These are all of the changes made to these pages. A much shorter list is available in RecentChanges.
10.04.2021
|
In-Q-Tel
|
09:43:58
|
jim
|
|
Palantir Technologies
|
09:37:00
|
jim
|
|
PayPal
|
09:28:30
|
jim
|
|
Peter Thiel
|
09:18:52
|
jim
|
|
28.03.2021
|
SUITEB128
|
15:55:21
|
jim
|
|
RFC 8423
|
15:54:59
|
jim
|
|
Suite B
|
15:54:42
|
jim
|
|
Ciphers-SUITEB128ONLY
|
15:54:23
|
jim
|
|
SUITEB192
|
15:54:13
|
jim
|
|
RFC 6460
|
15:53:38
|
jim
|
|
Ciphers-Low
|
15:31:38
|
jim
|
|
Ciphers-Medium
|
15:30:08
|
jim
|
|
Ciphers-High
|
15:28:49
|
jim
|
|
LdapBindRestrictions
|
15:26:13
|
jim
|
ldapBindRestrictions ==> LdapBindRestrictions |
Ciphers-Export
|
15:26:03
|
jim
|
|
FilteredReplicaUsage
|
14:44:15
|
jim
|
filteredReplicaUsage ==> FilteredReplicaUsage |
SearchTimeLimit
|
14:39:34
|
jim
|
searchTimeLimit ==> SearchTimeLimit |
2.16.840.1.113719.1.27.4.5
|
14:39:27
|
jim
|
|
2.16.840.1.113719.1.27.4.4
|
14:34:25
|
jim
|
|
SearchSizeLimit
|
14:33:50
|
jim
|
searchSizeLimit ==> SearchSizeLimit |
Ldapconfig
|
14:30:04
|
jim
|
|
LdapKeyMaterialName
|
14:12:06
|
jim
|
ldapKeyMaterialName ==> LdapKeyMaterialName |
2.16.840.1.113719.1.27.4.22
|
14:11:50
|
jim
|
|
2.16.840.1.113719.1.27.4.79
|
14:11:22
|
jim
|
|
LdapInterfaces
|
14:04:00
|
jim
|
ldapInterfaces ==> LdapInterfaces |
Ndsconfig
|
13:35:14
|
jim
|
|
EDirectory Configuration
|
12:50:30
|
jim
|
|
Identity Overlay Network
|
11:52:32
|
jim
|
|
Sidetree protocol
|
11:39:24
|
jim
|
|
ION
|
10:48:30
|
jim
|
|
DID
|
10:45:31
|
jim
|
|
10.03.2021
|
EDirectory Common Event Format
|
12:37:54
|
jim
|
|
XDAS for eDirectory
|
11:38:57
|
jim
|
|
19.02.2021
|
Grant Negotiation and Authorization Protocol
|
10:01:40
|
jim
|
|
MAY
|
09:59:55
|
jim
|
|
Grant
|
09:44:05
|
jim
|
|
GNAP
|
09:04:52
|
jim
|
|
02.02.2021
|
IsSingleValued
|
10:22:25
|
jim
|
|
24.01.2021
|
OAuth state parameter
|
13:39:34
|
jim
|
|
19.01.2021
|
Tracking tags
|
12:17:16
|
jim
|
|
Bluetooth Low Energy
|
12:12:42
|
jim
|
|
Asset Location Technology
|
12:11:53
|
jim
|
|
RFID
|
12:09:39
|
jim
|
|
16.01.2021
|
Entitlement Management System
|
12:09:28
|
jim
|
|
ALFA
|
11:59:44
|
jim
|
|
Abbreviated Language For Authorization
|
11:59:21
|
jim
|
|
EMS
|
11:44:09
|
jim
|
|
Entitlement
|
11:42:55
|
jim
|
|
27.12.2020
|
Strict-Transport-Security
|
11:07:12
|
jim
|
|
Certificate Pinning
|
11:05:25
|
jim
|
|
Certificate Transparency
|
11:00:34
|
jim
|
|
Public Key Infrastructure Weaknesses
|
10:53:43
|
jim
|
|
Certificate Authority
|
10:50:47
|
jim
|
|
24.12.2020
|
Credential
|
09:39:16
|
jim
|
|
WebAuthn Authenticator Model
|
08:57:16
|
jim
|
|
23.12.2020
|
Active Directory User Related Searches
|
15:39:11
|
jim
|
|
LDAP Query Examples for AD
|
15:33:03
|
jim
|
|
Active Directory Schema Related LDAP Searches
|
15:32:46
|
jim
|
|
Active Directory RISK Related Searches
|
15:28:20
|
jim
|
|
Active Directory Configuration Related Searches
|
15:00:31
|
jim
|
|
18.12.2020
|
Indistinguishability Obfuscation
|
08:57:22
|
jim
|
|
Computational Hardness Assumption
|
08:55:20
|
jim
|
|
17.12.2020
|
NspmExtendedCharactersAllowed
|
16:42:28
|
jim
|
|
2.16.840.1.113719.1.39.43.4.222
|
16:39:38
|
jim
|
|
Extended characters
|
16:38:30
|
jim
|
|
Scopes vs Claims
|
16:13:51
|
jim
|
|
OAuth Scopes
|
15:01:37
|
jim
|
|
Password Anti-Pattern
|
09:26:09
|
jim
|
|
Password Character Composition
|
09:24:27
|
jim
|
|
Password Modification Policy
|
09:20:58
|
jim
|
|
14.12.2020
|
SLAPD
|
13:44:38
|
jim
|
|
CGDB
|
13:40:25
|
jim
|
|
GPL
|
13:39:42
|
jim
|
|
GNU
|
13:36:47
|
jim
|
|
UidNumber
|
13:32:38
|
jim
|
|
GidNumber
|
13:25:41
|
jim
|
|
UID
|
09:48:49
|
jim
|
|
GID
|
09:47:14
|
jim
|
|
13.12.2020
|
OIDC SSO
|
11:48:39
|
jim
|
|
OpenID Connect
|
11:38:54
|
jim
|
|
Acr
|
11:33:16
|
jim
|
|
05.12.2020
|
Universal Integrated Circuit Card
|
09:25:54
|
jim
|
|
Satellite
|
09:22:35
|
jim
|
|
29.11.2020
|
U2F
|
12:13:02
|
jim
|
|
WebAuthn Attestation Statement Format Identifier
|
12:10:26
|
jim
|
|
WebAuthn Extension Identifiers
|
11:55:30
|
jim
|
|
Web Authentication API
|
11:40:13
|
jim
|
|
WebAuthn Attestation
|
11:27:31
|
jim
|
|
WebAuthN
|
11:05:12
|
jim
|
|
28.11.2020
|
FIDO Alliance
|
15:48:51
|
jim
|
|
Passwordless Authentication
|
15:28:46
|
jim
|
|
U2F device
|
15:24:24
|
jim
|
|
Credential Management API
|
15:20:58
|
jim
|
|
Clients
|
15:20:29
|
jim
|
|
Client To Authenticator Protocol
|
15:20:07
|
jim
|
|
CTAP2
|
15:17:40
|
jim
|
|
FIDO2
|
15:01:37
|
jim
|
|
FIDO Standards
|
14:59:34
|
jim
|
|
FIDO-CTAP
|
14:57:30
|
jim
|
|
FIDO Alliance Metadata Service
|
14:56:34
|
jim
|
|
27.11.2020
|
MSFT Access Token
|
14:10:33
|
jim
|
|
1.2.840.10045.4.3.2
|
13:07:48
|
jim
|
|
ES256
|
13:07:30
|
jim
|
|
Secp256r1
|
13:00:35
|
jim
|
|
P-256
|
13:00:09
|
jim
|
|
1.2.840.10045.3.1.7
|
12:45:23
|
jim
|
|
Key wrapping
|
12:37:57
|
jim
|
|
Server Storage Key
|
11:24:50
|
jim
|
|
Windows Hello
|
10:59:29
|
jim
|
|
Attestation
|
10:42:59
|
jim
|
|
Validation
|
10:41:26
|
jim
|
|
Verification
|
10:39:31
|
jim
|
|
What To Do About Passwords
|
10:27:59
|
jim
|
WebAuthn ==> WebAuthN |
Web Blog_blogentry_161018_1
|
10:27:58
|
jim
|
WebAuthn ==> WebAuthN |
WebAuthn Registration
|
10:27:58
|
jim
|
WebAuthn ==> WebAuthN |
WebAuthn-Registries
|
10:27:58
|
jim
|
WebAuthn ==> WebAuthN |
Public Key Credential
|
10:27:57
|
jim
|
WebAuthn ==> WebAuthN |
RFC 8809
|
10:27:57
|
jim
|
WebAuthn ==> WebAuthN |
Roaming Authenticator
|
10:27:57
|
jim
|
WebAuthn ==> WebAuthN |
User Verification Method
|
10:27:57
|
jim
|
WebAuthn ==> WebAuthN |
Virtual Authenticator
|
10:27:57
|
jim
|
WebAuthn ==> WebAuthN |
Web Authentication
|
10:27:57
|
jim
|
WebAuthn ==> WebAuthN |
Best Practices Password
|
10:27:56
|
jim
|
WebAuthn ==> WebAuthN |
Client Device
|
10:27:56
|
jim
|
WebAuthn ==> WebAuthN |
Platform Authenticator
|
10:27:56
|
jim
|
WebAuthn ==> WebAuthN |
26.11.2020
|
Primary Refresh Token
|
13:57:23
|
jim
|
|
Windows Server 2019
|
13:39:28
|
jim
|
|
Windows Server 2016
|
13:39:14
|
jim
|
|
Windows Server 2012
|
13:38:56
|
jim
|
|
Windows Server
|
13:38:31
|
jim
|
|
PRT
|
13:00:36
|
jim
|
|
WebAuthn Authenticator
|
11:17:51
|
jim
|
|
25.11.2020
|
Uvm
|
11:24:48
|
jim
|
|
Yubikey NEO
|
11:12:52
|
jim
|
|
FIDO Authenticator
|
10:55:50
|
jim
|
|
Federated Credential
|
09:32:55
|
jim
|
|
PWA
|
09:17:40
|
jim
|
|
Progressive Web Application
|
09:17:17
|
jim
|
|
Local device
|
09:16:51
|
jim
|
|
Self-signed Certificate
|
09:04:30
|
jim
|
|
04.11.2020
|
INTERDOMAIN_TRUST_ACCOUNT
|
17:01:10
|
jim
|
|
03.11.2020
|
Claim
|
09:57:50
|
jim
|
|
Subject Attributes
|
09:50:15
|
jim
|
|
Contextual Attributes
|
09:46:51
|
jim
|
|
01.11.2020
|
Disinformation
|
09:22:24
|
jim
|
|
Propaganda
|
09:21:26
|
jim
|
|
18.10.2020
|
Server
|
18:32:03
|
jim
|
|
Protocol Server
|
18:31:07
|
jim
|
|
OctetString
|
15:10:46
|
jim
|
|
Boolean
|
15:01:45
|
jim
|
|
Basic Encoding Rules
|
14:56:27
|
jim
|
|
14.10.2020
|
Member
|
18:19:08
|
jim
|
|
MemberOf
|
18:18:24
|
jim
|
|
1.2.840.113556.1.2.102
|
18:16:29
|
jim
|
|
Constructed Attribute
|
18:02:59
|
jim
|
|
12.10.2020
|
Netlogon attribute
|
12:49:50
|
jim
|
|
LDAP ping
|
11:41:16
|
jim
|
|
Netlogon service
|
11:35:35
|
jim
|
|
Netlogon Remote Protocol
|
11:34:47
|
jim
|
|
Schannel SSP
|
11:33:21
|
jim
|
|
Windows Authentication Package
|
11:31:41
|
jim
|
|
Secure Channel
|
09:22:52
|
jim
|
|
10.10.2020
|
Customer Identity and Access Management
|
09:14:08
|
jim
|
|
09.10.2020
|
Public LDAP Servers
|
12:10:24
|
jim
|
|
08.10.2020
|
LDAP Referral
|
15:42:03
|
jim
|
|
LDAP_REFERRAL
|
15:40:41
|
jim
|
|
LDAP Query Examples
|
08:25:47
|
jim
|
|
LDAP Query Basic Examples
|
08:23:25
|
jim
|
|
06.10.2020
|
API-Gateway
|
10:09:19
|
jim
|
|
Phantom Token Flow
|
10:07:51
|
jim
|
|
Opaque token
|
09:46:14
|
jim
|
Opaque tokens ==> Opaque token |
Tokenization
|
09:46:00
|
jim
|
|
Hypermedia As The Engine Of Application State
|
09:16:48
|
jim
|
|
03.10.2020
|
Roots of Trust
|
09:30:51
|
jim
|
|
Binding
|
09:23:30
|
jim
|
|
Decentralized Identifier
|
09:10:41
|
jim
|
|
01.10.2020
|
NIST.SP.800-53
|
13:38:32
|
jim
|
|
Key Distribution Center
|
11:17:22
|
jim
|
|
MsDS-GroupManagedServiceAccount
|
11:09:46
|
jim
|
|
Group Managed Service Account
|
11:01:24
|
jim
|
|
Microsoft Account
|
10:54:43
|
jim
|
|
SMSA
|
10:51:25
|
jim
|
|
Standalone Managed Service Account
|
10:46:52
|
jim
|
|
GMSA
|
10:43:58
|
jim
|
|
TrustAuthOutgoing
|
10:34:06
|
jim
|
|
TrustAuthIncoming
|
10:33:50
|
jim
|
|
TrustedDomain
|
10:32:43
|
jim
|
|
Trusted Domain Object
|
10:27:21
|
jim
|
|
26.09.2020
|
MsDS-SupportedEncryptionTypes
|
09:22:21
|
jim
|
|
24.09.2020
|
RIPEMD-160
|
08:02:45
|
jim
|
|
RIPEMD
|
08:02:29
|
jim
|
|
Bitcoin address
|
07:51:57
|
jim
|
|
23.09.2020
|
CredSSP
|
09:21:28
|
jim
|
|
19.09.2020
|
Message Passing Interface
|
08:59:28
|
jim
|
|
Broadcast
|
08:48:41
|
jim
|
|
Frame
|
08:40:29
|
jim
|
|
Frame Relay
|
08:36:30
|
jim
|
|
IP Address
|
08:19:08
|
jim
|
|
Internet Protocol Address
|
08:17:00
|
jim
|
|
15.09.2020
|
Private Communications Technology
|
13:26:56
|
jim
|
|
PCT
|
13:24:19
|
jim
|
|
MS-NRPC
|
13:13:03
|
jim
|
|
MSRPC
|
12:08:00
|
jim
|
|
PKCS12
|
09:37:43
|
jim
|
|
PKCS7
|
09:33:06
|
jim
|
|
Privacy-Enhanced Mail
|
09:30:11
|
jim
|
|
Distinguished Encoding Rules
|
09:29:41
|
jim
|
|
Certificate Formats
|
09:15:43
|
jim
|
|
OpenSSL
|
09:09:54
|
jim
|
|
Edirectory Certificate Management
|
09:08:25
|
jim
|
|
Converting Certificate Formats
|
09:08:07
|
jim
|
|
Certificate Keystores
|
09:07:38
|
jim
|
|
Certificate
|
09:05:26
|
jim
|
|
13.09.2020
|
Ephemeral Device
|
08:08:03
|
jim
|
|
Device
|
07:57:14
|
jim
|
|
05.09.2020
|
Active Directory Service Interfaces
|
07:55:06
|
jim
|
|
MS-ADSA
|
07:38:43
|
jim
|
|
AccountExpires
|
07:36:24
|
jim
|
|
LDAP Object Identifier Descriptors
|
07:30:38
|
jim
|
|
02.09.2020
|
Mandatory Integrity Control
|
09:38:55
|
jim
|
|
Securable object
|
09:34:58
