.11 09:56:58 jim
Bitmask 09:53:05 jim
1.3.6.1.4.1.1466.109.114.3 09:49:14 jim
TRUE 09:42:54 jim
1.3.6.1.4.1.1466.109.114.2 09:42:10 jim
CaseIgnoreIA5Match 09:41:20 jim
LDAP Internationalized String Preparation 09:38:16 jim
RFC 4510 09:36:38 jim
LDAPSyntaxes 09:16:55 jim
LDAP Syntaxes and Matching Rules 09:15:09 jim
Simple Authentication 08:39:16 jim
26.04.2018
AuxiliaryClassFlag 22:33:27 jim
KnowledgeInformation 22:31:09 jim
Hexadecimal 14:33:49 jim
Base16 14:33:31 jim Base 16 ==> Base16
Web Blog_blogentry_260418_1 14:30:22 jim
23.04.2018
Intruder Detection 21:01:22 jim
Account Restrictions 21:00:30 jim
Managed Service Account 20:58:27 jim
Security Account Manager 20:53:26 jim
Computer account 20:50:41 jim
Account Inactivity 20:49:53 jim
Application Accounts 16:00:08 jim
Protocol Vulnerability 15:37:59 jim
Implementation Vulnerability 15:37:45 jim
Vulnerability 15:35:15 jim
Web Blog_blogentry_230418_1 15:24:06 jim
Thread 15:18:14 jim
Buffer overflow 15:15:34 jim
SQL Injection 15:10:38 jim
Credential Reuse 15:02:07 jim
Password Generator 14:58:47 jim
SQLi 14:48:02 jim
Page Fault 14:20:08 jim
Swap Space 14:18:18 jim
Virtual Memory 14:05:35 jim
International System of Units 08:33:49 jim
ISO 80000 08:14:17 jim
Byte 08:13:23 jim
SI 08:08:04 jim
ISQ 07:53:33 jim
Seconds 07:52:57 jim
International System of Quantities 07:50:31 jim
21.04.2018
Kibibyte 11:55:33 jim
Terminology for Constrained-Node Networks 11:52:32 jim
KiB 11:50:19 jim
Device Flow 08:28:51 jim
20.04.2018
Increment 08:14:32 jim
Release Management 08:13:43 jim
Release 08:11:28 jim
AAL2 07:53:17 jim
AAL1 07:53:13 jim
AAL3 07:52:51 jim
Impersonation-resistant 07:51:29 jim
Web Blog_blogentry_190418_1 07:43:09 jim
Identity Provider (IDP) 07:40:59 jim
Attribute references 07:39:34 jim
Authentication intent 07:35:36 jim
19.04.2018
Risk-Based Authentication 18:45:27 jim
Authentication Context Class vs Authentication Method Reference 18:14:17 jim
Non-interactive 18:07:29 jim
Interactive 18:01:44 jim
Windows Logon Types 17:45:43 jim
Windows Event Log 17:41:56 jim
Windows Security Log Event 17:40:31 jim
Windows Security Event Log 17:39:54 jim Security Event Log ==> Windows Security Event Log
System Access Control List 17:37:30 jim
Create a MAD Service To Run 17:32:54 jim
Windows registry 17:31:46 jim
Service Control Manager 17:31:37 jim
SCM 17:19:09 jim
Active Directory Account Lockout 17:14:42 jim
18.04.2018
ipProtocolNumber 17:58:27 jim
1.3.6.1.1.1.2.3 17:54:35 jim
IpServiceProtocol 17:54:00 jim
IpService 17:50:53 jim
1.3.6.1.1.1.1.15 17:47:01 jim
IpServicePort 17:46:08 jim ipServicePort ==> IpServicePort
NisNetgroupTriple 17:42:35 jim
NisNetgroup 17:39:41 jim
MemberNisNetgroup 17:36:12 jim
MemberUid 17:18:42 jim
ShadowInactive 17:12:12 jim
ShadowLastChange 17:11:32 jim
ShadowAccount 17:08:51 jim
ShadowFlag 17:06:06 jim
1.3.6.1.4.1.42.2.27.8.1.28 17:04:02 jim
ShadowExpire 17:03:43 jim
1.3.6.1.1.1.1.9 17:00:37 jim
2.5.13.15 16:57:05 jim
IntegerOrderingMatch 16:56:47 jim
ShadowWarning 16:54:09 jim
ShadowMax 16:48:18 jim
1.3.6.1.1.1.1.7 16:46:46 jim
ShadowMin 16:45:44 jim
1.3.6.1.1.1.1.6 16:44:39 jim
shadowLastChange 16:40:56 jim
LoginShell 16:38:02 jim
IA5String 16:33:51 jim
1.3.6.1.4.1.1466.115.121.1.26 16:33:27 jim
HomeDirectory 16:32:22 jim
CaseExactIA5Match 16:30:04 jim
Gecos 16:23:59 jim
GidNumber 16:18:58 jim
UidNumber 16:14:26 jim
automountMapName 14:24:27 jim
NisDomainObject 14:18:19 jim
1.3.6.1.1.1.2.15 14:17:07 jim
NisDomain 14:15:36 jim
SchemaRFC2307Bis 14:07:10 jim
Draft-howard-rfc2307bis 14:05:56 jim
2.5.13.13 13:27:18 jim
1.3.6.1.4.1.1466.101.120.6 13:26:43 jim
1.3.6.1.1.11.1.1 13:25:31 jim
2.5.4.50 13:25:03 jim
2.5.13.20 13:24:33 jim
1.3.6.1.4.1.4203.1.3.5 13:24:09 jim
1.3.6.1.4.1.1466.101.120.7 13:23:46 jim
1.3.6.1.4.1.1466.101.120.13 13:23:31 jim
2.5.23.4 13:23:10 jim
2.5.4.65 13:22:32 jim
1.3.6.1.4.1.11.1.3.1.1.2 13:22:00 jim
2.5.4.41 13:20:55 jim
2.5.21.8 13:20:25 jim
2.5.21.4 13:20:04 jim
2.5.13.14 13:19:29 jim
0.9.2342.19200300.100.1.9 13:18:54 jim
2.5.21.10 13:18:27 jim
2.5.13.28 13:17:59 jim
2.5.13.27 13:17:38 jim
1.2.840.113549.1.9.1 13:16:42 jim
EmailAddress 13:15:55 jim
1.3.6.1.4.1.11.1.3.1.2.5 13:10:26 jim
DITContentRules 13:08:13 jim DitContentRules ==> DITContentRules
Understanding DIT Content Rules 13:08:00 jim
Subschema 13:07:29 jim
OperationalAttribute 13:06:57 jim
ObjectClass 13:06:35 jim
DIT Content Rule Description 13:06:14 jim
2.5.21.2 13:05:38 jim
1.2.36.79672281.1.13.6 13:03:00 jim
AllComponentsMatch 13:02:41 jim
OpenAssertionType 12:58:54 jim
1.2.36.79672281.1.5.3 12:51:41 jim
1.2.36.79672281.1.13.7 12:48:03 jim
DirectoryComponentsMatch 12:47:39 jim
DepartmentNumber 12:41:28 jim
2.5.18.7 12:39:58 jim
2.5.20.2 12:39:32 jim
2.5.18.12 12:39:02 jim
2.5.23.5 12:38:41 jim
2.5.13.4 12:38:01 jim
2.5.23.6 12:37:24 jim
CaseIgnoreMatch 12:35:42 jim
2.5.13.2 12:30:38 jim
2.5.13.7 12:30:12 jim
1.3.6.1.4.1.1466.109.114.1 12:29:39 jim
2.5.13.6 12:29:14 jim
2.5.13.5 12:23:40 jim
DomainComponent 12:22:23 jim
DC 12:20:34 jim
RFC 1034 12:12:47 jim
RFC 2181 12:12:25 jim
RFC 1123 12:10:08 jim
RFC 5891 12:03:10 jim
RFC 5890 12:01:53 jim
IDNA 11:56:15 jim
Internationalizing Domain Names in Applications 11:55:43 jim
RFC 3490 11:55:02 jim
Dc 11:52:18 jim
2.16.840.1.113719.1.167.6.2.1 11:51:01 jim
1.3.6.1.4.1.1466.344 11:50:38 jim
0.9.2342.19200300.100.4.13 11:50:17 jim
RFC 4234 11:48:02 jim
0.9.2342.19200300.100.1.25 11:45:32 jim
2.16.840.1.113719.1.8.4.5 11:31:15 jim
2.5.6.6 11:30:48 jim
Person 11:30:26 jim
Company 11:23:16 jim
Digital Identity 11:18:32 jim
Identity Cube 10:18:28 jim
Credential 09:56:11 jim
Credential Repository 09:45:00 jim
Edirectory Back-Ups And Clones 09:43:16 jim
Backup 09:42:21 jim
Incremental Backup 09:41:26 jim
Berkeley DB Java Edition 09:38:29 jim BerkeleyDBJavaEdition ==> Berkeley DB Java Edition
Changelog 09:29:18 jim
Back-end 09:27:56 jim
17.04.2018
0.9.2342.19200300.100.4.5 19:07:34 jim
2.5.23.2 19:07:09 jim
1.3.6.1.4.1.1466.101.120.1 19:04:56 jim
AdministratorsAddress 19:03:52 jim
0.9.2342.19200300.100.1.8 19:02:06 jim
0.9.2342.19200300.100.1.5 19:01:44 jim
0.9.2342.19200300.100.1.4 18:59:59 jim
0.9.2342.19200300.100.1.2 18:59:28 jim
CarLicense 18:45:12 jim
2.16.840.1.113730.3.1.1 18:44:07 jim
INTEGER 18:34:55 jim
BIT STRING 18:26:52 jim
BitStringMatch 18:24:19 jim
2.5.13.16 17:58:56 jim
RFC 2798 17:52:17 jim
RFC 4519 17:50:58 jim
1.3.6.1.1.3.1 17:48:23 jim
UidObject 17:46:09 jim
LDAP Family 17:40:29 jim
LDAP Message 17:34:18 jim
LDAP Object Identifier Descriptors 17:23:23 jim
VPIMUser 17:22:02 jim
RFC 4237 17:16:04 jim
Reciprocal OAuth 09:35:46 jim
Web Blog_blogentry_170418_1 09:32:46 jim Reciprocal Authorization Flow ==> Reciprocal OAuth
16.04.2018