|
jim
|
|
Security Descriptor
|
09:33:28
|
jim
|
|
Access Control Model-Microsoft Windows
|
09:08:13
|
jim
|
|
Integrity Level
|
09:01:44
|
jim
|
|
27.08.2020
|
Kerberos
|
11:01:35
|
jim
|
|
23.08.2020
|
Evidence
|
15:59:29
|
jim
|
|
20.08.2020
|
NIST.SP.800-207
|
12:24:22
|
jim
|
|
Zero Trust
|
12:19:46
|
jim
|
|
Member Attribute
|
11:24:55
|
jim
|
|
Groups Are Bad
|
11:19:37
|
jim
|
|
18.08.2020
|
TreeKey
|
13:58:13
|
jim
|
|
14.08.2020
|
GHz
|
09:39:36
|
jim
|
|
Novell Access Manager
|
09:38:41
|
jim
|
|
Z-Wave
|
09:38:01
|
jim
|
|
Gigahertz
|
09:36:25
|
jim
|
|
Physical Layer
|
09:21:47
|
jim
|
|
IEEE 802.11
|
09:18:21
|
jim
|
|
Orthogonal frequency-division multiple access
|
09:12:11
|
jim
|
|
OFDMA
|
09:09:55
|
jim
|
|
Universal Terrestrial Radio Access Network
|
09:07:13
|
jim
|
|
Universal Subscriber Identification Module
|
09:04:39
|
jim
|
|
Base Station Controller
|
09:04:16
|
jim
|
|
Base Transceiver Station
|
09:01:05
|
jim
|
|
LTE
|
08:54:33
|
jim
|
|
4G
|
08:25:24
|
jim
|
|
26.07.2020
|
NTLM SSP
|
08:42:54
|
jim
|
|
ONC
|
08:37:49
|
jim
|
|
OncRpc
|
08:37:13
|
jim
|
|
Getent
|
08:30:14
|
jim
|
|
ONC-RPC
|
08:28:50
|
jim
|
|
NIS Maps And LDAP Attributes
|
08:23:28
|
jim
|
|
WikiRPCInterface
|
08:19:09
|
jim
|
|
24.07.2020
|
Country Code
|
08:07:39
|
jim
|
|
Mobile Country Code
|
07:54:48
|
jim
|
|
MVNO
|
07:43:56
|
jim
|
|
Mobile Virtual Network Operator
|
07:43:37
|
jim
|
|
23.07.2020
|
DLL
|
08:57:51
|
jim
|
|
Dynamic-Link Library
|
08:57:01
|
jim
|
|
Loadable Module
|
08:55:30
|
jim
|
|
19.07.2020
|
Certificate Extensions
|
09:13:16
|
jim
|
|
Subject Public Key Info
|
09:08:57
|
jim
|
|
Certificate Subject
|
09:06:22
|
jim
|
|
Certificate Issuer
|
09:00:38
|
jim
|
|
Certificate Algorithm ID
|
08:55:50
|
jim
|
|
Certificate Version
|
08:51:57
|
jim
|
|
Certificate Validity Period
|
08:46:06
|
jim
|
|
TBSCertificate
|
08:42:23
|
jim
|
|
X.509v3
|
08:21:05
|
jim
|
|
16.07.2020
|
AD Determining Password Expiration
|
09:49:42
|
jim
|
|
13.07.2020
|
Password Maximum Length
|
19:57:31
|
jim
|
|
Password Periodic Changes
|
19:53:59
|
jim
|
|
12.07.2020
|
Microsoft Active Directory
|
09:04:37
|
jim
|
|
09.07.2020
|
Next Generation Access Control
|
10:31:41
|
jim
|
|
03.07.2020
|
ExtensibleMatch
|
21:16:32
|
jim
|
|
DistinguishedNameMatch
|
21:10:14
|
jim
|
|
28.06.2020
|
Verify DNS Records
|
08:36:37
|
jim
|
|
26.06.2020
|
Trust
|
08:52:05
|
jim
|
|
24.06.2020
|
Web Blog_blogentry_011118_1
|
16:50:18
|
jim
|
|
Social Justice
|
16:49:45
|
jim
|
|
Group of 7
|
16:49:28
|
jim
|
|
Harvard University
|
16:48:59
|
jim
|
|
Wealth
|
16:47:57
|
jim
|
|
Social Engineering Attack
|
16:38:38
|
jim
|
|
22.06.2020
|
User Application
|
16:11:09
|
jim
|
|
Installing-RBPM-4.x
|
16:09:54
|
jim
|
|
JAVA_HOME
|
16:05:20
|
jim
|
|
Java KeyStore
|
15:51:53
|
jim
|
|
09.06.2020
|
Electronic Signatures
|
18:48:52
|
jim
|
|
05.06.2020
|
LdapPermissiveModify
|
18:42:04
|
jim
|
|
Net Address
|
18:29:39
|
jim
|
|
Tagged Data
|
18:28:12
|
jim
|
|
LoginIntruderAddress
|
18:26:37
|
jim
|
|
2.16.840.1.113719.1.1.5.1.12
|
18:13:49
|
jim
|
|
02.06.2020
|
LDAP_MATCHING_RULE_IN_CHAIN
|
17:02:03
|
jim
|
|
Forward link
|
17:00:50
|
jim
|
|
LinkID
|
16:59:29
|
jim
|
|
Linked Attribute
|
16:58:18
|
jim
|
|
BackLink
|
16:57:20
|
jim
|
|
DirectReports
|
16:38:18
|
jim
|
|
Manager
|
16:36:49
|
jim
|
|
01.06.2020
|
1.2.840.113556.1.5.69
|
16:11:13
|
jim
|
|
NTDSSiteSettings
|
16:10:52
|
jim
|
|
LDAP policy in Active Directory
|
16:02:22
|
jim
|
|
1.2.840.113556.1.5.106
|
15:59:30
|
jim
|
|
1.2.840.113556.1.4.607
|
15:58:57
|
jim
|
|
1.2.840.113556.1.4.843
|
15:58:32
|
jim
|
|
LDAPAdminLimits
|
15:51:09
|
jim
|
|
QueryPolicyObject
|
15:45:51
|
jim
|
|
QueryPolicy
|
15:44:44
|
jim
|
|
30.05.2020
|
ObjectClass vs ObjectCategory
|
17:15:48
|
jim
|
|
29.05.2020
|
MaxPageSize
|
13:36:33
|
jim
|
|
28.05.2020
|
Electronic IDentification Authentication and trust Services
|
16:42:05
|
jim
|
|
Primary Access Token
|
14:22:05
|
jim
|
|
Impersonation Token
|
14:19:11
|
jim
|
|
TRUSTED_FOR_DELEGATION
|
14:17:13
|
jim
|
|
TRUSTED_TO_AUTHENTICATE_FOR_DELEGATION
|
14:14:42
|
jim
|
|
SECURITY_IMPERSONATION_LEVEL
|
14:13:59
|
jim
|
|
25.05.2020
|
F A Hayek
|
10:24:25
|
jim
|
|
Government Benefit
|
10:12:30
|
jim
|
|
Social Security
|
10:07:17
|
jim
|
|
If men were angels
|
07:59:30
|
jim
|
|
Berkman Center for Internet & Society
|
07:49:12
|
jim
|
|
False Non-Match Rates
|
07:26:35
|
jim
|
|
21.05.2020
|
Secure Element
|
15:39:44
|
jim
|
|
Personal Identification Number
|
15:38:24
|
jim
|
|
Security Support Provider
|
12:42:43
|
jim
|
|
Windows Credential Provider
|
12:42:17
|
jim
|
|
Security Support Provider Interface
|
12:07:32
|
jim
|
|
Windows Client Authentication Architecture
|
11:25:15
|
jim
|
|
Windows Logon
|
10:52:25
|
jim
|
|
Windows.Security.Credentials.UI
|
10:42:23
|
jim
|
|
Winlogon
|
10:25:07
|
jim
|
|
SAS
|
10:13:43
|
jim
|
|
Secure Attention Sequence
|
10:13:03
|
jim
|
|
17.05.2020
|
Offline_access
|
08:41:38
|
jim
|
|
16.05.2020
|
NBS
|
08:39:24
|
jim
|
|
National Bureau of Standards
|
08:38:31
|
jim
|
|
DES
|
08:36:14
|
jim
|
|
Data Encryption Standard
|
08:33:57
|
jim
|
|
GSA
|
08:31:02
|
jim
|
|
United States General Services Administration
|
08:30:09
|
jim
|
|
United States Federal Standard
|
08:27:42
|
jim
|
|
Draft Standard
|
08:19:10
|
jim
|
|
HTML Living Standard
|
08:18:02
|
jim
|
|
Standard
|
08:16:49
|
jim
|
|
Open Standard
|
08:08:32
|
jim
|
|
Bluetooth
|
08:05:32
|
jim
|
|
12.05.2020
|
PBKDF2
|
09:11:36
|
jim
|
|
10.05.2020
|
Macaroons
|
09:11:57
|
jim
|
|
08.05.2020
|
Proof Key for Code Exchange by OAuth Public Clients
|
10:03:56
|
jim
|
|
OAuth 2.0 Security Best Current Practice
|
10:01:22
|
jim
|
|
Code injection
|
09:59:33
|
jim
|
|
02.05.2020
|
SAML Holder of Key
|
09:16:29
|
jim
|
|
Proof-of-Possession
|
09:09:30
|
jim
|
|
Demonstration of Proof-of-Possession
|
09:07:31
|
jim
|
|
Credential Holder
|
09:04:04
|
jim
|
|
HoK
|
08:54:47
|
jim
|
|
Holder-of-Key
|
08:54:28
|
jim
|
|
DPoP
|
08:37:56
|
jim
|
|
OAuth 2.0 Demonstration of Proof-of-Possession at the Application Layer
|
08:37:21
|
jim
|
|
30.04.2020
|
MaxConnections
|
08:41:28
|
jim
|
|
27.04.2020
|
Schannel
|
14:51:57
|
jim
|
|
Public Key Cryptography Based User-to-User
|
13:45:27
|
jim
|
|
25.04.2020
|
Relationship
|
23:24:19
|
jim
|
|
Digital Identity
|
23:21:18
|
jim
|
|
24.04.2020
|
Bot
|
22:06:27
|
jim
|
|
State of the Internet-Security Report
|
22:00:50
|
jim
|
|
23.04.2020
|
SSL Handshake Failed
|
10:19:08
|
jim
|
|
How SSL-TLS Works
|
09:45:00
|
jim
|
|
MaxBatchReturnMessages
|
09:34:27
|
jim
|
|
LDAP_SERVER_BATCH_REQUEST_OID
|
09:31:16
|
jim
|
|
LDAP_SERVER_DOWN
|
09:19:45
|
jim
|
|
20.04.2020
|
Negotiate SSP
|
16:16:58
|
jim
|
|
Event 4624
|
15:20:07
|
jim
|
|
NO_IMPERSONATION_TOKEN
|
15:07:14
|
jim
|
|
Delegation vs Impersonation
|
15:04:39
|
jim
|
|
MaxConnIdleTime
|
12:29:56
|
jim
|
|
LDAP_SERVER_DIRSYNC_OID
|
10:09:50
|
jim
|
|
SupportedControl
|
10:05:34
|
jim
|
|
1.2.840.113556.1.4.2090
|
10:04:14
|
jim
|
|
Directory Synchronization Control Extended
|
10:03:29
|
jim
|
|
LDAP_SERVER_DIRSYNC_EX_OID
|
09:57:58
|
jim
|
|
1.2.840.113556.1.4.841
|
09:54:43
|
jim
|
|
Directory Synchronization Control
|
09:52:16
|
jim
|
|
MaxQueryDuration
|
09:40:48
|
jim
|
|
InitRecvTimeout
|
09:37:03
|
jim
|
|
MaxActiveQueries
|
09:34:37
|
jim
|
|
NTDSDSA
|
09:33:14
|
jim
|
|
PwdChangedTime
|
08:31:30
|
jim
|
|
PasswordExpirationTime
|
08:20:01
|
jim
|
|
19.04.2020
|
HTTP PUT
|
19:28:47
|
jim
|
|
United States PATRIOT Act
|
08:09:06
|
jim
|
|
17.04.2020
|
URL
|
11:46:19
|
jim
|
|
Name
|
11:30:04
|
jim
|
|
NAME
|
11:29:06
|
jim
|
|
RFC 33
|
11:23:54
|
jim
|
|
Network Control Program
|
11:22:42
|
jim
|
|
15.04.2020
|
Subject_type
|
14:30:54
|
jim
|
|
DID Subject
|
14:29:32
|
jim
|
|
Data subject
|
14:27:04
|
jim
|
|
Identity Correlation
|
14:24:25
|
jim
|
|
Anonymity Set
|
09:43:41
|
jim
|
|
14.04.2020
|
OAuth Scope Example
|
09:20:01
|
jim
|
|
Long Short Term Memory networks
|
09:18:38
|
jim
|
|
Directed Acyclic Graph
|
09:17:59
|
jim
|
|
Contract of Adhesion
|
09:17:25
|
jim
|
|
Dependency
|
09:11:42
|
jim
|
|
The Twelve-Factor App
|
08:58:59
|
jim
|
|
Dependent variables
|
08:56:23
|
jim
|
|
12.04.2020
|
Authorization
|
09:18:00
|
jim
|
|
AuthZ
|
09:15:07
|
jim
|
|
AuthN
|
09:14:07
|
jim
|
|
Authentication
|
09:13:30
|
jim
|
|
Privilege
|
09:03:06
|
jim
|
|
Access Control Models
|
08:57:28
|
jim
|
|
11.04.2020
|
Internet of Things
|
09:31:33
|
jim
|
|
07.04.2020
|
Common Active Directory Bind Errors
|
13:25:21
|
jim
|
|
Event 4625
|
13:23:59
|
jim
|
|
05.04.2020
|
Cable Connections
|
12:38:54
|
jim
|
|
TV and Video Cables
|
12:37:15
|
jim
|
|
01.04.2020
|
MSA
|
10:16:26
|
jim
|
|
RFC 2759
|
10:14:27
|
jim
|
|
21.03.2020
|
Non-functional requirement
|
11:58:54
|
jim
|
|
NFR
|
11:46:12
|
jim
|
|
19.03.2020
|
Resource Owner
|
13:53:55
|
jim
|
|
Account owner
|
13:53:11
|
jim
|
|
Owner
|
13:52:08
|
jim
|
|
Linux Files and File Permissions
|
13:49:37
|
jim
|
|
Create Read Update Delete
|
13:38:13
|
jim
|
|
Linux Umask Settings
|
13:34:35
|
jim
|
|
17.03.2020
|
MaxTempTableSize
|
08:30:45
|
jim
|
|
Virtual List View Control
|
08:29:49
|
jim
|
|
10.03.2020
|
SearchResultReference
|
18:07:57
|
jim
|
|
Dereference Policy
|
17:39:27
|
jim
|
|
About this Wiki
|
10:13:18
|
jim
|
|
DS_HIDDEN_ATTR
|
08:47:04
|
jim
|
|
X-NDS_HIDDEN
|
08:46:01
|
jim
|
|
LdapGroupDN
|
08:24:05
|
jim
|
|
2.16.840.1.113719.1.27.4.2
|
08:23:08
|
jim
|
|
2.16.840.1.113719.1.27.6.2
|
08:19:11
|
jim
|
|
LdapGroup
|
08:18:33
|
jim
|
ldapGroup ==> LdapGroup |
LdapServer
|
08:12:59
|
jim
|
|
EDirectory Ports
|
08:06:17
|
jim
|
|
Edirectory Usefull Linux Commands
|
08:03:22
|
jim
|
|
08.03.2020
|
Crypto AG
|
09:42:14
|
jim
|
|
06.03.2020
|
JNDI Examples
|
13:38:15
|
jim
|
|
05.03.2020
|
ModifyTimestamp
|
13:05:30
|
jim
|
|
POP
|
08:56:21
|
jim
|
|
04.03.2020
|
LDAP Request
|
14:38:56
|
jim
|
|
Scrum Event
|
13:20:21
|
jim
|
|
Mobile Network Operators
|
13:18:15
|
jim
|
|
Softcard
|
13:17:49
|
jim
|
|
Sprint
|
13:03:33
|
jim
|
|
Sprint Corporation
|
13:03:16
|
jim
|
|
Red Green Refactor
|
12:56:13
|
jim
|
|
Product Backlog
|
12:55:51
|
jim
|
|
Iteration Planning
|
12:52:43
|
jim
|
|
DevOps
|
12:51:50
|
jim
|
|
Continuous Development
|
12:51:09
|
jim
|
|
Sprint Backlog
|
12:50:03
|
jim
|
|
Agile Task
|
12:43:29
|
jim
|
|
User Story
|
12:41:50
|
jim
|
|
Epic
|
12:38:33
|
jim
|
|
Features
|
12:35:06
|
jim
|
|
Business value
|
12:34:14
|
jim
|
|
27.02.2020
|
Clearview AI
|
17:41:19
|
jim
|
|
26.02.2020
|
LDAP schema used by autofs
|
12:43:53
|
jim
|
|
1.3.6.1.1.1.2.9
|
12:42:05
|
jim
|
|
1.3.6.1.1.1.1.26
|
12:41:34
|
jim
|
|
1.3.6.1.1.1.2.10
|
12:40:45
|
jim
|
|
NisObject
|
12:39:48
|
jim
|
|
1.3.6.1.1.1.1.27
|
12:38:44
|
jim
|
|
NisMapEntry
|
12:38:14
|
jim
|
|
NisMapName
|
12:22:30
|
jim
|
|
NisMap
|
12:19:37
|
jim
|
|
25.02.2020
|
LDAP_CONTROL_NOT_FOUND
|
12:09:09
|
jim
|
|
LDAP_NOT_SUPPORTED
|
12:05:18
|
jim
|
|
LDAP_CONNECT_ERROR
|
12:03:37
|
jim
|
|
LDAP_FILTER_ERROR
|
11:37:41
|
jim
|
|
LDAP_TIMEOUT
|
11:34:47
|
jim
|
|
LDAP_DECODING_ERROR
|
11:34:13
|
jim
|
|
LDAP_ENCODING_ERROR
|
11:33:35
|
jim
|
|
LDAP_LOCAL_ERROR
|
11:33:04
|
jim
|
|
LDAP Result Codes
|
11:30:23
|
jim
|
|
LDAP Error Codes
|
11:28:09
|
jim
|
|
LDAP Client Error And Result Codes
|
11:26:33
|
jim
|
|
LDAP_ADMINLIMIT_EXCEEDED
|
11:18:42
|
jim
|
|
LDAP_SIZELIMIT_EXCEEDED
|
11:16:06
|
jim
|
|
Maximum Database Record Size
|
10:54:34
|
jim
|
|
Microsoft Active Directory Anomalies
|
10:37:19
|
jim
|
|
22.02.2020
|
United States Cabinet Department
|
11:29:01
|
jim
|
|
EPA
|
11:23:36
|
jim
|
|
United States Environmental Protection Agency
|
11:23:21
|
jim
|
United States Department of Environmental Protection Agency ==> United States Environmental Protection Agency |
Central Intelligence Agency
|
11:15:11
|
jim
|
|
United States Director of National Intelligence
|
11:08:10
|
jim
|
|
United States Department of Homeland Security
|
10:48:09
|
jim
|
|
United States Department of Veterans Affairs
|
10:44:45
|
jim
|
|
United States Department of Education
|
10:41:10
|
jim
|
|
United States Department of Energy
|
10:39:42
|
jim
|
|
United States Department of Transportation
|
10:39:01
|
jim
|
|
United States Department of Housing and Urban Development
|
10:38:21
|
jim
|
|
United States Department of Health and Human Services
|
10:37:16
|
jim
|
|
United States Department of Labor
|
10:35:41
|
jim
|
|
United States Department of Commerce
|
10:34:56
|
jim
|
|
United States Department of Agriculture
|
10:34:18
|
jim
|
|
United States Department of the Interior
|
10:33:44
|
jim
|
|
United States Department of Justice
|
10:33:03
|
jim
|
|
United States Department of Defense
|
10:31:22
|
jim
|
|
United States Department of the Treasury
|
10:30:29
|
jim
|
|
United States Federal Executive Department
|
10:25:28
|
jim
|
|
Mike Lee
|
10:15:26
|
jim
|
|
20.02.2020
|
Key-Exchange
|
09:42:16
|
jim
|
|
Key agreement
|
09:40:29
|
jim
|
|
Password-authenticated Key Agreement
|
09:30:33
|
jim
|
|
NMAS_E_MISSING_KEY
|
09:29:32
|
jim
|
|
Password-authenticated Key Exchange
|
09:24:06
|
jim
|
|
Constrained Nodes
|
09:22:24
|
jim
|
|
X25519
|
08:58:57
|
jim
|
|
19.02.2020
|
Password Flow From Active Directory to eDirectory
|
16:37:20
|
jim
|
|
ADDriver
|
16:35:02
|
jim
|
|
DirXML PassSync Agent
|
16:34:39
|
jim
|
|
DirXML PWFILTER.DLL
|
16:34:04
|
jim
|
|
PassSyncConfig.cpl
|
16:33:43
|
jim
|
|
AutomountMapName
|
12:24:44
|
jim
|
|
AutomountKey
|
12:20:16
|
jim
|
|
AutomountInformation
|
12:17:38
|
jim
|
|
AutomountMap
|
12:13:50
|
jim
|
|
Automount
|
12:09:04
|
jim
|
|
1.3.6.1.1.1.2.17
|
12:08:50
|
jim
|
|
Autofs
|
12:04:34
|
jim
|
|
PAMSchemaModifications
|
11:53:24
|
jim
|
|
MigratingFromNISToLDAP
|
11:51:36
|
jim
|
|
LDIF Examples Of NIS Migrated Entries
|
11:50:05
|
jim
|
|
LDAPSchemasForNISInLDAP
|
11:28:54
|
jim
|
|
DIT Locations For NIS
|
11:27:34
|
jim
|
|
LDAPAutomountInformation
|
11:25:47
|
jim
|
|
18.02.2020
|
SunOS
|
13:18:34
|
jim
|
|
Guest
|
13:14:26
|
jim
|
|
Nobody
|
13:13:50
|
jim
|
|
Everybody
|
13:13:18
|
jim
|
|
Netgroup
|
13:11:13
|
jim
|
|
X-NDS_ACL_TEMPLATES
|
12:47:33
|
jim
|
|
Object ACL
|
12:45:07
|
jim
|
|
Extended Flags
|
12:32:07
|
jim
|
|
17.02.2020
|
Client Secret
|
22:08:01
|
jim
|
|
JSON Web Token (JWT) Profile for OAuth 2.0 Client Authentication and Authorization Grants
|
22:06:08
|
jim
|
|
JSON Web Tokens
|
21:56:57
|
jim
|
|
RFC 7253
|
21:52:50
|
jim
|
|
16.02.2020
|
CodeSigning
|
22:42:01
|
jim
|
|
Authenticode
|
22:33:19
|
jim
|
|
LSA Protection
|
22:25:04
|
jim
|
|
MsCodeInd
|
22:24:27
|
jim
|
|
MsCodeCom
|
22:23:55
|
jim
|
|
1.3.6.1.4.1.311.2.1.22
|
22:21:26
|
jim
|
|
ExtendedKeyUsage
|
22:21:06
|
jim
|
|
1.3.6.1.4.1.311.2.1.21
|
22:18:42
|
jim
|
|
Local Security Authority
|
11:44:01
|
jim
|
|
X-SCHEMAFLAGSEx
|
11:34:57
|
jim
|
|
FLAG_ATTR_IS_CRITICAL
|
11:32:57
|
jim
|
|
SchemaFlagsEx
|
11:30:50
|
jim
|
|
OMObjectClass
|
11:22:06
|
jim
|
|
OMSyntax
|
11:21:43
|
jim
|
|
AttributeSyntax
|
11:21:22
|
jim
|
|
SchemaIDGUID
|
10:59:37
|
jim
|
|
AttributeTypes
|
10:54:08
|
jim
|
|
RdnAttId
|
10:41:29
|
jim
|
|
FLAG_ATTR_IS_RDN
|
10:40:09
|
jim
|
|
Bounded Context
|
10:27:37
|
jim
|
|
Naming Attributes
|
10:13:23
|
jim
|
|
Best Practices For LDAP Naming Attributes
|
10:08:50
|
jim
|
|
Distinguished Names
|
09:53:12
|
jim
|
|
Escaping Distinguished Name
|
09:32:03
|
jim
|
|
14.02.2020
|
Active Directory Group Related Searches
|
11:38:48
|
jim
|
|
ManagedBy
|
11:28:50
|
jim
|
|
Active Directory Groups
|
10:50:28
|
jim
|
|
Financial Crimes Enforcement Network
|
10:21:05
|
jim
|
|
United States Secret Service
|
10:20:39
|
jim
|
|
13.02.2020
|
Encryption key
|
16:49:09
|
jim
|
|
CALG_RC4
|
16:31:48
|
jim
|
|
Publisher Channel
|
16:14:07
|
jim
|
|
11.02.2020
|
AD Password Filters
|
10:37:38
|
jim
|
|
10.02.2020
|
Device Inventory Service
|
10:04:39
|
jim
|
|
09.02.2020
|
Cookie
|
21:56:56
|
jim
|
|
Why Use Tokens
|
20:13:03
|
jim
|
|
BeyondCorp
|
15:40:36
|
jim
|
|
Resource Inventory Service
|
13:55:25
|
jim
|
|
Trust Inferer
|
13:30:11
|
jim
|
|
Context Provider
|
12:39:28
|
jim
|
|
DID Context
|
12:24:51
|
jim
|
|
JSON-LD
|
12:23:08
|
jim
|
|
08.02.2020
|
Year 2038
|
11:15:38
|
jim
|
|
2,147,483,647
|
11:14:02
|
jim
|
|
PosixGroup
|
11:12:21
|
jim
|
|
POSIX time
|
11:11:28
|
jim
|
|
Unix Time
|
11:10:03
|
jim
|
|
Time And Epochs
|
11:04:13
|
jim
|
|
LargeInteger Date
|
11:02:25
|
jim
|
|
Nano
|
11:00:53
|
jim
|
|
Nanosecond
|
11:00:16
|
jim
|
|
International System of Units
|
10:58:31
|
jim
|
|
Week
|
10:55:20
|
jim
|
|
Seconds
|
10:54:52
|
jim
|
|
Minute
|
10:53:58
|
jim
|
|
Hour
|
10:52:56
|
jim
|
|
Day
|
10:52:15
|
jim
|
|
Year
|
10:51:46
|
jim
|
|
Web Blog_blogentry_080220_1
|
09:17:35
|
jim
|
|
07.02.2020
|
Access Control
|
20:21:14
|
jim
|
|
XACML
|
15:34:52
|
jim
|
|
Policy Based Management System
|
15:31:15
|
jim
|
|
RFC 2753
|
15:21:15
|
jim
|
|
Policy Enforcement Point
|
15:19:38
|
jim
|
|
06.02.2020
|
SudoRole
|
16:33:40
|
jim
|
|
Sudo
|
16:31:01
|
jim
|
|
LDAP Modify-Increment Extension
|
15:12:51
|
jim
|
|
DirXML Fan-Out System Intercept
|
11:41:50
|
jim
|
|
IDMLinuxUnixPlatformServices
|
11:41:07
|
jim
|
|
IDM Fan Out Unix Receiver Scripts
|
11:39:58
|
jim
|
|
DirXML Platform Services
|
11:38:58
|
jim
|
|
Overview Of Linux-Unix Fanout Driver
|
11:37:59
|
jim
|
LinuxPlatformServices ==> DirXML Platform Services |
BiDirectionalDriver
|
11:36:59
|
jim
|
|
2.16.840.1.113719.1.39.43.4.305
|
09:57:30
|
jim
|
|
NspmPolicyAgentAIX
|
09:56:35
|
jim
|
|
Installing Platform Services
|
09:48:16
|
jim
|
|
AIX Configuration
|
09:47:01
|
jim
|
|
05.02.2020
|
DNSName
|
20:10:32
|
jim
|
|
9,223,372,036,854,775,807
|
13:26:19
|
jim
|
|
MsDS-UserPasswordExpiryTimeComputed
|
13:20:58
|
jim
|
|
FILETIME
|
13:16:46
|
jim
|
|
LargeInteger
|
13:14:38
|
jim
|
|
2.5.5.16
|
13:05:21
|
jim
|
|
DONT_EXPIRE_PASSWORD
|
12:58:56
|
jim
|
|
04.02.2020
|
Universal Password
|
17:54:59
|
jim
|
|
Binary
|
16:01:14
|
jim
|
|
02.02.2020
|
DS_FLAG
|
11:58:23
|
jim
|
|
How Domain Controllers Are Located in Windows
|
11:46:40
|
jim
|
|
MS-ADDM
|
11:14:54
|
jim
|
|
Active Directory Site
|
11:01:01
|
jim
|
|
ClientSiteName
|
10:58:42
|
jim
|
|
DcSiteName
|
10:58:16
|
jim
|
|
NETLOGON_SAM_LOGON_RESPONSE_EX
|
10:40:26
|
jim
|
|
NTDSSettings
|
10:39:35
|
jim
|
NDTSSettings ==> NTDSSettings |
RFC 1035
|
10:36:58
|
jim
|
|
File Replication Service Protocol
|
09:58:35
|
jim
|
|
FRS
|
09:55:59
|
jim
|
|
DefaultNamingContext
|
09:38:33
|
jim
|
|
01.02.2020
|
SOA
|
13:57:15
|
jim
|
|
Sources of Authority
|
13:56:48
|
jim
|
|
Domain Name server
|
13:54:36
|
jim
|
|
Domain Name System
|
13:52:39
|
jim
|
|
8.8.8.8
|
13:45:56
|
jim
|
|
DNS record type
|
13:39:24
|
jim
|
|
DNS Resource Records
|
13:22:03
|
jim
|
|
Private-Use Networks
|
13:16:21
|
jim
|
|
Unique Local IPv6 Unicast Addresses
|
13:11:06
|
jim
|
|
ApplicationObjectSchema
|
13:06:33
|
jim
|
|
CIDR
|
13:03:43
|
jim
|
|
Special-Use Domain Names
|
13:02:12
|
jim
|
|
Example.com
|
12:33:56
|
jim
|
|
Top-Level Domain
|
12:32:35
|
jim
|
|
2.16.840.1.113719.1.1.4.1.68
|
11:55:53
|
jim
|
|
Hypertext Transfer Protocol
|
10:57:16
|
jim
|
|
Fetch API
|
10:55:30
|
jim
|
|
Web Hypertext Application Technology Working Group
|
10:49:27
|
jim
|
|
Document Object Model
|
10:36:49
|
jim
|
|
Web Origin
|
10:35:30
|
jim
|
|
Same-site Cookies
|
10:16:57
|
jim
|
|
Same Origin Policy
|
10:12:15
|
jim
|
|
29.01.2020
|
Cellebrite
|
10:06:58
|
jim
|
|
23.01.2020
|
Active Directory Account Lockout
|
12:40:32
|
jim
|
|
MsDS-LockoutThreshold
|
12:33:45
|
jim
|
|
Active Directory Locked Accounts
|
12:31:36
|
jim
|
|
Administratively Disabled
|
12:28:46
|
jim
|
|
LOCKOUT
|
12:25:52
|
jim
|
|
CryptoAPI
|
09:42:59
|