Novell IDM Driver Filters 20:43:29 jim
Troubleshooting DirXML 20:32:28 jim
AdministrativeRole 11:59:25 jim
CollectiveAttributeInnerArea 11:58:28 jim
CollectiveAttributeSpecificArea 11:58:11 jim
SubschemaAdminSpecificArea 11:58:00 jim
AccessControlSpecificArea 11:57:45 jim
AutonomousArea 11:57:27 jim
ApplicationEntity 11:53:27 jim
RFC 2256 11:48:58 jim
Version 11:44:58 jim
Newsuperior 11:42:19 jim
2.16.840.1.113730.3.1.11 11:39:07 jim
Modify 11:37:19 jim
Newrdn 11:35:49 jim
Moddn 11:34:05 jim
Dn 11:32:13 jim
Delete 11:30:32 jim
Add 11:23:11 jim
Deleteoldrdn 11:22:10 jim
Changetype 11:21:30 jim
EntryDN 11:15:43 jim
2.5.23.3 11:02:21 jim
AccessControlInnerArea 11:01:13 jim
RFC 3296 10:54:19 jim
RFC 8284 10:50:48 jim
RFC 5020 10:49:40 jim
RFC 2589 10:48:38 jim
RFC 2247 10:47:05 jim
RFC 6109 10:46:03 jim
RFC 7612 10:44:30 jim
RFC 3712 10:43:43 jim
RFC 4403 10:41:33 jim
RFC 7532 10:39:49 jim
RFC 2293 10:38:29 jim
RFC 2739 10:37:22 jim
RFC 2164 10:35:57 jim
RFC 4104 10:34:52 jim
1.3.6.1.4.1.1466.115.121.1.4 09:32:05 jim
0.9.2342.19200300.100.1.55 09:21:13 jim
1.3.6.1.4.1.1466.115.121.1.20 09:12:06 jim
DSE Type 09:10:18 jim
Attribute Type Description 08:57:24 jim
1.3.6.1.4.1.1466.115.121.1.1 08:54:30 jim
ACI Item 08:53:58 jim
ACI 08:53:17 jim
Microsoft Active Directory Syntax 08:45:37 jim
Zero 08:42:17 jim
Signed int 08:38:28 jim
ADSTYPE_DN_WITH_BINARY 08:29:12 jim
2.5.5.15 08:26:13 jim
ADSTYPE_NT_SECURITY_DESCRIPTOR 08:24:16 jim
1.2.840.113556.1.4.907 08:24:07 jim
ADSTYPE_BOOLEAN 08:17:58 jim
ADSTYPE_OCTET_STRING 08:16:29 jim
SID string 08:14:27 jim
Security Identifier 08:11:33 jim
15.04.2018
SDDL 20:09:32 jim
NT-Sec-Desc 20:09:12 jim
ABNF 20:07:08 jim
RFC 5234 20:06:38 jim
Security Descriptor Description Language 20:04:46 jim
Security Descriptor 20:01:46 jim
2.5.5.14 19:46:26 jim
2.5.5.13 19:45:05 jim
2.5.5.12 19:43:29 jim
2.5.5.10 19:41:02 jim
ADSTYPE_INTEGER 19:39:14 jim
Enumeration syntax 19:38:56 jim
2.5.5.8 19:37:30 jim
2.5.5.7 19:32:58 jim
2.5.5.6 19:27:42 jim
2.5.5.5 19:24:24 jim
Telex 19:22:30 jim
2.5.5.2 19:21:15 jim
MSADTS 19:16:46 jim
Microsoft Active Directory Technical Specification 19:16:29 jim
2.5.5.3 19:14:26 jim
2.5.5.11 19:13:53 jim
ADSTYPE_CASE_EXACT_STRING 19:07:39 jim
1.2.840.113556.1.4.905 19:03:36 jim
UTCTime 18:57:13 jim
Decision Tree 18:35:07 jim
Machine Learning Algorithms 18:33:21 jim
Naive Bayes 18:28:12 jim
Training dataset 18:27:41 jim
GeneralizedTime 17:34:09 jim
Presentation Address 17:32:24 jim
ADSTYPE_LARGE_INTEGER 17:26:43 jim
VisibleString 12:59:31 jim
VideotexString 12:59:17 jim
UTF8String 12:59:09 jim
UniversalString 12:58:59 jim
TeletexString 12:58:51 jim
SYNTAX 12:57:28 jim Printable String ==> PrintableString
Telephone Number LDAP Syntax 12:57:28 jim Printable String ==> PrintableString
CaseExactMatch 12:57:27 jim Printable String ==> PrintableString
CaseExactOrderingMatch 12:57:27 jim Printable String ==> PrintableString
CaseExactSubstringsMatch 12:57:27 jim Printable String ==> PrintableString
PrintableString 12:57:27 jim Printable String ==> PrintableString
Supertype 12:56:48 jim IA5 String ==> IA5String
DNSName 12:56:47 jim IA5 String ==> IA5String
GraphicString 12:56:13 jim
GeneralString 12:56:05 jim
BMPString 12:55:42 jim
CaseIgnoreString 12:53:44 jim Directory String ==> DirectoryString
Directory (Case Ignore) String 12:53:44 jim Directory String ==> DirectoryString
NickName 12:53:44 jim Directory String ==> DirectoryString
SupportedSASLMechanisms 12:53:44 jim Directory String ==> DirectoryString
1.3.6.1.4.1.1466.115.121.1.15 12:53:43 jim Directory String ==> DirectoryString
DirectoryString 12:53:43 jim Directory String ==> DirectoryString
ADSTYPE_NUMERIC_STRING 12:52:09 jim Numeric String ==> NumericString
Object Class Description 12:52:09 jim Numeric String ==> NumericString
1.3.6.1.4.1.1466.115.121.1.36 12:52:08 jim Numeric String ==> NumericString
NumericString 12:52:08 jim Numeric String ==> NumericString
Component Matching Rules 12:48:41 jim
RFC 3687 12:38:28 jim
LDAP String Matching 12:37:23 jim
CaseExactString 12:21:26 jim
ADSTYPE_DN_WITH_STRING 12:04:36 jim
ADSTYPE_CASE_IGNORE_STRING 12:04:06 jim
ADSTYPE_DN_STRING 12:03:39 jim
ADSTYPE_UTC_TIME 12:02:22 jim
ADsType 12:01:58 jim
2.5.5.4 12:00:53 jim
DNWithString 11:54:34 jim
1.2.840.113556.1.4.904 11:52:04 jim
1.2.840.113556.1.4.1221 10:16:45 jim
1.2.840.113556.1.4.903 10:16:11 jim
Draft-armijo-ldap-syntax-00 10:13:14 jim
DNWithOctetString 10:11:50 jim
LDAP_MATCHING_RULE_DN_WITH_DATA 10:09:23 jim DN-Binary ==> DNWithOctetString
1.2.840.113556.1.4.1362 10:02:15 jim
OID Syntax 09:56:22 jim
1.3.6.1.4.1.1466.115.121.1.38 09:51:29 jim
Replica Link 09:32:30 jim
1.3.6.1.4.1.1466.115.121.1.43 09:26:42 jim
Interval Syntax 08:47:12 jim
OctetString 08:28:12 jim
1.3.6.1.4.1.1466.115.121.1.40 08:26:24 jim
System-Id-Guid 08:17:27 jim
1.2.840.113556 08:15:02 jim
Country-Code 08:10:20 jim
14.04.2018
International Standard Recording Code 10:55:56 jim
ISO 4217 10:51:10 jim
Currency Code 10:48:18 jim
ISO 3166-1 alpha-2 10:34:17 jim
Data Country Codes 10:16:57 jim
CountryName 10:15:41 jim
Co 10:14:52 jim
FriendlyCountryName 10:13:23 jim
Language 09:59:07 jim
CountryCode 09:49:08 jim
1.2.840.113556.1.4.25 09:09:25 jim
Web Blog_blogentry_140418_1 09:00:32 jim
13.04.2018
ETH 10:39:31 jim
Compare Request 09:27:30 jim
Modify DN Response 09:24:25 jim
ModifyDNRequest 09:21:58 jim
Delete Response 09:20:50 jim
Delete Request 09:16:08 jim
LDAP Result 09:14:08 jim
Add Response 09:13:28 jim
Add Request 09:09:32 jim
Modify Response 09:08:36 jim
Modify Request 09:06:44 jim
SearchResultDone 09:05:32 jim
SearchResultEntry 09:03:17 jim
SearchRequest 09:01:30 jim
Unbind Request 09:00:32 jim
Bind Request 08:58:35 jim
Bind Response 08:58:16 jim
Distributed Ledger Technology 08:32:43 jim
Ethereum 08:24:59 jim
Ether 08:16:15 jim
Nakamoto consensus 08:12:19 jim
Web Blog_blogentry_130418_1 07:59:20 jim
SSI 07:42:46 jim
12.04.2018
Legitimacy of Social Login 16:33:00 jim
Cloud Identity Providers 16:21:31 jim
Web Blog_blogentry_090418_1 16:07:57 jim
Google OpenID Connect 14:45:24 jim
Include_granted_scopes 14:36:25 jim
Active Directory and Passwords 10:12:17 jim
Decentralized Exchange 09:54:48 jim
Perspectives Project 09:51:18 jim
EFF 09:48:27 jim
Free Software Foundation 09:47:35 jim
Electronic Frontier Foundation 09:47:20 jim
Intellectual Property 09:46:52 jim
Digital Rights Management 09:45:09 jim
Digital Asset 09:42:02 jim
Web Blog_blogentry_120418_1 09:28:07 jim
Containerization 09:18:12 jim
Network devices 09:16:41 jim
Data Center 09:16:20 jim
Host 09:15:27 jim
Container Orchestration 09:12:34 jim
Operating-system-level virtualization 08:56:40 jim
Docker 08:55:58 jim
Virtual Machine 08:46:44 jim