jim
|
|
BoringSSL
|
09:17:24
|
jim
|
|
Tink
|
09:15:40
|
jim
|
|
Cryptosystem
|
09:13:23
|
jim
|
|
Network Security Services
|
09:08:41
|
jim
|
|
Channel Binding
|
08:22:17
|
jim
|
|
LDAP Signing
|
08:20:06
|
jim
|
|
22.01.2020
|
Windows Security Log Event
|
17:05:05
|
jim
|
|
ADV190023
|
16:38:44
|
jim
|
|
Agile
|
14:12:22
|
jim
|
|
Deming
|
14:03:07
|
jim
|
|
PDCA
|
14:00:32
|
jim
|
|
Web Blog_blogentry_160718_1
|
13:56:05
|
jim
|
|
Leadership
|
13:26:07
|
jim
|
|
Command-and-Control Management
|
13:25:23
|
jim
|
|
Web Blog_blogentry_220120_1
|
13:04:36
|
jim
|
|
Web Blog_blogentry_100818_1
|
10:32:45
|
jim
|
|
Humorous RFCs
|
10:30:45
|
jim
|
|
Culture
|
10:15:23
|
jim
|
|
Financial API
|
09:37:29
|
jim
|
|
DirXML Driver
|
09:14:17
|
jim
|
|
NxsettingsDriver
|
09:13:05
|
jim
|
|
Web Distributed Authoring and Versioning
|
09:09:29
|
jim
|
|
WebDAV
|
09:05:47
|
jim
|
|
HTTP Method
|
09:04:32
|
jim
|
|
IETF
|
09:01:17
|
jim
|
|
Idempotent
|
08:42:18
|
jim
|
|
21.01.2020
|
RFC 4556
|
12:03:03
|
jim
|
|
PKINIT
|
12:02:11
|
jim
|
|
Kerberos SSP
|
11:55:01
|
jim
|
|
Token Binding Protocol
|
10:29:20
|
jim
|
|
LDAPServerIntegrity
|
10:10:38
|
jim
|
|
Event 2889
|
10:08:36
|
jim
|
|
Event 2888
|
10:06:41
|
jim
|
|
Event 2887
|
10:04:34
|
jim
|
|
Event 2886
|
09:57:42
|
jim
|
|
Simple Authentication
|
09:08:55
|
jim
|
|
20.01.2020
|
Passing Credentials To Imanager
|
12:51:13
|
jim
|
|
18.01.2020
|
RFC 5929
|
16:04:55
|
jim
|
|
Channel Bindings for TLS
|
16:04:07
|
jim
|
|
Kerberos Error Codes
|
15:03:28
|
jim
|
|
SASL
|
12:54:57
|
jim
|
|
Extended Protection for Authentication
|
12:38:19
|
jim
|
|
SPNEGO
|
11:49:56
|
jim
|
|
GSS-SPNEGO
|
11:44:08
|
jim
|
|
Integrity
|
11:04:21
|
jim
|
|
IEEE 802.1X
|
10:59:08
|
jim
|
|
LDAP_STRONG_AUTH_REQUIRED
|
10:47:50
|
jim
|
|
Replay attack
|
10:15:13
|
jim
|
|
Web Blog_blogentry_170120_1
|
08:50:59
|
jim
|
|
17.01.2020
|
NT LAN Manager
|
11:53:04
|
jim
|
|
RFC 5056
|
11:25:46
|
jim
|
|
Crypt32.dll
|
09:46:14
|
jim
|
|
15.01.2020
|
AD Driver version 4.0.0.4
|
19:17:23
|
jim
|
|
Notification
|
09:20:25
|
jim
|
|
12.01.2020
|
Deprecating TLSv1.0 and TLSv1.1
|
09:05:13
|
jim
|
|
RFC 8447
|
09:00:31
|
jim
|
|
TLS 1.0
|
08:48:21
|
jim
|
|
11.01.2020
|
Main
|
15:30:13
|
jim
|
|
Encrypted Server Name Indication
|
09:30:04
|
jim
|
|
Issues and Requirements for SNI Encryption in TLS
|
09:29:40
|
jim
|
|
ENSI
|
09:27:51
|
jim
|
|
Server Name Indication
|
09:13:36
|
jim
|
|
09.01.2020
|
Year 1928
|
09:56:31
|
jim
|
|
Nondelegation doctrine
|
09:54:39
|
jim
|
|
REAL ID
|
09:44:56
|
jim
|
|
2.16.840.1.113719.1.203.4.27
|
09:12:13
|
jim
|
|
DhcpDomainName
|
09:11:47
|
jim
|
|
07.01.2020
|
Mobile Device Management
|
11:19:45
|
jim
|
|
Mobile Device
|
11:18:40
|
jim
|
|
MDM
|
11:16:07
|
jim
|
|
06.01.2020
|
Microsoft Passport
|
11:43:46
|
jim
|
|
Interactive
|
09:44:49
|
jim
|
|
Digest SSP
|
09:25:01
|
jim
|
|
Windows Logon Types
|
09:12:50
|
jim
|
|
04.01.2020
|
MsDS-User-Account-Control-Computed
|
12:37:38
|
jim
|
|
1.2.840.113556.1.4.1460
|
12:36:46
|
jim
|
|
1.3.6.1.4.1.1466.115.121.1.38
|
11:18:23
|
jim
|
|
SubschemaSubentry
|
11:13:26
|
jim
|
|
02.01.2020
|
Forward Reference
|
15:28:06
|
jim
|
|
01.01.2020
|
Health Level Seven
|
11:49:52
|
jim
|
|
LONIC
|
11:47:44
|
jim
|
|
CEN TC 251
|
11:42:51
|
jim
|
|
NFC Data Exchange Format
|
11:29:41
|
jim
|
|
Data exchange format
|
11:28:22
|
jim
|
|
Data exchange
|
11:25:54
|
jim
|
|
LDAP Data Interchange Format
|
11:18:10
|
jim
|
|
Logical Observation Identifiers Names and Codes
|
11:03:07
|
jim
|
|
Fast Healthcare Interoperability Resources
|
10:57:50
|
jim
|
|
31.12.2019
|
Attack Groups
|
10:16:20
|
jim
|
|
Advanced Persistent Threat
|
10:02:18
|
jim
|
|
SHA-3
|
09:37:59
|
jim
|
|
30.12.2019
|
Copyright And Intellectual Property Page
|
14:53:55
|
jim
|
|
Crypt
|
12:14:02
|
jim
|
|
Password Storage Scheme
|
12:12:49
|
jim
|
|
29.12.2019
|
Grant Types
|
10:04:13
|
jim
|
|
Resource Owner Password Credentials Grant
|
10:01:03
|
jim
|
|
Extensible Authentication Protocol
|
09:08:49
|
jim
|
|
RFC 1994
|
09:03:10
|
jim
|
|
27.12.2019
|
Prompt Parameter
|
12:03:27
|
jim
|
|
Time slicing
|
10:32:25
|
jim
|
|
Concurrency
|
10:30:42
|
jim
|
|
Processes
|
10:22:22
|
jim
|
|
Light-Weight Process
|
10:20:59
|
jim
|
|
Multitasking
|
10:19:55
|
jim
|
|
Shared Memory
|
10:15:33
|
jim
|
|
Thread
|
09:53:40
|
jim
|
|
Asynchronous Operation
|
09:32:51
|
jim
|
|
Principal
|
09:24:17
|
jim
|
|
Agile Principles
|
09:19:09
|
jim
|
|
Web Blog_blogentry_271219_1
|
09:10:22
|
jim
|
|
24.12.2019
|
Authorization Code Flow
|
09:56:10
|
jim
|
|
Code_verifier
|
09:54:45
|
jim
|
|
Code_challenge
|
09:52:39
|
jim
|
|
RFC 8418
|
09:40:00
|
jim
|
|
OAuth Public Client
|
09:27:15
|
jim
|
|
ArXiv.1901.11520
|
09:15:24
|
jim
|
|
ArXiv.1601.01229
|
09:11:10
|
jim
|
|
OAuth 2.0 Threat Model and Security Configurations
|
09:08:11
|
jim
|
|
OAuth 2.0 for Native Apps
|
08:53:27
|
jim
|
|
Covert Redirect Vulnerability
|
08:48:00
|
jim
|
|
23.12.2019
|
Single-Page Application
|
14:38:35
|
jim
|
|
17.12.2019
|
Digital Wallet
|
10:33:46
|
jim
|
|
Agent
|
10:26:50
|
jim
|
|
Truststore
|
10:17:13
|
jim
|
|
15.12.2019
|
Hard tokens
|
11:44:46
|
jim
|
|
Multi-Factor Authentication
|
11:29:43
|
jim
|
|
Troy Hunt
|
11:11:23
|
jim
|
|
Have I been pwned
|
11:07:43
|
jim
|
|
Password Dictionary
|
11:05:06
|
jim
|
|
Password Quality
|
11:00:43
|
jim
|
|
Password Spraying
|
10:59:10
|
jim
|
|
Attack
|
10:58:54
|
jim
|
|
Password Reuse
|
10:49:06
|
jim
|
|
Two-Factor Authentication
|
10:25:47
|
jim
|
|
RSA SecurID
|
10:14:24
|
jim
|
|
Password
|
10:03:49
|
jim
|
|
12.12.2019
|
Oauth.xyz
|
19:51:19
|
jim
|
|
08.12.2019
|
Web Blog_blogentry_111017_1
|
11:30:25
|
jim
|
|
Need to know
|
11:27:28
|
jim
|
|
Spying
|
11:26:26
|
jim
|
|
Espionage
|
11:25:51
|
jim
|
|
Rap Back
|
11:25:10
|
jim
|
|
United States Intelligence Community
|
11:20:01
|
jim
|
|
Office of the National Coordinator for Health Information Technology
|
11:18:46
|
jim
|
|
NATE
|
11:17:21
|
jim
|
|
Mobile Operator Discovery, Registration & Authentication
|
11:14:34
|
jim
|
|
OpenID Foundation
|
11:14:13
|
jim
|
|
Attribute Based Access Control
|
11:13:40
|
jim
|
|
AppConfig Community
|
11:13:06
|
jim
|
|
Object Management Group
|
11:12:37
|
jim
|
|
NIST Cybersecurity Framework
|
11:12:18
|
jim
|
|
ProjectVRM
|
11:11:36
|
jim
|
|
Uniform Commercial Code
|
11:10:58
|
jim
|
|
Initiative for Open Authentication
|
11:10:12
|
jim
|
|
Identity Assurance Work Group
|
11:09:38
|
jim
|
|
Adoption
|
11:09:07
|
jim
|
|
API Adoption
|
11:07:46
|
jim
|
|
Data Provenance
|
11:02:56
|
jim
|
|
Provenance
|
11:00:57
|
jim
|
|
02.12.2019
|
MemberUid
|
13:22:29
|
jim
|
|
28.11.2019
|
MITRE Corporation
|
10:13:50
|
jim
|
|
NCSD
|
10:12:02
|
jim
|
|
US-CERT
|
10:11:01
|
jim
|
|
United States Computer Emergency Readiness Team
|
10:10:23
|
jim
|
|
EINSTEIN
|
10:06:54
|
jim
|
|
National Cyber Security Division
|
10:02:57
|
jim
|
|
CWE
|
09:54:11
|
jim
|
|
Common Weakness Enumeration
|
09:53:41
|
jim
|
|
NCF
|
09:36:00
|
jim
|
|
Common Vulnerabilities and Exposures
|
09:35:04
|
jim
|
|
National Cybersecurity FFRDC
|
09:34:06
|
jim
|
|
22.11.2019
|
Scrum Master
|
07:47:57
|
jim
|
|
Scrum Team
|
07:47:34
|
jim
|
|
Scrum
|
07:47:07
|
jim
|
|
Scrum Guide
|
07:45:09
|
jim
|
|
Product Owner
|
07:26:04
|
jim
|
|
21.11.2019
|
Iteration Demo and Review
|
13:03:11
|
jim
|
|
19.11.2019
|
Thunderbolt
|
11:49:34
|
jim
|
|
18.11.2019
|
App2app
|
12:11:15
|
jim
|
|
OpenID Connect Client Initiated Backchannel Authentication Flow
|
11:59:15
|
jim
|
|
16.11.2019
|
Cloud Information Model
|
13:08:10
|
jim
|
|
Data model
|
13:05:20
|
jim
|
|
Schema
|
13:04:19
|
jim
|
|
CIM
|
12:38:28
|
jim
|
|
Common Information Model
|
12:37:50
|
jim
|
|
Homomorphic Encryption
|
12:35:21
|
jim
|
|
15.11.2019
|
SMSC
|
11:13:43
|
jim
|
|
Short Message Service Center
|
11:09:45
|
jim
|
|
Mobile Application Part
|
11:08:07
|
jim
|
|
Authentication Center
|
11:06:37
|
jim
|
|
14.11.2019
|
Velocity
|
14:42:12
|
jim
|
|
Capacity
|
14:38:17
|
jim
|
|
12.11.2019
|
ObjectGUID
|
09:17:41
|
jim
|
|
1.2.840.113556.1.4.2
|
09:16:28
|
jim
|
|
05.11.2019
|
Enable UserPassword in Microsoft Active Directory
|
09:57:17
|
jim
|
|
UnicodePwd
|
09:25:52
|
jim
|
|
04.11.2019
|
Copyright
|
17:40:47
|
jim
|
|
Copyleft
|
17:33:45
|
jim
|
|
Original work
|
17:31:20
|
jim
|
|
Data Ownership
|
17:29:49
|
jim
|
|
Product
|
17:26:14
|
jim
|
|
Possession Factor
|
17:25:19
|
jim
|
|
Royalty Fee
|
17:22:43
|
jim
|
|
Work For Hire
|
17:13:34
|
jim
|
|
Access
|
17:06:48
|
jim
|
|
Corporate Censorship
|
13:15:38
|
jim
|
|
Organizational Censorship
|
13:14:28
|
jim
|
|
Censorship
|
13:13:24
|
jim
|
|
Royalty-free
|
13:07:50
|
jim
|
|
RFC 1738
|
12:21:43
|
jim
|
|
RFC 2396
|
12:19:25
|
jim
|
|
RFC 4266
|
12:13:49
|
jim
|
|
RFC 4248
|
12:12:59
|
jim
|
|
RFC 8089
|
12:12:03
|
jim
|
|
03.11.2019
|
Functional Programming
|
10:45:05
|
jim
|
|
Software design
|
10:39:35
|
jim
|
|
Programming
|
10:38:10
|
jim
|
|
Vector
|
09:32:35
|
jim
|
|
31.10.2019
|
OpenID Connect Federation
|
11:58:35
|
jim
|
|
Chain of trust
|
11:54:01
|
jim
|
|
Certificate Chain
|
11:52:40
|
jim
|
|
OAuth 2.0 Authorization Server Metadata
|
11:21:54
|
jim
|
|
Now
|
11:09:57
|
jim
|
|
Simultaneity
|
11:09:29
|
jim
|
|
Time
|
11:02:00
|
jim
|
|
Single Sign-On
|
09:25:18
|
jim
|
|
Active Directory Federation Services
|
09:22:48
|
jim
|
|
Event
|
08:40:21
|
jim
|
|
ISO 8601
|
07:43:07
|
jim
|
|
DateTime
|
07:42:36
|
jim
|
|
30.10.2019
|
Cryptographic Key
|
11:50:21
|
jim
|
|
Key-Establishment
|
11:38:33
|
jim
|
|
Key-wrapping key
|
11:30:07
|
jim
|
|
KEK
|
11:29:43
|
jim
|
|
Key Encrypting Key
|
11:29:14
|
jim
|
|
Key
|
10:23:33
|
jim
|
|
NSA Suite B Cryptography
|
10:14:31
|
jim
|
|
Commercial National Security Algorithm Suite
|
10:09:17
|
jim
|
|
CNSA
|
10:05:30
|
jim
|
|
29.10.2019
|
United States Congressional Delegation of Power
|
10:34:47
|
jim
|
|
Our Lost Constitution
|
10:32:53
|
jim
|
|
NEA
|
10:20:55
|
jim
|
|
IEEPA
|
10:20:24
|
jim
|
|
United States Congress
|
10:17:25
|
jim
|
|
National Emergencies Act
|
10:11:58
|
jim
|
|
Export restrictions
|
09:58:00
|
jim
|
|
International Emergency Economic Powers Act
|
09:54:24
|
jim
|
|
28.10.2019
|
Distributed system
|
15:07:40
|
jim
|
|
Data Scraping
|
15:07:22
|
jim
|
|
AWS API
|
15:07:10
|
jim
|
|
API versioning
|
15:06:54
|
jim
|
|
API Economy
|
15:06:42
|
jim
|
|
Observability
|
15:06:24
|
jim
|
|
OAuth 2.0 Actors
|
15:06:12
|
jim
|
|
Messaging Application Programming Interface
|
15:05:51
|
jim
|
|
Java Card
|
15:05:22
|
jim
|
|
Interface Description Language
|
15:05:02
|
jim
|
|
Hardware Abstraction Layer
|
15:04:19
|
jim
|
|
GCP Permission
|
15:04:01
|
jim
|
|
Polyglot
|
15:03:36
|
jim
|
|
Operating-system-level virtualization
|
15:03:15
|
jim
|
|
Openliberty.org
|
15:02:54
|
jim
|
|
Ten Hundred Words
|
12:01:15
|
jim
|
|
Web Blog_blogentry_281019_1
|
11:18:25
|
jim
|
|
Thing Explainer
|
11:14:03
|
jim
|
|
IG
|
10:34:23
|
jim
|
|
Implicit Grant
|
10:33:59
|
jim
|
|
ACG
|
10:32:49
|
jim
|
|
Authorization Code Grant
|
10:32:12
|
jim
|
|
CCG
|
10:31:22
|
jim
|
|
Client Credentials Grant
|
10:31:01
|
jim
|
|
Real-Time Bidding
|
09:47:30
|
jim
|
|
Advertising ID
|
09:38:01
|
jim
|
|
Advertising technology
|
09:33:33
|
jim
|
|
Search Engine Marketing
|
09:28:15
|
jim
|
|
Advertising
|
09:24:51
|
jim
|
|
Protocol ossification
|
09:19:30
|
jim
|
|
27.10.2019
|
E.164
|
15:18:43
|
jim
|
|
Monitoring
|
10:35:13
|
jim
|
|
Application Metrics
|
10:31:11
|
jim
|
|
Telemetry
|
10:29:45
|
jim
|
|
API
|
10:27:33
|
jim
|
|
Transmission Control Protocol
|
10:27:12
|
jim
|
Application Programing Interface ==> Application Programming Interface |
Application Programming Interface
|
10:27:09
|
jim
|
Application Programing Interface ==> Application Programming Interface |
Lets encrypt
|
09:00:23
|
jim
|
|
Certificate Renewal
|
08:55:14
|
jim
|
|
26.10.2019
|
Data transparency
|
12:38:11
|
jim
|
|
Transparency
|
12:22:39
|
jim
|
|
Identity Broker
|
11:53:12
|
jim
|
|
Data aggregator
|
11:52:10
|
jim
|
|
Data Visibility
|
11:51:13
|
jim
|
|
Data Valuation
|
11:22:23
|
jim
|
|
Data
|
11:13:38
|
jim
|
|
Law Enforcement Consideration
|
11:04:37
|
jim
|
|
Data Breach
|
11:00:17
|
jim
|
|
Privacy
|
10:40:31
|
jim
|
|
21.10.2019
|
Equifax
|
10:30:33
|
jim
|
|
Open Identity Exchange
|
10:28:29
|
jim
|
|
DNS over HTTPS
|
10:07:22
|
jim
|
|
SSL-TLS Interception
|
10:00:14
|
jim
|
|
Relative IDentifier
|
09:58:33
|
jim
|
|
Short Message Service
|
09:57:41
|
jim
|
|
Authenticator App
|
09:56:11
|
jim
|
|
SessionData
|
09:55:10
|
jim
|
|
Web Blog_blogentry_150816_1
|
09:54:47
|
jim
|
|
Hijack
|
09:53:51
|
jim
|
|
RFC 7857
|
09:39:16
|
jim
|
|
17.10.2019
|
Subject
|
09:12:41
|
jim
|
|
Digital Subject
|
09:11:39
|
jim
|
|
Law of agency
|
09:01:39
|
jim
|
|
Account Linking
|
08:46:30
|
jim
|
|
14.10.2019
|
Phone subscriber
|
20:26:20
|
jim
|
|
Mobile Equipment Identifier
|
20:20:41
|
jim
|
|
Mobile
|
20:20:08
|
jim
|
|
0.9.2342.19200300.100.1.41
|
20:18:57
|
jim
|
|
Mobile Subscriber Identification Number
|
20:08:12
|
jim
|
|
Mobile Station
|
20:07:35
|
jim
|
|
MSID
|
20:06:36
|
jim
|
|
Home Location Register
|
20:00:58
|
jim
|
|
Mobile Station International Subscriber Directory Number
|
13:42:10
|
jim
|
|
Home Network Identity
|
13:34:47
|
jim
|
|
Public Land Mobile Network
|
13:33:52
|
jim
|
|
International Mobile Subscriber Identity
|
13:31:29
|
jim
|
|
Location Area Identity
|
13:26:51
|
jim
|
|
Mobile Connect
|
13:12:59
|
jim
|
|
Subscriber Identification Module
|
13:01:47
|
jim
|
|
CHV
|
12:58:52
|
jim
|
|
Passwordless SMS Authentication
|
12:39:32
|
jim
|
|
Mobile TAN
|
12:18:36
|
jim
|
|
SS7 hack
|
12:17:38
|
jim
|
|
NIST.SP.800-63C
|
12:16:17
|
jim
|
|
Password Authentication
|
11:48:29
|
jim
|
Passwordless Connection ==> Passwordless SMS Authentication |
Password-based
|
11:11:29
|
jim
|
|
Messaging Layer Security
|
09:25:27
|
jim
|
|
Security Layer
|
08:56:15
|
jim
|
|
MLS
|
08:50:56
|
jim
|
|
DID Authentication
|
08:44:14
|
jim
|
|
Self-Issued OpenID Provider
|
08:26:56
|
jim
|
|
SIOP
|
07:59:30
|
jim
|
|
Decentralized Identity Foundation
|
07:48:44
|
jim
|
|
13.10.2019
|
USB Type-C
|
10:24:02
|
jim
|
|
DisplayPort
|
10:23:07
|
jim
|
|
PCI Express
|
10:20:53
|
jim
|
|
PCI
|
10:15:19
|
jim
|
|
Universal Serial Bus
|
10:02:23
|
jim
|
|
USB-C
|
09:43:15
|
jim
|
|
Mini DisplayPort
|
09:34:44
|
jim
|
|
11.10.2019
|
UserInfo Response
|
10:26:43
|
jim
|
|
UserInfo Request
|
10:22:42
|
jim
|
|
Userinfo_endpoint
|
10:17:18
|
jim
|
|
AccountNameHistory
|
09:56:45
|
jim
|
|
Locality
|
09:25:29
|
jim
|
|
2.5.4.7
|
09:21:57
|
jim
|
|
L
|
09:20:34
|
jim
|
|
OrganizationalUnit
|
09:06:49
|
jim
|
|
Ou
|
08:57:36
|
jim
|
|
2.5.4.11
|
08:57:34
|
jim
|
|
OrganizationalUnitName
|
08:50:49
|
jim
|
|
Identity Token
|
08:05:28
|
jim
|
|
10.10.2019
|
AttributeSelection
|
09:25:10
|
jim
|
|
Retrieving All Attributes
|
09:23:46
|
jim
|
|
08.10.2019
|
CIAM
|
10:05:15
|
jim
|
|
General Data Protection Regulation
|
10:01:43
|
jim
|
|
Knowledge-Based Authentication
|
09:58:16
|
jim
|
|
Separation of Duty
|
09:57:49
|
jim
|
|
Identity Verification Service
|
09:56:22
|
jim
|
|
Security Information and Event Management
|
09:54:49
|
jim
|
|
Cross-site request forgery
|
09:54:12
|
jim
|
|
Accountability
|
09:53:06
|
jim
|
|
Data Protection
|
09:52:45
|
jim
|
|
Telemarketing and Consumer Fraud and Abuse Prevention Act
|
09:51:49
|
jim
|
|
Data Loss Prevention
|
09:46:49
|
jim
|
|
Prevention
|
09:44:48
|
jim
|
|
SIM Swap
|
09:41:43
|
jim
|
|
07.10.2019
|
IDM Related Compliance Items
|
14:22:33
|
jim
|
|
SAFE-BioPharma
|
14:19:39
|
jim
|
|
United States Food and Drug Administration
|
14:14:31
|
jim
|
|
Clinical Decision Support
|
14:14:06
|
jim
|
|
USFDA
|
14:09:57
|
jim
|
|
FDA
|
14:09:37
|
jim
|
|
Clinical Data
|
13:59:53
|
jim
|
|
Poverty
|
09:12:46
|
jim
|
|
OPAL Project
|
09:08:11
|
jim
|
|
International Monetary Fund
|
09:07:45
|
jim
|
|
Facial recognition
|
09:05:29
|
jim
|
|
COPPA
|
09:00:16
|
jim
|
|
Childrens Online Privacy Protection Act
|
08:56:40
|
jim
|
|
Web Blog_blogentry_071019_1
|
08:42:11
|
jim
|
|
Privacy And Security Conflicts
|
08:33:30
|
jim
|
|
End-to-end Encryption
|
08:27:45
|
jim
|
|
State secrets privilege
|
08:10:03
|
jim
|
|
Five Eyes Intelligence Alliance
|
07:26:58
|
jim
|
|
Privacy and Economics
|
07:22:50
|
jim
|
|
06.10.2019
|
NISTIR 8112
|
17:52:57
|
jim
|
|
FVEY
|
17:48:30
|
jim
|
|
Releasability
|
17:45:20
|
jim
|
|
NIST Interagency Report
|
17:39:10
|
jim
|
|
World Bank Group
|
10:10:09
|
jim
|
|
World Bank
|
10:05:16
|
jim
|
|
WBG
|
10:04:56
|
jim
|
|
United Nations Economic and Social Council
|
10:02:46
|
jim
|
|
ECOSOC
|
10:00:51
|
jim
|
|
Organization for Economic Cooperation and Development
|
09:55:45
|
jim
|
|
United Nations
|
09:55:19
|
jim
|
|
G20
|
09:44:40
|
jim
|
G-20 ==> G20 |
Group of 20
|
09:44:40
|
jim
|
G-20 ==> G20 |
Financial Action Task Force
|
09:42:56
|
jim
|
|
GAFI
|
09:40:40
|
jim
|
|
FATF
|
09:40:27
|
jim
|
|
G7
|
09:38:27
|
jim
|
|
ACH
|
09:28:35
|
jim
|
|
ISO 15022
|
09:19:08
|
jim
|
|
Society for Worldwide Interbank Financial Telecommunication
|
09:05:33
|
jim
|
|
03.10.2019
|
2.16.840.1.113730.3.4.9
|
08:44:33
|
jim
|
|
02.10.2019
|
ISO 7498
|
09:12:16
|
jim
|
|
NIST Privacy Framework
|
08:13:32
|
jim
|
|
User-agent
|
07:56:03
|
jim
|
|
30.09.2019
|
EnhancedSearchGuide
|
11:07:42
|
jim
|
|
Enhanced Guide
|
11:07:00
|
jim
|
|
1.3.6.1.4.1.1466.115.121.1.21
|
11:05:54
|
jim
|
|
SearchGuide
|
10:58:43
|
jim
|
|
BaseDN
|
10:51:28
|
jim
|
|
Russian Federation
|
10:47:06
|
jim
|
|
Union of Soviet Socialist Republics
|
10:46:16
|
jim
|
|
Commonwealth of Independent States
|
10:44:53
|
jim
|
|
2.5.4.14
|
10:42:36
|
jim
|
|
Country
|
10:37:53
|
jim
|
|
USSR
|
10:23:51
|
jim
|
|
National Security
|
09:35:45
|
jim
|
|
Legitimacy
|
09:35:12
|
jim
|
|
FAIRVIEW
|
09:32:28
|
jim
|
|
IDM and the Organization Dilemma
|
09:31:19
|
jim
|
|
Politics
|
09:29:23
|
jim
|
|
System
|
09:28:39
|
jim
|
|
26.09.2019
|
National Provider Identifier
|
10:29:39
|
jim
|
|
Medicare Beneficiary Identifier
|
10:27:45
|
jim
|
|
Medicare Number
|
10:18:49
|
jim
|
|
Unique Health IDentifier
|
10:17:54
|
jim
|
|
MBI
|
10:16:42
|
jim
|
|
Patient matching
|
09:15:13
|
jim
|
|
24.09.2019
|
DPPA
|
22:38:11
|
jim
|
|
Drivers Privacy Protection Act
|
22:37:51
|
jim
|
|
Digital Asset
|
14:35:03
|
jim
|
|
Revised Uniform Fiduciary Access to Digital Assets Act
|
14:33:50
|
jim
|
|
Client Operator
|
14:20:19
|
jim
|
|
Resource Servere Operator
|
14:19:24
|
jim
|
|
Authorization Server Operator
|
14:17:47
|
jim
|
|
Resource Rights Administrator
|
14:16:21
|
jim
|
|
OAuth Client
|
14:11:13
|
jim
|
|
Requesting Party
|
14:09:20
|
jim
|
|
Authorization Server
|
14:07:06
|
jim
|
|
Resource Server
|
14:05:42
|
jim
|
|
Network Crossover Cable
|
09:44:27
|
jim
|
|
Patch Cable
|
09:43:27
|
jim
|
|
Smart endpoints and dumb pipes
|
09:40:19
|
jim
|
|
Distributed-Queue Dual-Bus
|
09:39:16
|
jim
|
|
BUS
|
09:37:14
|
jim
|
|
I2C
|
09:27:20
|
jim
|
|
PC Hardware Cables
|
09:24:07
|
jim
|
|
IEEE 802
|
09:21:39
|
jim
|
|
23.09.2019
|
OAuth Confidential Client
|
13:15:58
|
jim
|
|
AppAuth
|
13:00:29
|
jim
|
|
Native application
|
12:52:58
|
jim
|
|
OAuth 2.0 Device Profile
|
12:49:45
|
jim
|
|
Risk Assessment
|
10:46:44
|
jim
|
|
Risk
|
10:30:33
|
jim
|
|
22.09.2019
|
Logging
|
20:45:56
|
jim
|
|
Metrics
|
20:42:42
|
jim
|
|
Auditing
|
20:37:04
|
jim
|
|
Common Event Format
|
20:31:03
|
jim
|
|
19.09.2019
|
Web Services Dynamic Discovery
|
08:39:24
|
jim
|
|
17.09.2019
|
1.2.840.113556.1.4.1941
|
16:32:21
|
jim
|
|
Discrimination
|
15:56:27
|
jim
|
|
Intolerance
|
15:44:07
|
jim
|
|
Web Blog_blogentry_170919_1
|
15:29:58
|
jim
|
|