Virtualization method 08:41:17 jim
Container 08:35:51 jim
Ephemeral 08:34:54 jim
Functions as a Service 08:33:25 jim
Computing Service 08:30:47 jim
Platform as a Service 08:30:18 jim
Software as a Service 08:27:37 jim
Infrastructure as a Service 08:26:22 jim
Password Management 07:52:06 jim
PWFILTER Windows Events 07:49:10 jim
AD Driver version 4.0.0.4 07:46:43 jim
AD Password Filters 07:46:00 jim
11.04.2018
Extract Transform Load 18:09:20 jim
NetworkAddress 15:33:03 jim
Bug 15:27:59 jim
Product Backlog 15:25:33 jim
Backlog 15:23:32 jim
Iteration Planning 15:22:00 jim
Sprint Backlog 15:16:26 jim
Iteration Backlog 15:11:49 jim
Product Owner 14:06:02 jim
Delivery Team 14:02:42 jim
Scrum Team 13:59:56 jim
Development Team 13:46:22 jim
Web Blog_blogentry_090318_1 13:00:24 jim WC3 WebAuthn ==> W3C WebAuthn
WebAuthn 13:00:24 jim WC3 WebAuthn ==> W3C WebAuthn
FIDO Standards 12:59:25 jim
K-Nearest Neighbor 12:49:58 jim
Supervised Learning 12:46:45 jim
KNN 12:45:18 jim
Artificial Intelligence 12:11:45 jim
Cognitive Security 12:08:36 jim
Anomaly Detection 08:29:40 jim
Data-lake 08:23:32 jim
Buzzword 08:20:35 jim
Data mining 08:18:36 jim
Web Blog_blogentry_110418_1 08:06:26 jim
10.04.2018
Centralized Exchange 11:01:51 jim
DEX 10:59:29 jim
Digital Currency Exchange 10:45:28 jim
Fiat Currency 10:14:12 jim
Commodity 10:11:12 jim
Money 10:05:49 jim
Cryptocurrency 09:48:44 jim
Distinguished Names 09:07:05 jim
DistinguishedNameMatch 08:51:07 jim
String Representation of Distinguished Names 08:45:24 jim
09.04.2018
Authentication Context Class 17:08:00 jim
Graded Authentication 16:41:54 jim
Incremental authorization 16:25:18 jim
Network-Auth 16:07:10 jim
Implicit Scopes 16:00:55 jim
Trust Elevation 15:45:24 jim
Event 4625 15:28:56 jim
Event 4624 15:22:20 jim
Active Directory Group Related Searches 15:08:32 jim
08.04.2018
ERC20 21:23:51 jim
Repudiation 20:26:00 jim
Zero-knowledge proof 20:07:36 jim
ZKP 20:04:15 jim
07.04.2018
Common Event Format 13:58:00 jim
ArcSight 13:53:49 jim
CEF 13:52:59 jim
Flat Cleaner 13:24:21 jim
Limber 13:22:47 jim
Change Cache 13:13:32 jim
Translation Processor 12:39:57 jim
Out of Band Requests 12:39:07 jim
Events vs Commands 12:38:35 jim
DirXML Level Three Trace 12:20:09 jim NIDM Trace File Searches ==> DirXML Trace File Searches
Jims Toolbox 12:14:10 jim IDM Toolbox ==> DirXML Toolbox
Single Logout 12:08:03 jim
Logged out 12:07:34 jim
OpenID Connect Back-Channel Logout 12:05:40 jim
Why Use Tokens 12:04:14 jim
SAML V2.0 12:02:32 jim
Remember Me 11:59:01 jim
PostMessage 11:56:57 jim
Response_mode 11:56:37 jim
Check_session_iframe 11:56:02 jim
Logging Out 11:54:39 jim Window.postMessage ==> PostMessage
Single Logout Profile 11:18:41 jim
IDP Metadata 11:17:39 jim
Transport Layer Security 09:54:14 jim
Secure connection 09:43:50 jim
Pre-Shared Key 09:38:43 jim
TLS Session Resumption 08:56:17 jim
06.04.2018
OAuth 2.0 JWT Secured Authorization Request 09:54:14 jim
04.04.2018
Identity Lifecycle Management 10:55:52 jim
Account termination 10:52:54 jim
Logout Mechanism 10:50:30 jim
JSESSIONID 10:44:35 jim
Session 10:42:16 jim
LAG-catalina.out 10:41:42 jim
OpenID Connect Session Management 10:34:05 jim
OpenID Connect Front-Channel Logout 10:33:47 jim
03.04.2018
Round-Trip Time 10:09:25 jim
RTT 10:04:19 jim
Round-trips 10:00:55 jim
Hypermedia As The Engine Of Application State 08:57:28 jim
HTTP PATCH 08:23:10 jim
01.04.2018
Revocation model 08:45:39 jim
OAuth 2.0 Token Introspection 08:41:07 jim
30.03.2018
2.5.18.1 10:43:08 jim
CreateTimestamp 10:42:45 jim
Timeout 10:07:11 jim
Logout Process 09:38:35 jim
What is missing in OAuth 2.0 09:21:06 jim
29.03.2018
DirXML Events and Commands 17:13:54 jim
Translation Processor/tranlation-processor-sub.jpg 17:03:22 jim translation-processor
Schema Mapping Policy 12:37:25 jim
XDS Document 12:32:58 jim
DirXML event 12:15:46 jim
DirXML command 12:11:48 jim
DirXML Engine 12:05:48 jim
Event Transformation Policy Set 12:02:11 jim
Merge operation 11:57:43 jim
DirXML Engine/newfishbonediagram.png 11:07:54 jim newfishbonediagram.png
LDAP 4 10:59:25 jim
X-NDS_NOT_CONTAINER 10:50:06 jim
Leaf 10:49:37 jim
ObjectClass=unknown 10:45:05 jim
Forward Reference 10:00:40 jim
Web Blog_blogentry_290318_1 09:52:47 jim
28.03.2018
MemberQueryURL 14:12:26 jim
MemberQuery 14:12:07 jim
ObjectSID 13:07:05 jim
Impersonation Token 12:51:32 jim
NO_IMPERSONATION_TOKEN 12:50:38 jim
Access Token 12:17:10 jim
Primary Access Token 12:15:00 jim
PrimaryGroupID 11:39:57 jim
1.2.840.113556.1.4.98 11:36:09 jim
RID 11:26:00 jim
Relative IDentifier 11:25:43 jim Relative ID ==> Relative IDentifier
Operating System 10:42:59 jim
Well-known Security Identifiers 10:40:44 jim
27.03.2018
CachedInteractive 17:27:12 jim
RemoteInteractive 17:23:43 jim
Remote Desktop Protocol 17:20:54 jim
RDP 17:18:42 jim
NewCredentials 17:15:20 jim
NetworkCleartext 17:13:24 jim
Unlock-Device 17:10:11 jim
Service-Auth 17:05:30 jim
Batch-Auth 17:03:35 jim
Login ID 14:35:30 jim
Uid 14:35:00 jim
Web Blog_blogentry_270318_1 13:34:22 jim
26.03.2018
Fine Grained Password Policies 15:55:09 jim
PSO 15:52:40 jim
MsDS-PasswordSettings 15:52:01 jim
Group Policy Object 15:49:41 jim Group Policy ==> Group Policy Object
GPO 15:49:16 jim
PwdProperties 15:48:44 jim
Max-Pwd-Age Attribute 15:48:20 jim
Local Security Authority 15:48:02 jim
LAN Manager authentication level 15:47:44 jim
How passwords are used in Windows 15:47:27 jim
Dynamic Access Control 15:46:41 jim
AD Determining Password Expiration 15:46:23 jim
1.2.840.113556.1.4.2023 15:39:36 jim
MsDS-PasswordSettingsPrecedence 15:38:55 jim
MsDS-PSOAppliesTo 15:32:10 jim
1.2.840.113556.1.4.2013 15:25:53 jim
1.2.840.113556.1.4.2014 15:25:33 jim
1.2.840.113556.1.4.2015 15:25:02 jim
1.2.840.113556.1.4.2016 15:24:32 jim
1.2.840.113556.1.4.2017 15:24:13 jim
1.2.840.113556.1.4.2018 15:23:40 jim
1.2.840.113556.1.4.2019 15:23:15 jim
1.2.840.113556.1.4.2020 15:22:42 jim
MsDS-PasswordSettingsContainer 15:19:18 jim
MsDS-LockoutThreshold 15:18:56 jim
MsDS-LockoutDuration 15:16:58 jim
MsDS-LockoutObservationWindow 15:15:08 jim
MsDS-PasswordReversibleEncryptionEnabled 15:12:06 jim
MsDS-PasswordHistoryLength 15:10:02 jim
MsDS-PasswordComplexityEnabled 15:09:26 jim
MsDS-MinimumPasswordLength 15:02:43 jim
1.2.840.113556.1.4.2011 14:58:38 jim
1.2.840.113556.1.4.2012 14:58:07 jim
MsDS-MinimumPasswordAge 14:57:38 jim
MsDS-MaximumPasswordAge 14:53:14 jim
Ms-DS-Password-Settings-Container 13:38:07 jim
Web Blog_blogentry_260318_1 13:33:47 jim
25.03.2018
1.3.6.1.4.1.36733.2.1.1.59 10:32:16 jim
SCIM meta 10:24:28 jim
JOSE Header 10:16:14 jim
Bitcoin block 10:15:22 jim
Header 10:13:15 jim
IPG 10:09:46 jim
Datagram 10:08:50 jim
Packet switching 09:56:54 jim