Cell-Site Simulators
|
10:22:42
|
jim
|
|
Free Expression
|
10:09:11
|
jim
|
|
Merkle DAG
|
08:59:44
|
jim
|
|
16.09.2019
|
Law
|
15:03:00
|
jim
|
|
United States Privacy Act
|
13:19:31
|
jim
|
|
ISO 2382
|
12:41:03
|
jim
|
|
ISO 7816
|
12:37:55
|
jim
|
|
United States Code
|
11:05:07
|
jim
|
|
Public Law
|
11:02:39
|
jim
|
|
Infrastructure
|
09:21:09
|
jim
|
|
Infrastructure As Code
|
09:13:33
|
jim
|
|
Cloud Native
|
09:09:06
|
jim
|
|
Software Version Number
|
09:07:30
|
jim
|
|
Version
|
09:00:48
|
jim
|
|
14.09.2019
|
War on Poverty
|
10:37:52
|
jim
|
|
War on
|
10:24:37
|
jim
|
|
Copyrighted
|
09:21:03
|
jim
|
|
Social Websites
|
09:02:35
|
jim
|
|
Sociality
|
08:58:45
|
jim
|
|
Delegation
|
08:54:17
|
jim
|
|
DunbarS Numbers
|
08:51:25
|
jim
|
|
Hunter-gather
|
08:49:46
|
jim
|
|
Sympathy group
|
08:49:04
|
jim
|
|
Social network
|
08:47:33
|
jim
|
|
12.09.2019
|
Department of Motor Vehicle
|
08:26:38
|
jim
|
|
OPSG
|
08:14:59
|
jim
|
|
Operation Stonegarden
|
08:14:36
|
jim
|
|
FirstNet
|
08:06:45
|
jim
|
|
First Responder Network Authority
|
08:06:26
|
jim
|
|
Government Surveillance
|
07:56:36
|
jim
|
|
10.09.2019
|
Unauthorized
|
10:08:00
|
jim
|
|
Access Control Service
|
10:07:38
|
jim
|
|
Computer Fraud and Abuse Act
|
10:04:00
|
jim
|
|
09.09.2019
|
Tribe
|
11:07:40
|
jim
|
|
Megaband
|
11:07:25
|
jim
|
|
Friends
|
11:07:09
|
jim
|
|
Clique
|
11:06:09
|
jim
|
|
Social contract
|
10:45:28
|
jim
|
|
Spam
|
10:42:09
|
jim
|
|
Solid
|
10:40:59
|
jim
|
|
JF2 Post Serialization Format
|
10:39:40
|
jim
|
|
Identity Web Services Framework
|
10:39:17
|
jim
|
|
Google
|
10:37:54
|
jim
|
|
Blinding Identity Taxonomy
|
10:35:26
|
jim
|
|
DNS Privacy Considerations
|
09:31:53
|
jim
|
|
DNSCurve
|
09:22:13
|
jim
|
|
OpenDNS
|
09:11:45
|
jim
|
|
CISCO
|
09:08:48
|
jim
|
|
07.09.2019
|
Terrorist Screening Database
|
10:55:45
|
jim
|
|
National Crime Information Center
|
10:54:21
|
jim
|
|
CJIS
|
10:39:19
|
jim
|
|
Criminal Justice Information Services
|
10:38:41
|
jim
|
|
Facial Analysis, Comparison, and Evaluation
|
10:34:17
|
jim
|
|
FACE
|
10:26:11
|
jim
|
|
GAO
|
10:14:58
|
jim
|
|
United States Government Accountability Office
|
10:14:38
|
jim
|
|
Next Generation Identification
|
10:09:43
|
jim
|
|
Repository for Individuals of Special Concern
|
09:57:45
|
jim
|
|
Advanced Fingerprint Identification Technology
|
09:57:11
|
jim
|
|
Interstate Photo System
|
09:56:46
|
jim
|
|
International Association for Identification
|
09:52:38
|
jim
|
|
Tenprint
|
09:50:32
|
jim
|
|
IPS
|
09:45:05
|
jim
|
|
Surveillance
|
09:31:20
|
jim
|
|
Video Data Intelligence
|
09:27:03
|
jim
|
|
03.09.2019
|
FAPI Read Write API Security Profile
|
20:08:02
|
jim
|
|
FAPI Read Only API Security Profile
|
20:03:59
|
jim
|
|
FAPI Pushed Request Object
|
19:58:31
|
jim
|
|
RFC 3112
|
13:50:22
|
jim
|
|
Authentication Password Syntax
|
13:45:28
|
jim
|
|
Identifier
|
10:52:37
|
jim
|
|
Indirect Identifier
|
10:51:46
|
jim
|
|
Pseudonymous
|
10:50:56
|
jim
|
|
Attribute
|
10:47:10
|
jim
|
|
Metadata
|
10:44:01
|
jim
|
|
Unidirectional identifier
|
10:29:14
|
jim
|
|
Omnidirectional identifier
|
10:26:45
|
jim
|
|
Identity Attributes
|
10:02:21
|
jim
|
|
PIID
|
09:44:10
|
jim
|
|
Personal data
|
09:20:22
|
jim
|
|
02.09.2019
|
Informed Consent
|
09:57:33
|
jim
|
|
Consent vs Authorization
|
09:53:58
|
jim
|
|
Health information
|
09:48:05
|
jim
|
|
ADA Amendments Act of 2008
|
09:45:40
|
jim
|
|
Protected Health Information
|
09:44:41
|
jim
|
|
Treatment, Payment and Health care Operations
|
09:43:31
|
jim
|
|
Health Insurance Portability and Accountability Act
|
09:39:03
|
jim
|
|
HHSOCR
|
09:12:29
|
jim
|
|
01.09.2019
|
Nucleotide
|
08:26:47
|
jim
|
|
DNA
|
08:12:58
|
jim
|
|
Ownership
|
07:51:23
|
jim
|
|
31.08.2019
|
Project Zero
|
08:57:12
|
jim
|
|
30.08.2019
|
Transport Layer Security
|
09:29:32
|
jim
|
|
NIST.SP.800-52
|
09:13:20
|
jim
|
|
Floating-point
|
08:41:17
|
jim
|
|
IEEE 754
|
08:31:35
|
jim
|
|
29.08.2019
|
American Medical Association
|
10:34:38
|
jim
|
|
Web Blog_blogentry_290819_1
|
10:31:42
|
jim
|
|
28.08.2019
|
Sexual orientation
|
13:04:23
|
jim
|
|
Americans with Disabilities Act
|
12:45:04
|
jim
|
|
ADA
|
12:41:51
|
jim
|
|
Civil Right
|
12:37:28
|
jim
|
|
Disability
|
12:34:12
|
jim
|
|
Race
|
12:30:00
|
jim
|
|
Skin color
|
12:14:40
|
jim
|
|
BirthDate
|
12:09:37
|
jim
|
|
Sovrin
|
12:08:21
|
jim
|
|
OpenID Connect Standard Claims
|
12:08:06
|
jim
|
|
JSON Web Token Claims
|
12:07:09
|
jim
|
|
Gender
|
12:06:47
|
jim
|
|
Default Profile Claims
|
12:06:13
|
jim
|
|
Gender identity
|
12:01:26
|
jim
|
|
Ethnic
|
11:59:26
|
jim
|
|
Hate speech
|
11:57:19
|
jim
|
|
Ageism
|
11:39:44
|
jim
|
|
Age
|
11:37:09
|
jim
|
|
Amendment I
|
11:25:46
|
jim
|
|
Data Privacy
|
11:24:33
|
jim
|
|
Legal right
|
11:21:07
|
jim
|
|
Religion
|
11:16:44
|
jim
|
|
STORMBREW
|
11:09:17
|
jim
|
|
Automated Targeting System
|
11:08:36
|
jim
|
|
Foreign Intelligence Surveillance Act
|
11:06:11
|
jim
|
|
Electronic Identity Verification
|
11:05:07
|
jim
|
|
Operational Risk
|
11:03:51
|
jim
|
|
Countering the Financing of Terrorism
|
11:03:09
|
jim
|
|
Terrorism
|
11:00:52
|
jim
|
|
United States Immigration and Customs Enforcement
|
10:57:36
|
jim
|
|
Behavioral analytics
|
10:55:16
|
jim
|
|
Executive order
|
10:52:04
|
jim
|
|
President of the United States of America
|
10:40:04
|
jim
|
|
United States Executive Branch
|
10:38:46
|
jim
|
|
Integrated Automated Fingerprint Identification System
|
09:23:05
|
jim
|
|
Analytics
|
09:19:02
|
jim
|
|
User and Entity Behavior Analytics
|
09:09:31
|
jim
|
|
Behavioral Characteristics
|
09:08:38
|
jim
|
|
27.08.2019
|
Telegram
|
09:20:37
|
jim
|
|
GRAM
|
09:07:00
|
jim
|
|
TON
|
09:05:49
|
jim
|
|
Telegram Open Network
|
09:05:32
|
jim
|
|
Elasticity
|
08:20:28
|
jim
|
|
Container
|
08:19:02
|
jim
|
|
Load Balancing
|
08:14:15
|
jim
|
|
Scalability
|
08:13:33
|
jim
|
|
Sharding
|
08:10:54
|
jim
|
|
Shard
|
08:07:46
|
jim
|
|
Web Blog_blogentry_270819_1
|
07:53:41
|
jim
|
|
26.08.2019
|
ISR
|
19:05:12
|
jim
|
|
IL
|
19:04:33
|
jim
|
|
Israel
|
19:03:09
|
jim
|
|
Mellanox Technologies
|
18:53:08
|
jim
|
|
OpenPOWER Foundation
|
18:50:13
|
jim
|
|
Linux Foundation
|
18:34:17
|
jim
|
|
Family Educational Rights and Privacy Act
|
12:51:26
|
jim
|
|
Portable Document Format
|
12:44:43
|
jim
|
|
PDF
|
12:41:37
|
jim
|
|
The Next Big Thing
|
12:40:36
|
jim
|
|
Consent Receipts
|
12:23:45
|
jim
|
|
Web Blog_blogentry_260819_1
|
08:51:09
|
jim
|
|
24.08.2019
|
Universal Second Factor Challenges
|
10:49:55
|
jim
|
|
Reflection Style
|
10:48:58
|
jim
|
|
Firebug
|
10:47:53
|
jim
|
|
Opera
|
10:46:15
|
jim
|
|
Cross Origin Resource Sharing
|
10:42:10
|
jim
|
|
HTTP OPTIONS
|
10:22:03
|
jim
|
|
23.08.2019
|
Calling Number Delivery
|
10:37:38
|
jim
|
|
CDN
|
10:37:27
|
jim
|
|
CND
|
10:37:10
|
jim
|
|
VSC
|
10:26:58
|
jim
|
|
Vertical Service Code
|
10:26:42
|
jim
|
|
Caller ID
|
10:21:00
|
jim
|
|
Telecommunications Network Chain
|
10:18:33
|
jim
|
|
Local Exchange
|
10:16:12
|
jim
|
|
Customer Premises Equipment
|
10:14:40
|
jim
|
|
CPE
|
10:07:07
|
jim
|
|
POTS
|
09:58:15
|
jim
|
|
Public Switched Telephone Network
|
09:57:18
|
jim
|
|
Loop Start
|
09:55:44
|
jim
|
|
Land Line
|
09:48:32
|
jim
|
|
Spoofing
|
09:32:07
|
jim
|
|
Artificial Conversational Entity
|
09:18:23
|
jim
|
|
Virtual assistant
|
09:18:04
|
jim
|
|
Voice
|
09:15:33
|
jim
|
|
Implicit Flow
|
08:52:04
|
jim
|
|
22.08.2019
|
Public Interest Registry
|
07:50:47
|
jim
|
|
ISOC
|
07:44:17
|
jim
|
|
Internet Society
|
07:43:40
|
jim
|
|
Internet Corporation for Assigned Names and Numbers
|
07:39:54
|
jim
|
|
.org
|
07:38:01
|
jim
|
|
21.08.2019
|
Web Blog_blogentry_210819_1
|
08:51:23
|
jim
|
|
19.08.2019
|
Verified_claims
|
12:30:39
|
jim
|
|
Tracking
|
12:25:05
|
jim
|
|
AdvertisingIdentifier
|
11:21:18
|
jim
|
|
Identifier for Advertisers
|
11:20:38
|
jim
|
|
Advanced Message Queuing Protocol
|
09:39:39
|
jim
|
|
AMQP
|
09:39:05
|
jim
|
|
WebSocket
|
09:25:33
|
jim
|
|
Publish-Subscribe
|
09:21:41
|
jim
|
|
Google Cloud Pub-Sub
|
09:19:59
|
jim
|
|
Pub-sub
|
09:17:49
|
jim
|
|
17.08.2019
|
Input-constrained device
|
09:36:24
|
jim
|
|
OAuth 2.0 Device Authorization Grant
|
09:36:01
|
jim
|
|
RFC 8628
|
09:34:09
|
jim
|
|
15.08.2019
|
North American Numbering Plan
|
11:43:12
|
jim
|
|
National Destination Code
|
10:54:32
|
jim
|
|
Number Plan Area
|
10:47:32
|
jim
|
|
NXX
|
10:39:05
|
jim
|
|
Data Leakage
|
08:57:48
|
jim
|
|
What is missing in OAuth 2.0
|
08:47:14
|
jim
|
|
Wendy
|
08:46:43
|
jim
|
|
TLS Client Authentication
|
08:45:57
|
jim
|
|
Side-channel attacks
|
08:44:36
|
jim
|
|
Privacy Considerations Distributed Ledger Technology
|
08:40:56
|
jim
|
|
Passive attacker
|
08:40:07
|
jim
|
|
OAuth 2.0 Vulnerabilities
|
08:39:28
|
jim
|
|
CRIME
|
08:36:50
|
jim
|
|
Block Cipher Mode
|
08:36:32
|
jim
|
|
Whistleblower
|
08:34:07
|
jim
|
|
Credential Leakage
|
08:29:55
|
jim
|
|
Tokenization Service
|
08:28:08
|
jim
|
|
14.08.2019
|
Body Worn Cameras
|
15:42:24
|
jim
|
|
Automated License Plate Reader
|
11:18:21
|
jim
|
|
Motorola Solutions
|
11:17:38
|
jim
|
|
Vigilant Solutions
|
11:14:17
|
jim
|
|
Web Blog_blogentry_081018_1
|
11:07:41
|
jim
|
|
12.08.2019
|
Zero-day
|
09:31:19
|
jim
|
Zero-day exploits ==> Zero-day |
Rowhammer
|
09:15:10
|
jim
|
|
Google Native Client
|
09:09:49
|
jim
|
|
Web Blog_blogentry_120819_1
|
08:54:02
|
jim
|
|
11.08.2019
|
Fiat Currency
|
08:35:54
|
jim
|
|
10.08.2019
|
Money
|
20:02:01
|
jim
|
|
08.08.2019
|
Foundational ID
|
11:03:57
|
jim
|
|
Government Identity
|
10:53:57
|
jim
|
|
MOSIP
|
10:51:43
|
jim
|
|
National Identification Number
|
10:50:57
|
jim
|
|
Legal Entity Identifier
|
10:49:32
|
jim
|
|
Modular Open Source Identity Platform
|
10:38:08
|
jim
|
|
Good ID
|
09:48:24
|
jim
|
|
Identity Custodian
|
09:40:38
|
jim
|
|