Circuit switching 09:54:38 jim
Telephone Circuit 09:42:56 jim
IEEE 802 09:35:22 jim
IEEE 802.25 09:14:35 jim
IEEE 802.24 09:14:29 jim
IEEE 802.23 09:14:24 jim
IEEE 802.22 09:14:20 jim
IEEE 802.21 09:14:16 jim
IEEE 802.20 09:14:11 jim
IEEE 802.19 09:14:06 jim
IEEE 802.18 09:14:01 jim
IEEE 802.17 09:13:57 jim
IEEE 802.16.2 09:13:53 jim
IEEE 802.16.1 09:13:48 jim
IEEE 802.16 09:13:44 jim
IEEE 802.15.7 09:13:36 jim
IEEE 802.15.6 09:13:32 jim
IEEE 802.15.5 09:13:09 jim
IEEE 802.15.4 09:12:24 jim
IEEE 802.15.3 09:10:40 jim
IEEE 802.15.2 09:10:33 jim
IEEE 802.15 09:10:25 jim
IEEE 802.13 09:10:04 jim
IEEE 802.14 09:09:53 jim
IEEE 802.12 09:09:41 jim
IEEE 802.10 09:09:32 jim
IEEE 802.9 09:09:22 jim
IEEE 802.8 09:08:55 jim
IEEE 802.7 09:08:45 jim
IEEE 802.4 09:08:30 jim
IEEE 802.2 09:06:50 jim
Logical Link Control 09:06:01 jim
IEEE 802.5 09:04:16 jim
Metropolitan Area Network 09:03:01 jim
Data-link Layer 08:47:41 jim
Bridge 08:43:41 jim
Distributed-Queue Dual-Bus 08:33:19 jim
DQDB 08:30:07 jim
24.03.2018
IEEE 802.6 22:42:47 jim
Wide Area Network 22:39:38 jim
MAN 22:39:23 jim
Token Ring 22:31:47 jim
Network Switches 20:19:47 jim
Network Repeater 14:30:52 jim
Network hub 14:28:55 jim
Routing 13:50:12 jim Bridges ==> Bridge
IEEE 802.1 13:50:11 jim Bridges ==> Bridge
IEEE 802.1Q 13:50:11 jim Bridges ==> Bridge
Node 13:43:05 jim
Gateway 13:42:06 jim
Router 13:40:29 jim
IDM Related Compliance Items 09:15:36 jim
Novell Access Manager 09:12:08 jim
NT LAN Manager 09:03:07 jim
Ping Identity 08:59:56 jim
X.500 08:56:04 jim
Identity Aware Proxy 08:51:01 jim
GCP Virtual Private Cloud 08:50:10 jim
Transparent Proxy 08:49:15 jim
Nevis Security Suite 08:48:53 jim
Managed Security Service Provider 08:48:25 jim
Firewall 08:47:44 jim
23.03.2018
Geocast 13:35:22 jim
Anycast 13:32:47 jim
Broadcast 13:31:44 jim
Virtual LAN 13:14:55 jim
Bridging 13:14:16 jim
Wireless LAN 13:06:48 jim
IEEE 802.1X 13:06:07 jim
RFC 2284 13:03:01 jim
Extensible Authentication Protocol 13:00:39 jim
RFC 3748 12:55:20 jim
Authentication Mechanism 12:53:34 jim
Authentication Method 12:53:09 jim
EAP 12:50:24 jim
RFC 5247 12:50:04 jim
Authentication, Authorization and Accounting (AAA) Transport Profile 12:44:58 jim
RFC 3539 12:42:18 jim
RFC 4960 11:22:43 jim
Stream Control Transmission Protocol 11:22:03 jim
SCTP 11:18:43 jim
DIAMETER 11:17:04 jim
Protocol 11:15:00 jim Diameter (protocol) ==> DIAMETER
Internet Layer 10:27:48 jim
Link Layer 10:26:59 jim
Application Layer 10:25:50 jim
Session Layer 10:25:35 jim
Transport Layer 10:25:24 jim
Network Layer 10:25:12 jim
Physical Layer 10:23:58 jim
Presentation Layer 10:17:21 jim
Password Authentication Protocol 10:11:13 jim
PPP 10:10:42 jim
Octal 10:04:45 jim
Octet 10:02:08 jim
Content-Length 10:01:02 jim Octets ==> Octet
ES256 10:01:02 jim Octets ==> Octet
Time-Division Multiplex 09:55:00 jim
TDM 09:54:30 jim
TDMA 09:54:04 jim
Time-Division Multiple Access 09:53:38 jim
SDH 09:40:10 jim
Synchronous Digital Hierarchy 09:39:53 jim
Synchronous Optical NETworking 09:35:45 jim
SONET 09:29:13 jim
3G 09:23:54 jim
4G 09:19:28 jim
InterPacket Gap 09:11:42 jim
InterFrame Gap 09:11:02 jim
IFG 09:10:38 jim
BCP 62 08:58:25 jim
Automatic Repeat-reQuest 08:57:04 jim
ARQ 08:55:10 jim
Packet segmentation 08:51:56 jim
Segment 08:44:43 jim
User Application Clustering 08:37:56 jim
VLAN 08:30:29 jim
Trust Inferer 08:28:59 jim
Access Proxy 08:28:45 jim
Resource Inventory Service 08:28:21 jim
22.03.2018
Adaptive Policy-based Access Management 16:39:10 jim
Lattice Based Access Control 16:33:08 jim
Contextual Attributes 16:24:02 jim
Data State 13:22:04 jim
Data Metadata 13:21:53 jim
Application Attributes 13:20:09 jim
Network Attributes 13:19:09 jim
Resource Action 13:18:57 jim
Geolocation Attributes 13:18:02 jim
Organizational Attributes 13:12:35 jim
Data Origin 11:55:52 jim
REL 11:28:02 jim
Rights Expression Language 11:27:08 jim
Metadata 11:11:35 jim
ABAC 10:44:39 jim
Subject Attributes 10:29:43 jim
RBAC vs ABAC 10:28:54 jim
Operating System Attributes 10:19:11 jim
Context Based Access Control 10:08:57 jim
21.03.2018
OAuth Client 10:30:20 jim
Covert Redirect Vulnerability 09:40:55 jim
Unvalidated redirects and forwards 09:40:25 jim
OAuth 2.0 Security-Closing Open Redirectors in OAuth 09:17:37 jim
HTTP Referer 09:04:41 jim
HTTP Request Header 08:56:08 jim
Open redirect 08:48:49 jim
Covert Redirect 08:48:15 jim
20.03.2018
W3C Credential Management API 15:58:46 jim
Content-Security-Policy 14:24:35 jim
Cross-site scripting 14:22:07 jim
Discovery Mechanism 14:02:20 jim
Web Services Dynamic Discovery 14:02:02 jim
Universal Description, Discovery, and Integration 14:01:20 jim
RootDSE 13:55:37 jim
PASSWD_NOTREQD 13:53:17 jim
Processes 13:39:47 jim
Multitasking 13:39:10 jim
LWP 13:38:37 jim
Light-Weight Process 13:38:20 jim
FLUSH+RELOAD 13:29:46 jim
FanOutDriverPlatformReceiverRunModes 13:22:53 jim
System Metrics 13:22:35 jim
Instruction cycle 13:20:55 jim
Internal Metrics 13:20:06 jim
Central Processing Unit 13:18:52 jim
CPU 13:18:03 jim
Windows user 12:54:32 jim
Security Principal Objects 12:53:09 jim
Windows Client 12:50:56 jim
Password Policy 12:27:10 jim
Windows Default Password Policy 12:25:48 jim Windows Server 2003 Default Password Policy ==> Windows Default Password Policy
FGPP 12:24:19 jim
UserAccountControl 11:59:30 jim
User-Account-Control Attribute 11:58:45 jim
Proof-of-Possession Key Semantics for JSON Web Tokens (JWTs) 09:39:01 jim
OAuth 2.0 Proof-of-Possession (PoP) Security Architecture 09:38:46 jim
Login_hint 09:03:27 jim
19.03.2018
EDirectory 9.1.0.0 (40101.29) 12:57:43 jim
EDirectory 9.0.4.0 (40006.33) 12:57:34 jim
EDirectory 9.0.3.1 (40005.13) 12:57:19 jim
Partition 12:21:48 jim
Cn=Partition, cn=Agent, cn=monitor 12:11:13 jim
Cn=Monitor 12:08:47 jim
Monitor Entry 12:07:55 jim
Maximum Ring Delta 12:00:25 jim
EDirectory 9.0.1.0 (40003.37) 11:13:44 jim
EDirectory 9.0.1.1 (40003.38) 11:13:24 jim
EDirectory 9.0.2.2 (40004.44) 11:12:42 jim
Input-constrained device 10:08:22 jim
18.03.2018
Proxy Server 19:38:22 jim Load-Balancing ==> Load Balancing
Query 11:00:19 jim
Graph 10:54:10 jim
Cooperation for Open Systems Interconnection Networking in Europe 10:41:33 jim
Reliable protocol 10:37:56 jim
Unreliable protocol 10:35:55 jim
Hypertext Transfer Protocol 10:33:28 jim
HTML link 10:23:20 jim
HTML Element 10:20:29 jim
Hyperlinks 10:18:56 jim
HTTP Method 10:06:23 jim
Verb 10:05:16 jim
OAuth 2.0 10:03:52 jim
RESTful 10:01:54 jim
Hypermedia 10:00:57 jim
Link 10:00:23 jim
Hypertext 09:59:56 jim
Open Web Application Security Project 09:44:23 jim
Session Management 09:15:33 jim
Proprietary Session Management 08:44:16 jim
Session ID 08:38:49 jim
16.03.2018
API versioning 07:59:42 jim