Self-Sovereign Identity
|
08:46:37
|
jim
|
|
05.08.2019
|
Amazon Web Services
|
15:04:26
|
jim
|
|
RDS
|
14:26:35
|
jim
|
|
AWS Relational Database Services
|
14:26:15
|
jim
|
|
AWS IAM
|
14:24:56
|
jim
|
|
AWS Role
|
14:24:23
|
jim
|
|
AWS CLI
|
14:23:55
|
jim
|
|
AWS Security Group
|
13:40:47
|
jim
|
|
FanOutDriver
|
11:17:27
|
jim
|
|
FanOutDriverPlatformReceiverRunModes
|
11:14:02
|
jim
|
|
CIBA
|
10:18:26
|
jim
|
|
04.08.2019
|
Toyota Production System
|
09:19:02
|
jim
|
|
DNS cache poisoning
|
09:07:09
|
jim
|
|
Nationality
|
08:39:24
|
jim
|
|
Citizen
|
08:38:35
|
jim
|
|
Citizenship
|
08:35:20
|
jim
|
|
Nationals
|
08:29:33
|
jim
|
|
American Samoa
|
08:22:45
|
jim
|
|
United States Virgin Islands
|
08:21:05
|
jim
|
|
Palmyra Atoll
|
08:12:21
|
jim
|
|
02.08.2019
|
Currency
|
08:59:55
|
jim
|
|
01.08.2019
|
Serverless
|
09:48:53
|
jim
|
|
Functions as a Service
|
09:07:34
|
jim
|
|
Cloud functions
|
09:04:40
|
jim
|
|
31.07.2019
|
Graphics Cables
|
12:17:10
|
jim
|
|
2.16.840.1.113719.1.4.0.3.2.48
|
12:06:28
|
jim
|
Resolution ==> Resolution_AttrubuteType |
2.16.840.1.113719.1.4.2.2.0
|
12:06:28
|
jim
|
Resolution ==> Resolution_AttrubuteType |
Resolution_AttrubuteType
|
12:06:28
|
jim
|
Resolution ==> Resolution_AttrubuteType |
Credential Reuse
|
12:04:59
|
jim
|
|
Liability
|
09:12:50
|
jim
|
|
Accountable
|
09:05:43
|
jim
|
|
EMV Liability Shift
|
09:05:24
|
jim
|
|
Telecommunications
|
08:58:55
|
jim
|
|
Web Blog_blogentry_240815_1
|
08:47:34
|
jim
|
|
RUFADAA
|
08:45:16
|
jim
|
|
Fiduciary Responsibility
|
08:26:55
|
jim
|
|
30.07.2019
|
Blue-Green Deployment
|
17:31:18
|
jim
|
|
Kubernetes Service
|
17:13:10
|
jim
|
|
YAML
|
17:06:41
|
jim
|
|
Kubernetes
|
16:56:41
|
jim
|
|
Kubernetes Pod
|
16:44:31
|
jim
|
|
Kubernetes Node
|
16:44:10
|
jim
|
|
Software library
|
15:22:53
|
jim
|
|
Continuous Improvement
|
15:06:04
|
jim
|
|
TokenGroups
|
10:52:00
|
jim
|
|
Group-AD
|
09:38:45
|
jim
|
|
Boolean Sensitivity
|
09:14:29
|
jim
|
|
Web Blog_blogentry_300719_1
|
09:04:47
|
jim
|
|
Server-side TLS configuration guide
|
07:57:17
|
jim
|
|
27.07.2019
|
Proxy Server
|
08:54:11
|
jim
|
|
Reverse Proxy
|
08:48:26
|
jim
|
|
Gateway
|
08:44:18
|
jim
|
|
Application Load Balancing
|
08:36:27
|
jim
|
|
GCP Virtual Private Cloud
|
08:11:51
|
jim
|
|
Proxy
|
08:07:34
|
jim
|
|
26.07.2019
|
Key Generation
|
17:49:18
|
jim
|
|
ROPC
|
08:27:05
|
jim
|
|
25.07.2019
|
Knowledge Consistency Checker
|
12:54:07
|
jim
|
|
Forest functional levels
|
12:35:28
|
jim
|
|
KCC
|
12:32:04
|
jim
|
|
Global Catalog
|
12:28:36
|
jim
|
|
AD DOMAIN
|
12:26:45
|
jim
|
|
2.16.840.1.113719.1.1.4.1.172
|
11:59:23
|
jim
|
|
DsRevision
|
11:12:21
|
jim
|
|
Determine LDAP Server Vendor
|
11:07:14
|
jim
|
|
Verifiable Credentials
|
09:43:08
|
jim
|
|
Verifiable Claims
|
09:42:41
|
jim
|
|
Web Blog_blogentry_250719_1
|
09:26:39
|
jim
|
|
23.07.2019
|
English
|
09:08:33
|
jim
|
|
En
|
09:08:01
|
jim
|
|
Language-Tag
|
09:06:46
|
jim
|
|
Language-subtag
|
09:01:24
|
jim
|
|
GB
|
08:55:17
|
jim
|
|
Blockchain
|
08:49:19
|
jim
|
|
Video Surveillance
|
08:44:29
|
jim
|
|
License
|
08:36:38
|
jim
|
|
Licence
|
08:32:21
|
jim
|
|
Firearms License
|
08:24:07
|
jim
|
|
Nautical License
|
08:23:23
|
jim
|
|
Examples of Evidence
|
08:21:00
|
jim
|
|
Workplace Surveillance
|
08:09:54
|
jim
|
Surveillance in the Workplace ==> Workplace Surveillance |
ANPR
|
08:04:44
|
jim
|
|
Emotion
|
07:36:21
|
jim
|
|
Convolutional Neural Network
|
07:31:37
|
jim
|
|
22.07.2019
|
United States Constitution
|
13:10:40
|
jim
|
|
Amendment XI
|
13:08:15
|
jim
|
|
Amendment X
|
12:58:17
|
jim
|
|
Amendment IX
|
12:57:45
|
jim
|
|
Amendment II
|
12:57:00
|
jim
|
|
Amendment VIII
|
12:56:37
|
jim
|
|
Amendment VII
|
12:56:01
|
jim
|
|
Amendment VI
|
12:55:23
|
jim
|
|
Amendment V
|
12:54:41
|
jim
|
|
Amendment IV
|
12:54:08
|
jim
|
|
Amendment III
|
12:53:07
|
jim
|
|
Bill of Rights
|
12:48:36
|
jim
|
|
Transcription United States Constitution
|
12:25:53
|
jim
|
|
Government abuse
|
12:10:00
|
jim
|
|
Usurpation
|
12:07:51
|
jim
|
|
INA
|
11:51:07
|
jim
|
|
Immigration and Nationality Act
|
11:50:44
|
jim
|
|
Lawful Permanent Resident
|
11:48:17
|
jim
|
|
Open-source intelligence
|
11:40:30
|
jim
|
|
OSINT
|
11:39:57
|
jim
|
|
Investigative Data Warehouse
|
11:38:06
|
jim
|
|
Translingual Information Detection, Extraction and Summarization
|
11:36:17
|
jim
|
|
TIDES
|
11:34:42
|
jim
|
|
System of Records Notice
|
11:16:24
|
jim
|
|
Web Blog_blogentry_260816_1
|
11:02:57
|
jim
|
|
Best Practices For Unique Identifiers
|
11:01:50
|
jim
|
|
Government Data Store
|
10:49:00
|
jim
|
|
Right to Financial Privacy Act
|
10:45:45
|
jim
|
|
Customer Identification Program
|
10:45:18
|
jim
|
|
Web Blog_blogentry_220719_1
|
10:22:51
|
jim
|
|
Government
|
10:19:23
|
jim
|
|
Bitcoin network genesis block
|
09:27:04
|
jim
|
|
Nakamoto consensus
|
09:24:43
|
jim
|
|
SHA-2
|
09:23:30
|
jim
|
|
Paul Calder Le Roux
|
09:07:48
|
jim
|
|
Satoshi Nakamoto
|
08:56:45
|
jim
|
|
Encryption for the Masses
|
08:31:52
|
jim
|
|
E4M
|
08:29:56
|
jim
|
|
21.07.2019
|
Location Area Code
|
13:31:26
|
jim
|
|
User Equipment
|
13:27:13
|
jim
|
|
Tracking Area
|
13:21:05
|
jim
|
|
Tracking Area Code
|
13:15:58
|
jim
|
|
TAC
|
13:05:42
|
jim
|
|
CELLID
|
12:46:04
|
jim
|
|
FASCIA
|
12:41:45
|
jim
|
|
DROPOUTJEEP
|
12:41:09
|
jim
|
|
Web Blog_blogentry_210719_1
|
12:18:19
|
jim
|
|
AWS Shield
|
11:57:35
|
jim
|
|
0-RTT Handshakes
|
11:54:35
|
jim
|
|
Network Address Translation
|
11:51:59
|
jim
|
|
Interconnection
|
11:50:15
|
jim
|
|
Carrier-Sense Multiple Access
|
11:49:43
|
jim
|
|
LDAP Protocol dependencies
|
11:49:08
|
jim
|
|
No CVM required
|
11:48:31
|
jim
|
|
Google Global Cache
|
11:47:45
|
jim
|
|
HAMMERCORE
|
11:44:15
|
jim
|
|
HAMMERSTEIN
|
11:43:35
|
jim
|
|
SYNC
|
11:42:53
|
jim
|
|
Firewall
|
11:42:10
|
jim
|
|
HTTP Over TLS
|
11:40:18
|
jim
|
|
Web Blog_blogentry_021117_1
|
11:39:36
|
jim
|
|
Traffic
|
11:38:23
|
jim
|
|
Network traffic
|
11:37:52
|
jim
|
|
Edge Proxy
|
11:34:31
|
jim
|
|
Payload
|
11:32:43
|
jim
|
|
Network devices
|
11:24:46
|
jim
|
|
Network Switches
|
11:20:37
|
jim
|
|
Node
|
11:18:01
|
jim
|
|
2.16.840.1.113719.1.1.4.1.55
|
11:16:39
|
jim
|
|
Internet
|
11:15:38
|
jim
|
|
NetworkAddress
|
11:13:52
|
jim
|
|
Bridging
|
11:02:05
|
jim
|
|
Routing
|
10:57:18
|
jim
|
|
End-to-End Security
|
09:56:23
|
jim
|
|
Email Address
|
09:42:54
|
jim
|
|
20.07.2019
|
ARCOS
|
21:55:49
|
jim
|
|
18.07.2019
|
Legal Person
|
14:45:41
|
jim
|
|
Limber
|
12:02:53
|
jim
|
|
NdsStatusLimber
|
11:55:19
|
jim
|
|
LDAP Extensions and Controls Listing
|
11:40:27
|
jim
|
|
Ndstrace
|
11:37:56
|
jim
|
|
LMBR
|
11:32:56
|
jim
|
|
2.16.840.1.113719.1.1.4.1.517
|
11:10:45
|
jim
|
|
Continuous Delivery
|
10:30:50
|
jim
|
|
Continuous integration
|
10:17:20
|
jim
|
|
Continuous testing
|
10:14:46
|
jim
|
|
Software development practice
|
10:01:04
|
jim
|
|
Operating System
|
09:43:19
|
jim
|
|
DOS
|
09:26:13
|
jim
|
|
DECnet
|
09:13:51
|
jim
|
|
ARP Poisoning
|
09:07:49
|
jim
|
|
Address Resolution Protocol
|
09:06:17
|
jim
|
|
VINES Internetwork Protocol
|
09:03:35
|
jim
|
|
ARP
|
08:57:22
|
jim
|
|
Domain-based Message Authentication, Reporting & Conformance
|
08:52:15
|
jim
|
|
RFC 6376
|
08:50:12
|
jim
|
|
DomainKeys Identified Mail
|
08:48:54
|
jim
|
|
DKIM
|
08:34:29
|
jim
|
|
RFC 7208
|
08:33:17
|
jim
|
|
Sender Policy Framework
|
08:31:29
|
jim
|
|
SPF
|
08:21:15
|
jim
|
|
RFC 7489
|
08:12:18
|
jim
|
|
DMARC
|
08:08:04
|
jim
|
|
Web Blog_blogentry_180719_1
|
08:07:29
|
jim
|
|
17.07.2019
|
LDAP and Active Directory
|
11:55:00
|
jim
|
|
Cyber Attack as a Service
|
09:00:49
|
jim
|
|
CAaaS
|
08:49:49
|
jim
|
|
Web Blog_blogentry_170719_1
|
08:45:14
|
jim
|
|
16.07.2019
|
OAuth 2.0 NOT an Authentication protocol
|
10:11:32
|
jim
|
|
Data disclosure
|
09:40:19
|
jim
|
|
Data loss
|
09:39:03
|
jim
|
|
Right of access
|
09:03:54
|
jim
|
|
Disclosure-Alteration-Destruction
|
08:42:56
|
jim
|
|
NIST.SP.800-122
|
08:22:28
|
jim
|
|
15.07.2019
|
Cloud Pricing
|
19:21:16
|
jim
|
|
Cloud computing
|
19:12:07
|
jim
|
|
NIST.SP.800-63B
|
13:44:35
|
jim
|
|
14.07.2019
|
State
|
09:40:09
|
jim
|
|
Constitutional Order
|
09:38:00
|
jim
|
|
Sovereignty
|
09:37:32
|
jim
|
|
DHS Office of Intelligence and Analysis
|
09:15:53
|
jim
|
|
Fusion centers
|
09:06:33
|
jim
|
|
13.07.2019
|
Palantir Gotham
|
09:52:04
|
jim
|
|
DMV
|
09:41:41
|
jim
|
|
FEMA
|
09:26:00
|
jim
|
|
United States Federal Emergency Management Agency
|
09:25:29
|
jim
|
|
Palantir Metropolis
|
08:51:36
|
jim
|
|
Web Blog_blogentry_130719_1
|
08:35:56
|
jim
|
|
E2EE
|
08:21:38
|
jim
|
|
12.07.2019
|
Entanglement
|
07:57:51
|
jim
|
|
2.5.6.3
|
07:48:07
|
jim
|
|
10.07.2019
|
Id_token_hint
|
15:19:07
|
jim
|
|
Certification Authority Browser Forum
|
10:27:58
|
jim
|
|
Extended Validation Certificate
|
10:26:20
|
jim
|
|
Certificate Level Of Assurance
|
10:25:04
|
jim
|
|
Organization Validated Certificate
|
10:17:35
|
jim
|
|
Domain Validated Certificate
|
10:15:38
|
jim
|
|
08.07.2019
|
Tomcat And LDAP
|
14:15:53
|
jim
|
|
Keystore
|
14:00:12
|
jim
|
|
AWS Elastic Kubernetes Service
|
13:18:14
|
jim
|
|
AWS VPN
|
13:10:33
|
jim
|
|
AWS Direct Connect
|
12:59:05
|
jim
|
|
AWS Virtual Private Cloud
|
12:57:20
|
jim
|
|
AWS Elastic File System
|
12:47:47
|
jim
|
|
AWS Elastic Cloud Compute
|
12:23:50
|
jim
|
|
On demand
|
12:16:16
|
jim
|
|
Microservice
|
12:14:47
|
jim
|
|
AWS Elastic Block Store
|
12:11:54
|
jim
|
|
S3
|
09:28:29
|
jim
|
|
Object storage
|
09:28:03
|
jim
|
|
Data-lake
|
09:27:36
|
jim
|
|
AWS Simple Storage Service
|
09:27:00
|
jim
|
Amazon Simple Storage Service ==> AWS Simple Storage Service |
Java Cryptography Extensions
|
09:24:36
|
jim
|
|
JCE
|
09:23:07
|
jim
|
|
Java Authentication and Authorization Service
|
09:22:44
|
jim
|
|
AWS CloudHSM
|
09:19:30
|