Web Service 07:53:05 jim
14.03.2018
ACF2 16:39:33 jim
Access Control Facility 16:39:05 jim
Hosted domain 12:03:22 jim
Hd 11:57:32 jim
Openid-configuration 11:42:31 jim
Revocation_endpoint 11:17:32 jim
OAuth 2.0 Token Revocation 11:16:03 jim
Token_type_hint 10:42:39 jim
Revocation Request 10:28:47 jim
OK 10:25:01 jim
Service Unavailable 10:13:08 jim
Retry-After 10:11:39 jim
HTTP 503 10:05:25 jim
11.03.2018
Replication 09:25:37 jim
Master-slave 09:19:40 jim
Multi-master replication 09:18:13 jim
Distributed system 08:58:00 jim
Decentralised system 08:52:09 jim
Eventual consistency 08:36:05 jim
Distributed Data Store 08:34:17 jim
Consensus 08:32:49 jim
Consistency 08:28:21 jim
10.03.2018
Year 11:11:30 jim
BCE 11:05:42 jim
YYYY 11:02:38 jim
Year 1917 11:01:52 jim
TAD 11:01:16 jim
Thinking About Today 11:00:55 jim
Web Blog_blogentry_100318_1 10:59:09 jim
LDIF Sort Tools 09:29:32 jim
LDAP Tools From Others 09:19:58 jim
09.03.2018
Policy 10:11:23 jim
Identity Management Architecture 10:03:32 jim
Identity Governance and Administration 09:58:40 jim
IGA 09:57:10 jim
BeyondCorp 09:25:36 jim
Authentication cookie 09:17:38 jim
08.03.2018
Stateless 14:59:01 jim
Null style 14:31:46 jim
Constraint 14:25:36 jim
OpenID Connect Discovery 10:40:54 jim
Request_uri_parameter_supported 10:24:39 jim
Response_modes_supported 10:21:01 jim
Frontchannel_logout_session_supported 09:59:22 jim
Frontchannel_logout_supported 09:56:57 jim
End_session_endpoint 09:13:38 jim
06.03.2018
IANA Registry 10:38:28 jim
Center for Applied Internet Data Analysis 10:07:12 jim
CAIDA 10:06:40 jim
IP spoofing 10:02:09 jim
EdirectorySizingHardware 09:53:25 jim
Application Shell Architecture 09:50:59 jim
Secret Files 09:49:34 jim
ISP 09:46:37 jim
Internet Service Providers 09:46:11 jim
GGC 09:45:47 jim
BCP 36 09:39:47 jim
Spoofing Attack 09:34:32 jim
Least Recently Used 09:27:14 jim
Cache 09:26:34 jim
Cache replacement algorithms 09:25:38 jim
LRU 09:23:10 jim
Name Service Cache Daemon 09:20:23 jim
NSCD 09:19:27 jim
Queue 09:16:14 jim
Memcached 09:11:49 jim
05.03.2018
Ripple Company 10:16:44 jim
Ripple Transaction Protocol 10:07:46 jim
04.03.2018
Retry 11:33:02 jim
Fatal 11:31:18 jim
DirXML Status Events 11:30:31 jim
Warning 11:29:10 jim
HTTP Warn Codes 11:28:48 jim
RFC 7234 11:15:59 jim
Page Cache 10:52:56 jim
Cache-Control 10:51:59 jim
HTTP Cache Directive 10:48:08 jim
URI Fragment Identifiers 10:19:36 jim
Uniform Resource Identifier 10:15:20 jim
Form Post Response Mode 10:13:51 jim
Fragment Response Mode 09:59:33 jim
Identity Token 09:05:28 jim
03.03.2018
Identity Proofing 12:13:56 jim
Internet Security Glossary 12:12:49 jim
Registration 12:08:58 jim
Enrollment 12:04:48 jim
Credential Enrollment 11:59:00 jim
User Provisioning 11:27:06 jim
Authentication Channel 11:18:56 jim
Message Authentication 10:28:33 jim
Entity Authentication 10:04:04 jim
Explicit Endpoint 09:23:58 jim
02.03.2018
RFC 6819 21:36:46 jim
P-256 20:29:53 jim
Digital Signature Standard 20:29:11 jim
Elliptic Curve Digital Signature Algorithm 20:25:15 jim
MGF 17:51:49 jim
Mask Generation Function 17:51:34 jim
MGF1 17:49:52 jim
RSASSA-PSS 17:46:58 jim
PS256 17:43:19 jim
Response Type 17:31:46 jim
OAuth 2.0 Multiple Response Type Encoding Practices 17:24:34 jim
Authorization Code Flow 16:59:36 jim
S_hash 11:05:53 jim
Identity Token Validation 10:53:27 jim
At_hash 10:44:51 jim
Access Token Validation 10:43:09 jim
RS256 10:35:35 jim
Token_endpoint_auth_signing_alg_values_supported 10:26:49 jim
Wildcard Certificates 10:05:16 jim
28.02.2018
OAuth Scopes 14:03:42 jim
Phone 13:56:00 jim
OpenID Connect Scopes 13:54:27 jim
OpenID Connect Standard Claims 13:44:35 jim
Default Profile Claims 13:40:30 jim
RFC 5646 13:03:17 jim
Openid scope 13:00:07 jim
UserInfo Response 12:32:14 jim
OAuth Scope Validation 12:29:34 jim
Voluntary Claim 12:16:37 jim
Userinfo_endpoint 11:57:03 jim
UserInfo Request 11:41:47 jim
27.02.2018
Validation 21:34:08 jim
Identity Token Claims 21:24:41 jim
Azp 21:16:07 jim
Authorized party 21:15:47 jim
Authorization Response 20:40:11 jim
25.02.2018
Assertion Value 11:34:31 jim
24.02.2018
Contract of Adhesion 10:16:23 jim
Disintermediation 10:08:08 jim
Contract 10:06:46 jim
Web Blog_blogentry_240218_2 09:35:09 jim
23.02.2018
Tax 11:16:20 jim
National Identification Number 11:10:37 jim
Social Security 11:07:43 jim
Medicare 11:05:50 jim
Smart-On-FHIR profile 11:03:36 jim
Tax avoidance 11:02:53 jim
Tax Evasion 11:00:54 jim
Indirect Tax 10:57:12 jim Indirect Taxes ==> Indirect Tax
Payroll Tax 10:57:12 jim Indirect Taxes ==> Indirect Tax
Direct Tax 10:56:56 jim Direct Taxes ==> Direct Tax
United States Federal Agency 10:52:09 jim
SSA 10:47:51 jim
Taxes 10:47:17 jim
Centers for Medicare and Medicaid Services 10:36:31 jim
TANF 10:34:54 jim
Temporary Assistance for Needy Families 10:34:35 jim
Supplemental Security Income 10:32:05 jim
Government Benefit 10:31:19 jim
Social Security Act 10:20:04 jim
Medicaid 10:19:16 jim
Federal Health Care Law 10:13:22 jim
OASDI 10:09:18 jim
Old-Age, Survivors, and Disability Insurance 10:09:02 jim
Year 1935 09:35:50 jim
National Provider Identifier 09:22:39 jim
NPI 09:19:05 jim
Fast Healthcare Interoperability Resources 09:08:31 jim
22.02.2018
Why OpenID Connect 17:47:00 jim
Why OAuth 2.0 17:37:24 jim
Web Blog_blogentry_200615_1 17:37:02 jim
Man-In-The-Middle 12:00:03 jim
Historic 11:57:21 jim
Internet Official Protocol Standards 11:53:24 jim
RFC 2700 11:51:33 jim
RFC 2800 11:45:37 jim
RFC 2900 11:43:52 jim
RFC 3000 11:43:00 jim
RFC 3300 11:41:12 jim
RFC 3700 11:37:05 jim
RFC 3600 11:36:38 jim
Internet Standard 11:26:09 jim
Bluetooth 11:24:24 jim
Informational 11:22:05 jim
HTTP 100 11:21:21 jim
Draft Standard 11:13:54 jim
Standard 11:13:14 jim
Not All RFCs are Standards 11:11:32 jim
Open Standard 11:06:54 jim
Open Access 11:05:38 jim
Ambiguous 11:01:15 jim
Specification 11:00:02 jim
Special Interest Group 10:57:11 jim
SIG 10:55:07 jim
Web Blog_blogentry_220218_1 10:51:21 jim
SPDY 10:19:25 jim
Hypertext Transfer Protocol Version 2 10:13:41 jim
RFC 7540 10:10:54 jim
RFC 2068 10:09:39 jim
HTTP2 10:08:26 jim
Opportunistic encryption 10:03:36 jim
RFC 8164 10:01:42 jim
RFC 7435 10:00:02 jim
RFC 7345 09:59:19 jim
Opportunistic Security 09:54:08 jim
Opportunistic TLS 09:53:16 jim
RFC 7672 09:44:42 jim
LDAPS 09:42:04 jim
StartTLS 09:38:30 jim
21.02.2018
Clock skew 09:54:47 jim
Nbf 09:52:46 jim
Kerberos Error Codes 09:51:41 jim
Exp 09:50:50 jim
19.02.2018
OAuth Token Request 18:24:03 jim
OAuth Token Response 18:17:53 jim
Authorization Request 17:27:45 jim
Authorization Request Parameters 17:23:32 jim
Authorization Grant 17:14:08 jim
17.02.2018
Logistic Regression 08:47:19 jim
16.02.2018
LDIF Generator 17:21:44 jim
15.02.2018
EditFindAndReplaceHelp 14:22:11 jim
TextFormattingRules 14:20:43 jim
Jim Willeke Resume 13:59:45 jim
Recommended 13:53:55 jim
Biometric data 13:44:46 jim
Business to Employee 13:39:51 jim
AD 13:38:14 jim
WikiName 13:30:23 jim
Image Styles 13:25:52 jim
Haddock Template 13:24:42 jim
Image Styles/woman-face.jpg 13:22:20 jim woman-face.jpg
Image Styles/poppy-small.jpg 13:22:01 jim poppy-small.jpg
Image Styles/haddock.jpg 13:21:36 jim haddock.jpg
Image Styles/bear-big.jpg 13:21:09 jim bear-big.jpg
Pic/net.png 13:01:15 jim net.png
Pic/yahoo.png 12:38:37 jim yahoo.png
Pic/blueDot.png 12:34:32 jim blueDot.png
Pic/windows.png 12:31:02 jim windows.png
Pic/xml.png 12:21:33 jim xml.png
Pic/update.png 12:21:11 jim update.png
Pic/tech.png 12:20:55 jim tech.png
Pic/smile.png 12:19:52 jim smile.png
Pic/rss.png 12:09:44 jim rss.png
Pic/rdf.png 12:09:13 jim rdf.png
Pic/phone.png 12:08:51 jim phone.png
Pic/personal.png 12:08:34 jim personal.png
Pic/perl.png 12:08:15 jim perl.png
Pic/people.png 12:07:48 jim people.png
Pic/pdf.png 12:07:26 jim pdf.png
Pic/paperclip_xsm.png 12:07:09 jim paperclip_xsm.png
Pic/paperclip_sm.png 12:06:52 jim paperclip_sm.png
Pic/note.png 12:05:36 jim note.png
Pic/news.png 12:04:54 jim news.png
Pic/new.png 12:04:36 jim new.png
Pic/music.png 12:04:03 jim music.png
Pic/movies.png 12:03:41 jim movies.png
Pic/mail.png 12:03:20 jim mail.png
Pic/mac.png 12:02:40 jim mac.png
Pic/linux.png 12:02:23 jim linux.png
Pic/java.png 12:02:01 jim java.png
Pic/grouchy.png 12:01:38 jim grouchy.png
Pic/downGreenArrow.png 11:46:55 jim downGreenArrow.png
Pic/dev.png 11:46:35 jim dev.png
Pic/computer.png 11:46:10 jim computer.png
Pic/cb_on.png 11:45:45 jim cb_on.png
Pic/books.png 11:41:43 jim books.png
Pic/cb_off.png 11:41:19 jim cb_off.png
Pic/INFO.jpg 11:40:27 jim INFO.jpg
WikiVariables 11:28:51 jim
SystemInfo 11:09:12 jim
SearchPageHelp 11:03:08 jim
SandBox 11:01:34 jim
RecentChanges 10:57:40 jim
PageAlias 10:53:54 jim
OneMinuteWiki 10:50:54 jim
JSPWiki-2.10.3 10:50:03 jim
Community 10:44:55 jim
LoginHelp 10:30:09 jim
InstallationTips 10:25:03 jim
EditPageHelp 10:18:22 jim
14.02.2018
Web Blog_blogentry_140218_1 10:10:47 jim
08.02.2018
Amazon Simple Storage Service 12:31:33 jim
07.02.2018
LDAP Descriptor 12:34:42 jim
Attribute-Names 12:29:28 jim
ObjectClasses 12:27:25 jim
Matching Rule Use Description 11:16:17 jim
Matching Rule Description 11:15:43 jim
DIT Structure Rule Description 11:14:50 jim
ObjectIdentifierFirstComponentMatch 10:54:56 jim
2.5.21.7 10:46:48 jim
NameForms 10:46:19 jim
1.3.6.1.4.1.1466.115.121.1.17 10:37:40 jim
DITStructureRules 10:37:22 jim
2.5.21.1 10:34:51 jim
2.5.20.1 10:25:29 jim
Apache Hadoop 09:47:27 jim
05.02.2018
Paxos Protocol 13:55:41 jim
Distributed Consensus 13:51:17 jim
Chubby Lock Service 13:51:06 jim
Reliable Asynchronous Event Transport 12:05:55 jim
RAET 12:04:37 jim
Federated Byzantine Agreement 11:40:42 jim
Stellar Consensus Protocol 11:40:11 jim
Ripple Consensus Protocol Algorithm 11:32:00 jim
Proof-of-Stake 11:23:56 jim
PoW 11:03:15 jim
Proof-of-Work 11:02:48 jim
PBFT 10:53:28 jim
RBFT 10:50:05 jim
Web Blog_blogentry_050218_1 10:45:09 jim
Model 10:12:27 jim
04.02.2018
Linux Foundation 09:27:44 jim
Hyperledger 09:17:28 jim
02.02.2018
MiTM 10:07:24 jim
HTTPS Inspection 09:59:49 jim
TLS Proxy 09:50:39 jim
HTTPS Interception 09:45:57 jim
HTTPS Interception Weakens TLS Security 09:45:19 jim
Legal TLS Interception 09:34:56 jim
Web Blog_blogentry_271215_1 09:32:12 jim
Certificate Validation Tools 09:31:43 jim
RFC 5246 09:22:54 jim
24.01.2018
IDN 09:26:29 jim
URIs, URLs, and URNs 09:15:06 jim
BCP 190 08:55:07 jim
BCP 212 08:54:38 jim
Best Current Practice 08:52:48 jim
21.01.2018
Digital Subject 09:19:11 jim
17.01.2018
Authorization API 14:41:52 jim UMA ImplementerS Guide ==> UMA Implementer Guide
Protection API 14:41:52 jim UMA ImplementerS Guide ==> UMA Implementer Guide
UMA Implementer Guide 14:41:52 jim UMA ImplementerS Guide ==> UMA Implementer Guide
12.01.2018
Java Card 08:59:09 jim
10.01.2018
2.5.13.1 10:10:16 jim
Identity Function 08:55:46 jim
08.01.2018
DTD 09:42:43 jim
Document type definition 09:42:15 jim
XML Schema Definition Language 09:36:40 jim
XSD 09:36:18 jim
XML schema 09:32:59 jim
Extensible Resource Descriptor 09:25:41 jim
XRD 09:24:11 jim
Host-meta 09:17:51 jim
LRDD 09:17:21 jim
Link-based Resource Descriptor Documents 09:17:03 jim
Web host-meta data 09:05:10 jim Web Host Metadata ==> Web host-meta data
07.01.2018
Doc Searls 10:51:16 jim
Harvard University 10:42:51 jim
Berkman Center for Internet & Society 10:41:42 jim
ProjectVRM 10:37:05 jim
Kinit 10:33:45 jim
RSA 10:30:54 jim
FreeIPA 10:30:34 jim
Year 1861 10:29:57 jim
MIT 10:29:29 jim
Massachusetts Institute of Technology 10:29:14 jim
Kerberos 10:26:57 jim
OPAL 10:22:44 jim
Open Algorithm 10:22:03 jim
OPAL Project 10:21:46 jim
OpenPDS 10:14:43 jim
CoreID 10:08:54 jim
MIT TRUST DATA CONSORTIUM 09:57:33 jim
MIT Internet Trust Consortium 09:55:17 jim
MITREid Connect 09:48:44 jim
MITRE Corporation 09:44:17 jim
05.01.2018
MAD Determine the Classes Associated With an Entry 14:16:59 jim
1.2.840.113556.1.5.6 14:14:58 jim
SecurityPrincipal 14:14:28 jim
1.2.840.113556.1.4.221 13:56:22 jim
04.01.2018
Cash 22:55:27 jim
Curity 22:31:15 jim
Customer Identification Program 17:07:25 jim
Know Your Customer 17:06:04 jim
Block 11:12:18 jim
Pay To Script Hash 11:02:39 jim
P2SH 11:00:05 jim
Pay-To-Public-Key-Hash 10:58:32 jim
P2PKH 10:57:33 jim
Bitcoin address 10:49:03 jim
Target Resource 09:49:38 jim
Protected Resource 09:48:07 jim
Email 09:43:53 jim
Simple Mail Transfer Protocol 09:43:11 jim
Telecommunications 09:40:27 jim
Permissionless System 09:04:44 jim
03.01.2018
Zcash 20:00:47 jim
Monero 19:48:27 jim
Best Practices For Unique Identifiers 16:09:16 jim
Machine Learning Taxonomy 15:58:07 jim
Feedforward Neural network 15:56:44 jim
Mapping function 15:55:12 jim
Features 15:52:47 jim
Dependent variables 15:49:37 jim
Independent variable 15:49:06 jim
Linear Regression 15:48:15 jim
Regression Trees 15:43:57 jim
Regression analysis 15:41:22 jim
Regression 15:40:56 jim
Least Absolute Shrinkage and Selection Operator 15:31:11 jim
RSS 15:30:25 jim
Sum of Squared Errors 15:29:56 jim
Residual Sum of Squares 15:29:15 jim
LASSO 15:24:38 jim
Regularization 15:24:02 jim
Ordinary Least Squares 15:23:25 jim
Ridge Regression 15:17:47 jim
Dropout Regularization 15:11:06 jim
Hyperparameters 14:40:17 jim
02.01.2018
Perceptron 15:21:48 jim
Perceptron/perceptron.jpg 15:20:30 jim
ACH 14:53:28 jim
Federal Reserve Wire Network 14:41:32 jim
Machine Learning 13:31:36 jim
Feature detection 13:27:32 jim
Lowercase 13:22:44 jim
UPPERCASE 13:22:31 jim
Case-sensitive 13:22:18 jim
Cluster analysis 13:15:14 jim
Stimulus-Response 13:13:54 jim
Ground truth 13:13:25 jim
Reinforcement learning 13:12:06 jim
Classification Trees 12:54:47 jim
Supervised Learning/Supervised Learning.png 12:38:24 jim
Unsupervised Learning 12:23:38 jim
Regularization/l2-term.png 11:59:52 jim
Overfitting 11:36:41 jim
Cost function 11:35:05 jim
Learning 10:23:34 jim
Inductive Learning 10:22:43 jim
Evidence 10:21:57 jim
Episodic Learning 10:21:23 jim
Machine Learning model 10:06:40 jim
Variance error 10:02:57 jim
Bias error 10:02:21 jim
Hidden layer 09:44:44 jim
Input layer 09:43:36 jim
Output node 09:40:37 jim
Loss function 09:38:24 jim
Underfitting 09:35:31 jim
Target Function 09:33:40 jim
01.01.2018
Scalar 09:58:04 jim
Backpropagation 09:13:41 jim
Algorithm 09:08:14 jim
31.12.2017
JSON Resource Descriptor 21:20:35 jim
Classification and Regression Trees 11:43:13 jim
Classification and Regression Trees/Example-Decision-Tree.png 11:36:22 jim
CART 11:19:37 jim
Web Blog_blogentry_311217_1 11:11:22 jim
28.12.2017
Probabilistic Neural Network 14:01:53 jim
Classification 13:34:52 jim
Artificial Neural network 13:22:50 jim
Gradient descent 11:30:37 jim
Pseudorandom function 11:26:17 jim
Sigmoid function 11:23:46 jim
Exponential function 11:21:33 jim
Logistic function 11:18:28 jim
Eigenvector 11:06:53 jim
27.12.2017
Matrix multiplication 12:37:19 jim
Matrix multiplication/vector-multiplication.png 12:32:37 jim
Linear transformation 12:28:38 jim
Matrix 12:23:21 jim
Vector 12:08:04 jim
Unitary matrix 12:06:52 jim
Basis vectors 12:03:36 jim
Identity matrix 11:59:10 jim
Identity matrix/identity-matrix.png 11:53:35 jim identity-matrix
Matrices 11:48:00 jim
Array 11:45:32 jim
Matrix/Matrix.svg.png 11:37:40 jim Matrix
26.12.2017
Loss function/Screen Shot 2017-12-26 at 06.51.34.png 11:52:31 jim Loss Function
Cost function/Screen Shot 2017-12-26 at 06.17.00.png 11:17:46 jim Cost Function
Mean Squared Error 10:58:59 jim
Mean Squared Error/Screen Shot 2017-12-26 at 05.56.09.png 10:57:02 jim MSE
Input neuron 10:27:11 jim
Convolutional Neural Network 10:25:56 jim
Sigmoid neuron 10:20:02 jim
MLP 10:13:04 jim
Activation Function 10:11:33 jim
25.12.2017
Double Ratchet Algorithm 08:49:41 jim
Password-Based Key Derivation Function 08:48:32 jim
PKCS5 08:48:01 jim
PBKDF2 08:47:37 jim
KDF 08:46:29 jim
Web Blog_blogentry_251217_1 08:42:20 jim
24.12.2017
BTF 12:07:31 jim
Bitcoin Faith 12:07:11 jim
Bitcoin Gold 12:01:49 jim
Bitcoin 11:56:52 jim
BCD 11:53:53 jim
Bitcoin Diamond 11:49:15 jim
BCH 11:40:18 jim
Bitcoin Cash 11:39:59 jim
BTG 11:39:20 jim
BTC 11:38:33 jim
Consent Receipts 09:59:52 jim
Consent 09:01:03 jim
23.12.2017
Funds Transfer System 16:11:40 jim
Society for Worldwide Interbank Financial Telecommunication 16:09:20 jim
Payment Network 16:04:41 jim
CHIPS 16:01:22 jim
Fedwire 15:47:16 jim
Federal Reserve 15:40:20 jim
FedACH 15:30:44 jim
EPN 15:27:56 jim
Savings Account 15:04:22 jim
FOMC 14:09:20 jim
National Bank 14:05:51 jim
Federal Open Market Committee 13:58:15 jim
FRB 13:52:26 jim
FDIC 13:40:21 jim
National Bank Act 13:38:54 jim
OCC 10:35:38 jim
Web Blog_blogentry_231217_1 10:31:25 jim
Third-party Risk 10:24:55 jim
21.12.2017
USCB 15:10:52 jim
United States Census Bureau 15:10:28 jim
Electoral College 15:08:56 jim
Consumer Credit Reporting Agency 14:56:39 jim
Experian 14:50:47 jim
Web Blog_blogentry_211217_1 14:48:19 jim
CA-Browser Forum 10:52:02 jim
Certification Authority Browser Forum 10:50:36 jim
20.12.2017
Protection API Token 19:31:07 jim
Grant Types 10:24:35 jim
Sociality 10:13:24 jim
JSPWiki Community 10:08:40 jim
Partner API 10:07:33 jim
Sovereignty 10:06:43 jim
Currency 09:49:32 jim
Central Banking System 09:41:34 jim
FED 09:38:09 jim
Routing Transit Number 09:33:17 jim
Federal Reserve Act 09:31:42 jim
Year 1913 09:19:48 jim
Future Prediction 09:06:24 jim
SAE International Levels of Driving Automation 08:57:00 jim
Autonomous Automobile 08:53:27 jim
Web Blog_blogentry_201217_1 08:49:48 jim SAE InternationalS Levels of Driving Automation ==> SAE International Levels of Driving Automation
Web Blog_blogentry_111017_1 08:25:16 jim
19.12.2017
Subscriber Identification Module 12:32:45 jim
Mobile Station International Subscriber Directory Number 12:03:20 jim
International Mobile Subscriber Identity 12:01:07 jim
Digital Subscriber Line 11:51:06 jim
Telephone Line 11:46:17 jim
Phone Number 11:43:35 jim
NDC 11:39:57 jim
PBX 11:38:49 jim
Private Branch Exchange 11:38:29 jim
Subscriber Number 11:37:49 jim
National Destination Code 11:37:18 jim
Telephone Numbering Plan 11:36:06 jim
Mobile Network Code 11:12:21 jim
Integrated Circuit Card Identifier 11:07:48 jim
Account Number 11:01:57 jim
ROC 09:58:03 jim
PRC 09:57:35 jim
China 09:56:57 jim
India 09:55:40 jim
Issuer Identification Number 09:54:02 jim
Operation Aurora 09:53:28 jim
Collapsible List 09:44:22 jim
Group of 20 09:40:21 jim
Aadhaar 09:39:03 jim
Web Blog_blogentry_191217_1 09:26:52 jim
18.12.2017
KuppingerCole 11:59:06 jim
Martin Kuppinger 11:57:05 jim
Groupthink 09:53:51 jim
Groupthink/1200-608292-the-psychological-phenomenon-of-groupthink.jpg 09:53:14 jim groupthink
Bias 09:50:58 jim
Psychological phenomenon 09:48:09 jim
Web Blog_blogentry_181217_1 09:36:12 jim
CEO 09:30:00 jim
Alphabet Inc 09:29:22 jim
American 09:24:49 jim
Google X 09:23:15 jim
Verily 09:21:22 jim
Waymo 09:19:27 jim
Google 09:11:15 jim
AppConfig Community 09:05:08 jim
De-anonymization 08:34:34 jim
17.12.2017
Gemalto 19:25:58 jim
Open Badges 16:08:27 jim
Employer 11:32:56 jim Employers ==> Employer
Administrative Identity 11:31:49 jim
Education 11:30:44 jim
InCommon 11:30:33 jim
Educational Entity 11:28:17 jim
Blockcerts 10:50:39 jim
RTXP 10:33:33 jim
XRP 10:22:15 jim
Permissioned Systems 10:02:48 jim
Certificate Revocation 09:55:05 jim
Cancelable Biometrics 09:52:46 jim
Credential Revocation 09:50:37 jim
Consent Revocation 09:49:34 jim
NIST.SP.800-63B 09:47:04 jim
Smart contracts 09:39:28 jim
Merkle Tree 09:25:21 jim
16.12.2017
LeftMenu 16:23:48 jim
13.12.2017
Implantable Myoelectric Sensor 15:43:32 jim
Web Blog_blogentry_131217_1 15:38:41 jim
Strength of Function for Authenticators - Biometrics 13:25:27 jim
12.12.2017
Liveness Detection 16:09:41 jim
Advanced Persistent Threat 15:47:50 jim
Opportunistic Attack 15:45:22 jim
Targeted Attack 15:43:11 jim
Presentation Attack Detection 15:21:08 jim
Cross-site request forgery 15:19:47 jim
Presentation Attack 15:16:22 jim
Imposter 15:15:11 jim
Strength of Function for Authenticators 15:01:08 jim
11.12.2017
Softmax function 10:18:18 jim
Exponential function/expo-function.jpg 10:16:44 jim expo-function
Logistic function/LogReg_1.png 10:10:14 jim LogisticRegression
Logistic function/Logistic-curve640px.png 10:01:10 jim Logistic-curve640px
Web Blog_blogentry_111217_1 09:07:25 jim
10.12.2017
Rectified Linear Unit 20:18:59 jim
ReLU 17:03:33 jim
09.12.2017
Output layer 20:47:39 jim
Vectors of Trust 19:48:43 jim
Privacy Considerations Distributed Ledger Technology 11:17:19 jim
Anonymous bind 11:08:25 jim
Anonymity Set 11:04:07 jim
Anonymous Identity 11:02:51 jim
Anonymous 11:01:09 jim
RFC 3261 10:58:35 jim
RFC Editor 10:41:19 jim
RFC 4844 10:38:40 jim
RFC Author 10:31:05 jim
STYLE-WEB 10:29:02 jim
RFC Style Guide 10:21:25 jim
RFC 7322 10:12:03 jim
RFC 2223 10:11:30 jim
Guidelines for Writing RFC Text on Security Considerations 10:08:24 jim
RFC 3552 10:05:41 jim
BCP 72 10:02:32 jim
Security Considerations 10:01:31 jim
Key words for use in RFCs to Indicate Requirement Levels 09:52:31 jim
BCP 14 09:45:25 jim
BCP 9 09:44:34 jim
08.12.2017
ApacheDS 12:58:54 jim
LDAP Server Implementations 12:57:38 jim
Apache Fortress 12:56:14 jim
INCITS 359-2012 12:55:13 jim
INCITS 359-2004 12:54:54 jim
INCITS 359 12:54:30 jim
Apache Directory Project 12:42:24 jim
NIST RBAC 12:40:30 jim
INCITS 12:39:21 jim InterNational Committee for Information Technology Standards ==> International Committee for Information Technology Standards
International Committee for Information Technology Standards 12:39:21 jim InterNational Committee for Information Technology Standards ==> International Committee for Information Technology Standards
Solaris 12:26:15 jim
Berkeley Software Distribution 12:24:26 jim
BSD 12:19:16 jim
Determine OS Version 12:18:30 jim
Certificate Version 11:58:00 jim
Server 11:55:26 jim
LdapServer 11:54:48 jim
2.16.840.1.113719.1.6.6.1 11:54:21 jim
2.16.840.1.113719.1.450.6.100 11:54:09 jim
2.16.840.1.113719.1.33.6.1 11:53:40 jim
2.16.840.1.113719.1.27.6.2 11:53:29 jim
2.16.840.1.113719.1.138.6.1.1 11:53:15 jim
2.16.840.1.113719.1.1.6.1.22 11:52:46 jim
2.16.840.1.113719.1.1.4.1.112 11:52:23 jim
Version (LDAP Attribute) 11:51:59 jim Version x (LDAP Attribute) ==> Version (LDAP Attribute)
SEPOS 11:30:55 jim
Java Authentication and Authorization Service 11:19:00 jim
I2C 11:17:37 jim
UART 11:13:37 jim
General-purpose input-output 11:12:53 jim
GPIO 11:10:19 jim
Secure Element 10:53:08 jim
Reliability 10:35:40 jim
Reasoning 10:34:14 jim
Converting Certificate Formats 09:57:34 jim
NIS To LDAP Tool 09:57:06 jim
LDAP Data Interchange Format 09:53:12 jim
Screen Scraping 09:52:56 jim
Data Scraping 09:52:41 jim
Data Extraction Transformation 09:52:13 jim
Web scraping 09:47:28 jim
Web Blog_blogentry_081217_1 09:21:59 jim Screen Scraping ==> Data Scraping
Financial Technology 09:16:05 jim
FinTech 09:14:41 jim
No Market Need 09:09:13 jim
06.12.2017
Artificial Neuron 11:52:01 jim
Synapses 11:48:58 jim
Weight 11:06:51 jim
Forward propagation 10:57:21 jim
Python 10:38:52 jim
Deep Neural networks 10:28:23 jim
Pattern-recognition 10:27:56 jim
Computer vision 10:27:28 jim
Deep Learning 10:26:03 jim
Amazon Web Services 09:54:33 jim
AWS Lambda 09:53:37 jim
AWS Cognito 09:52:32 jim
05.12.2017
NdsHomeDirectory 12:01:07 nanda
02.12.2017
MoreMenu/Mail Administrator.vcf 17:08:12 Mandygrove Null mandyscardino
Gong Needham Yahalom logic 09:27:25 jim
Web Blog_blogentry_021217_1 09:19:24 jim
BAN logic 09:12:00 jim
Burrows Abadi Needham logic 09:11:44 jim Burrows--Abadi--Needham logic ==> Burrows Abadi Needham logic
01.12.2017
Legal Entity Identifier 09:27:03 jim
Permid 09:25:40 jim
Financial Stability Board 09:15:17 jim
FSB 09:14:35 jim
G-20 09:10:51 jim
LEI 09:05:14 jim
Web Blog_blogentry_011217_1 08:57:17 jim
29.11.2017
Directory Information Tree 09:49:44 jim
Predictor variable 09:37:31 jim
Summation layer 09:35:33 jim
28.11.2017
Social Security Number 12:20:22 jim
DigiD 12:09:47 jim
Web Blog_blogentry_281117_1 11:58:57 jim
25.11.2017
Multicast 19:21:42 jim
Unicast 19:17:53 jim
Byzantine Fault Tolerance 19:07:35 jim
Swirlds hashgraph consensus algorithm 18:59:15 jim
Gossip protocol 18:54:53 jim
Hashgraph 18:49:23 jim
Web Blog_blogentry_251117_1 18:40:34 jim
Web Blog_blogentry_270815_1 18:39:01 jim
U-Prove 18:38:24 jim
Separation of Duty 18:36:49 jim
Collusion 18:34:50 jim
PNN 11:41:29 jim
Hidden node 11:28:28 jim
Perception 11:00:44 jim
Speech recognition 10:58:47 jim
Sound recognition 10:57:37 jim
Classifier 10:47:36 jim
Sensor 10:13:45 jim
NLP 10:09:39 jim
Voice recognition 10:08:04 jim
Natural Language Processing 10:03:33 jim
Taxonomy 09:43:31 jim
24.11.2017
Sigmoid function/stock-vector-sigmoid-function-451998487.jpg 12:57:08 jim sigmoid-function
Relational Learning 12:38:10 jim
Motor Learning 12:37:11 jim
Observational Learning 12:36:12 jim
Spatial Learning 12:30:23 jim
Auditory Learning 12:30:05 jim
Understanding DIT Structure Rules 12:24:07 jim
Inheritance 12:22:42 jim
Placement Policy Set 12:22:31 jim
GCP Resource 12:21:45 jim
Forest Root Domain 12:21:16 jim
Directory Partition Hierarchy 12:20:41 jim
RBAC Hierarchical 12:19:04 jim
Hierarchical 12:18:02 jim
OID 12:17:01 jim
Hierarchy 12:15:03 jim
NAME 12:13:19 jim
Variable 12:12:46 jim
Shift Invariant Artificial Neural Network 11:42:51 jim
Space Invariant Artificial Neural Network 11:41:49 jim
SIANN 11:37:49 jim
CNN 11:28:44 jim
23.11.2017
OAuth 2.0 NOT an Authentication protocol 11:29:45 jim
21.11.2017
10BASE-T 11:41:40 jim
Z-Wave 11:28:53 jim
Z-Wave Primary Controller 11:23:36 jim
Z-Wave Controller 11:21:17 jim
Manchester code 11:18:15 jim
Z-Wave Home ID 11:13:39 jim
Z-Wave Node ID 11:11:56 jim
Z-Wave Network 10:54:38 jim
Z-Wave Node 10:51:41 jim
RFC 0793 10:47:47 jim
CBOR Object Signing and Encryption 10:43:48 jim
Strategies for Using Power for Communication 10:40:06 jim
Classes of Energy Limitation 10:36:56 jim
Scaling Properties 10:35:52 jim
LoWPAN 10:35:16 jim
Low-Power and Lossy Network 10:33:30 jim
Constrained Nodes 10:26:41 jim
Device 10:22:21 jim
Unified Extensible Firmware Interface 10:17:39 jim
EFI 10:14:40 jim
Extensible Firmware Interface 10:14:23 jim
UEFI 09:51:17 jim
Firmware 09:50:29 jim
Basic Input-Output System 09:47:05 jim
BIOS 09:44:34 jim
Web Blog_blogentry_211117_1 09:38:52 jim
20.11.2017
WholeSubtree 17:20:08 OrangeDog Completely wrong: was describing SubordinateSubtree
Trusted Execution Environment 00:49:51 jim
16.11.2017
HTTP 101 14:30:16 jim
URL redirection 14:08:30 jim
Resource Owner Password Credentials Grant 00:26:14 jim
Resource Owner Password Credentials Grant/OAuth2 — Resource Owner Password Credential Grant.jpg 00:24:45 jim Resource Owner Password Credential Grant
15.11.2017
Well-Known URIs 14:06:47 jim
Well-known 14:04:20 jim
WebFinger 13:29:01 jim
QUIC 02:30:31 jim
User Datagram Protocol 02:22:24 jim
14.11.2017
Eran Hammer 14:25:49 jim
RFC 5849 14:06:35 jim
RFC 6749 14:05:59 jim
OAuth 14:03:37 jim