jim
|
|
AWS API-Gateway
|
09:09:27
|
jim
|
|
AWS Web Application Firewall
|
09:03:29
|
jim
|
|
OSI-Model
|
09:00:23
|
jim
|
|
07.07.2019
|
AWS Application Load Balancer
|
21:08:55
|
jim
|
|
EC2
|
21:00:16
|
jim
|
Amazon Elastic Cloud Compute ==> AWS Elastic Cloud Compute |
Virtual Private Cloud
|
21:00:16
|
jim
|
Amazon Elastic Cloud Compute ==> AWS Elastic Cloud Compute |
EBS
|
20:59:36
|
jim
|
|
AWS Amazon MQ
|
20:58:34
|
jim
|
|
AWS Route 53
|
20:52:36
|
jim
|
|
NFS
|
20:48:55
|
jim
|
|
RFC 7862
|
20:48:39
|
jim
|
|
Network File System
|
20:47:43
|
jim
|
|
AWS Serverless Application Repository
|
20:38:49
|
jim
|
|
ECR
|
20:34:04
|
jim
|
|
AWS Elastic Container Registry
|
20:33:39
|
jim
|
AWS Amazon Elastic Container Registry ==> AWS Elastic Container Registry |
ECS
|
20:33:23
|
jim
|
|
AWS Elastic Container Service
|
20:32:53
|
jim
|
|
AWS Management Console
|
15:56:51
|
jim
|
|
AWS Elastic Beanstalk
|
15:32:06
|
jim
|
|
AB Testing
|
15:21:58
|
jim
|
|
AWS Trusted Advisor
|
14:40:28
|
jim
|
|
Reliability
|
14:36:35
|
jim
|
|
Durability
|
14:35:38
|
jim
|
|
RFC 793
|
12:03:33
|
jim
|
|
TIME-WAIT
|
12:02:48
|
jim
|
|
MSL
|
12:00:07
|
jim
|
|
Connection
|
10:35:31
|
jim
|
|
LISTEN
|
10:29:33
|
jim
|
|
SYN-RECEIVED
|
10:27:14
|
jim
|
|
SYN-ACK
|
10:23:16
|
jim
|
|
SYN-SENT
|
10:20:06
|
jim
|
|
ASCII Table
|
10:17:57
|
jim
|
SYN ==> SYN-SENT |
Control character
|
10:17:57
|
jim
|
SYN ==> SYN-SENT |
Temp
|
10:17:57
|
jim
|
SYN ==> SYN-SENT |
ESTABLISHED
|
10:13:49
|
jim
|
|
Shared Responsibility Model
|
09:55:55
|
jim
|
|
AWS Inspector
|
09:30:09
|
jim
|
|
06.07.2019
|
Privacy Paradox
|
13:38:58
|
jim
|
|
Internet Trends Report
|
13:37:33
|
jim
|
|
Venture Capitalist
|
13:30:38
|
jim
|
|
Mary Meeker
|
13:29:29
|
jim
|
|
Privacy by Design
|
12:54:39
|
jim
|
|
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
|
09:52:13
|
jim
|
|
HMQV
|
09:49:02
|
jim
|
|
Elliptic Curve
|
09:48:27
|
jim
|
|
Backdoor
|
09:43:53
|
jim
|
|
EvilRegime
|
09:42:16
|
jim
|
|
Web Blog_blogentry_021017_1
|
09:41:11
|
jim
|
|
Optic Nerve
|
09:40:16
|
jim
|
|
Dual Elliptic Curve Deterministic Random Bit Generator
|
09:33:18
|
jim
|
|
Dual_EC_DRBG
|
09:28:57
|
jim
|
|
Trapdoor Function
|
09:09:08
|
jim
|
|
05.07.2019
|
Enterprise Service Bus
|
09:53:58
|
jim
|
|
Message-oriented Middleware
|
09:48:58
|
jim
|
|
Message queue
|
09:38:24
|
jim
|
|
Queue
|
09:30:59
|
jim
|
|
ActiveMQ
|
09:28:42
|
jim
|
|
AWS Simple Notification Service
|
09:27:31
|
jim
|
|
Backend as a Service
|
09:25:50
|
jim
|
|
Cloud Services Model
|
09:21:57
|
jim
|
|
Service
|
09:18:37
|
jim
|
|
04.07.2019
|
AWS Simple Queue Service
|
16:36:00
|
jim
|
|
Cloud Zone
|
16:17:16
|
jim
|
|
Cloud Region
|
16:16:12
|
jim
|
|
GCP Location
|
16:08:06
|
jim
|
|
GCP Cloud Load Balancing
|
16:01:57
|
jim
|
GCP Regional ==> Cloud Region |
GCP Multi-Regional
|
16:01:57
|
jim
|
GCP Regional ==> Cloud Region |
GCP Storage Classes
|
16:01:57
|
jim
|
GCP Regional ==> Cloud Region |
Fault tolerance
|
15:50:46
|
jim
|
|
Availability
|
15:50:18
|
jim
|
|
Edirectory Replicas
|
15:30:25
|
jim
|
|
Computing platform
|
13:15:19
|
jim
|
|
Stack
|
13:14:31
|
jim
|
|
AWS CloudFormation
|
13:09:47
|
jim
|
|
Production tier
|
13:08:25
|
jim
|
|
API Planing
|
13:06:48
|
jim
|
|
Testing tier
|
13:01:47
|
jim
|
|
Development tier
|
12:59:11
|
jim
|
|
Local tier
|
12:58:03
|
jim
|
|
Deployment tier
|
12:56:16
|
jim
|
|
AWS CloudFront
|
12:34:35
|
jim
|
|
AWS CloudWatch
|
12:22:47
|
jim
|
Amazon Cloudwatch ==> AWS CloudWatch |
Google Cloud Dataflow
|
09:20:57
|
jim
|
|
Google Cloud Platform
|
09:16:52
|
jim
|
|
ForgeRock
|
08:55:19
|
jim
|
|
Middleware
|
08:52:31
|
jim
|
|
Platform as a Service
|
08:30:47
|
jim
|
|
DynamoDB
|
08:16:16
|
jim
|
|
AWS Lambda
|
08:08:00
|
jim
|
|
ACDC Grant type
|
07:47:16
|
jim
|
|
Web Blog_blogentry_041118_1
|
07:44:57
|
jim
|
|
Micropub
|
07:43:44
|
jim
|
|
Touch ID
|
07:43:10
|
jim
|
|
Google Wallet vs Apple Pay
|
07:42:30
|
jim
|
|
IPhone
|
07:41:04
|
jim
|
|
Safari
|
07:40:36
|
jim
|
|
CHIMNEYPOOL
|
07:39:15
|
jim
|
|
FREEFLOW
|
07:38:53
|
jim
|
|
HTTP Request Header
|
07:29:32
|
jim
|
|
XMLHttpRequest
|
07:21:18
|
jim
|
|
03.07.2019
|
Web IDL
|
20:39:44
|
jim
|
|
RFC 6455
|
20:36:02
|
jim
|
|
Infrastructure as a Service
|
15:54:14
|
jim
|
|
Testing
|
15:09:33
|
jim
|
|
Health-check
|
14:54:54
|
jim
|
|
Abstraction
|
14:01:10
|
jim
|
|
Refinement
|
14:00:19
|
jim
|
|
Throttling
|
13:20:38
|
jim
|
|
Server-Side Login throttling schemes
|
13:11:52
|
jim
|
|
Domain
|
09:33:27
|
jim
|
|
Encapsulation
|
09:21:04
|
jim
|
|
02.07.2019
|
Outbound
|
19:36:48
|
jim
|
|
Inbound
|
19:36:38
|
jim
|
|
Mechanical Disk
|
17:04:45
|
jim
|
|
Disk
|
17:03:58
|
jim
|
|
Block storage
|
17:02:55
|
jim
|
|
Data Subject Access Request
|
15:16:39
|
jim
|
|
DSAR
|
15:15:31
|
jim
|
|
0.9.2342.19200300.100.1.10
|
10:39:33
|
jim
|
|
Data Accuracy
|
10:04:18
|
jim
|
|
Verified Claim
|
10:02:31
|
jim
|
|
Phone_number_verified
|
09:56:04
|
jim
|
|
Email_verified
|
09:49:31
|
jim
|
|
Level Of Assurance
|
09:41:09
|
jim
|
|
Claimant
|
09:32:23
|
jim
|
|
Identity Assurance Framework
|
09:26:22
|
jim
|
|
IAWG
|
09:19:59
|
jim
|
|
Credential Management
|
09:13:05
|
jim
|
|
Credential Service Provider
|
09:08:22
|
jim
|
|
Identity Proofing
|
08:30:33
|
jim
|
|
29.06.2019
|
Yocto
|
09:46:19
|
jim
|
|
Zepto
|
09:46:09
|
jim
|
|
Atto
|
09:45:59
|
jim
|
|
Femto
|
09:45:48
|
jim
|
|
Micro
|
09:45:28
|
jim
|
|
Centi
|
09:45:17
|
jim
|
|
Deci
|
09:45:07
|
jim
|
|
Deca
|
09:44:56
|
jim
|
|
Hecto
|
09:44:46
|
jim
|
|
Yotta
|
09:44:36
|
jim
|
|
Zetta
|
09:44:25
|
jim
|
|
Exa
|
09:44:14
|
jim
|
|
Peta
|
09:44:02
|
jim
|
|
Tera
|
09:43:51
|
jim
|
|
Giga
|
09:43:38
|
jim
|
|
Kilo
|
09:43:25
|
jim
|
|
Mega
|
09:42:36
|
jim
|
|
Milli
|
09:11:16
|
jim
|
|
Meter
|
09:09:32
|
jim
|
|
Mm
|
09:07:18
|
jim
|
|
HTTP 304
|
07:34:20
|
jim
|
|
Not Modified
|
07:30:08
|
jim
|
|
Unvalidated redirects and forwards
|
07:18:46
|
jim
|
|
27.06.2019
|
Certificate Request Process
|
21:09:43
|
jim
|
|
Certificate Validation Levels
|
21:07:12
|
jim
|
|
Well-known
|
11:04:37
|
jim
|
|
Credential Enrollment
|
10:17:13
|
jim
|
|
25.06.2019
|
Time synchronization
|
09:54:35
|
jim
|
|
Malfeasance
|
09:45:36
|
jim
|
|
Feasance
|
09:41:16
|
jim
|
|
Time.cloudflare.com
|
09:29:29
|
jim
|
|
Cloudflare
|
09:24:13
|
jim
|
|
RFC 7384
|
09:19:18
|
jim
|
|
Packet Switched Networks
|
09:18:21
|
jim
|
|
NTS
|
09:17:44
|
jim
|
|
Cryptographic proof
|
09:16:21
|
jim
|
|
CIRCL
|
09:05:12
|
jim
|
|
Roughtime
|
08:57:29
|
jim
|
|
Web Blog_blogentry_250619_1
|
08:52:55
|
jim
|
|
Network Time Security
|
08:50:57
|
jim
|
|
Warp
|
08:41:28
|
jim
|
|
SHA-1 Deprecation
|
08:26:54
|
jim
|
|
DNS Queries over HTTPS
|
08:26:31
|
jim
|
|
1.1.1.1
|
08:26:02
|
jim
|
|
Requested_token_use
|
08:04:05
|
jim
|
|
OAuth Parameters Registry
|
08:02:48
|
jim
|
|
23.06.2019
|
Configuration Directory Partition
|
09:43:35
|
jim
|
|
XDAS Setup and Configuration
|
09:43:18
|
jim
|
|
IManager Server Configuration
|
09:42:40
|
jim
|
|
DirXML-ConfigValues
|
09:41:20
|
jim
|
|
Global Configuration Variables
|
09:36:56
|
jim
|
|
LDAP Client Configuration
|
09:36:03
|
jim
|
|
Zero-configuration networking
|
09:33:30
|
jim
|
|
Configuration
|
09:31:33
|
jim
|
|
Provider Configuration URI
|
09:30:26
|
jim
|
|
Openid-configuration
|
09:29:17
|
jim
|
|
Uma-configuration
|
09:28:27
|
jim
|
|
NAM Configuration Notes
|
09:26:28
|
jim
|
|
Solaris Configuration
|
09:24:25
|
jim
|
|
Configuration Management
|
09:23:33
|
jim
|
|
Change Management
|
09:20:42
|
jim
|
|
Information Technology Infrastructure Library
|
09:17:13
|
jim
|
|
ITIL
|
09:16:11
|
jim
|
|
Service Support
|
09:13:18
|
jim
|
|
SSD
|
09:11:40
|
jim
|
|
Solid State Disk
|
09:11:24
|
jim
|
|
EDirectory Performance Tuning
|
09:04:08
|
jim
|
|
BIOS
|
09:03:48
|
jim
|
|
Redhat Configuration
|
08:59:19
|
jim
|
|
Issuer Action Codes
|
08:41:40
|
jim
|
|
IAC
|
08:38:16
|
jim
|
|
22.06.2019
|
Stateless
|
09:40:01
|
jim
|
|
Scale
|
09:16:43
|
jim
|
|
Cloud
|
08:12:37
|
jim
|
|
Functional Requirement
|
08:04:47
|
jim
|
|
Requirement
|
08:01:25
|
jim
|
|
Constraint
|
07:42:28
|
jim
|
|
Identity Verification
|
07:31:08
|
jim
|
|
21.06.2019
|
Identity Assurance
|
10:18:11
|
jim
|
|
Codebase
|
09:04:47
|
jim
|
|
Release
|
09:04:01
|
jim
|
|
Operations Team
|
09:03:36
|
jim
|
|
Development Team
|
09:03:19
|
jim
|
|
Dev
|
08:57:00
|
jim
|
|
20.06.2019
|
OAuth and OIDC Adoption
|
11:31:45
|
jim
|
|
IdentityServer
|
11:25:26
|
jim
|
|
Web Blog_blogentry_200619_1
|
10:44:54
|
jim
|
OAuth Adoption ==> OAuth and OIDC Adoption |
AWS Cognito
|
10:31:37
|
jim
|
|
Cloud Foundry
|
10:27:29
|
jim
|
|
Red Hat
|
10:24:20
|
jim
|
|
Keycloak
|
10:21:58
|
jim
|
RedHat ==> Red Hat |
RPM
|
10:21:58
|
jim
|
RedHat ==> Red Hat |
Red Hat Directory Server
|
10:21:58
|
jim
|
RedHat ==> Red Hat |
389 Directory Server
|
10:21:57
|
jim
|
RedHat ==> Red Hat |
Enterprise Access Manager Product
|
10:21:57
|
jim
|
RedHat ==> Red Hat |
History of LDAP
|
10:21:57
|
jim
|
RedHat ==> Red Hat |
19.06.2019
|
Rich Communication Services
|
12:03:17
|
jim
|
|
RCS Chat
|
11:52:37
|
jim
|
|
IMessage
|
11:21:49
|
jim
|
|
Apple ID
|
11:09:57
|
jim
|
|
Jibe Platform
|
11:02:41
|
jim
|
|
18.06.2019
|
CLOUD Act
|
13:21:05
|
jim
|
|
Independent contractor
|
13:11:38
|
jim
|
|
Year 2020
|
12:54:50
|
jim
|
|
2020s
|
12:53:34
|
jim
|
|
Libra Cryptocurrency
|
12:48:35
|
jim
|
|
Libra Blockchain
|
12:48:07
|
jim
|
|
HotStuff
|
12:23:21
|
jim
|
|
LibraBFT
|
12:17:13
|
jim
|
|
Web Blog_blogentry_180619_1
|
11:50:30
|
jim
|
|
Sign in with Apple
|
11:03:30
|
jim
|
|
17.06.2019
|
Data Origin
|
17:39:00
|
jim
|
|
2.16.840.1.113719.1.1.4.721
|
14:26:52
|
jim
|
|
NDSRightsToMonitor
|
14:25:52
|
jim
|
|
X-NDS_NEVER_SYNC
|
14:23:24
|
jim
|
|
EDirectory Monitor Entry
|
14:12:11
|
jim
|
|
16.06.2019
|
Linux Boot Process
|
13:42:21
|
jim
|
|
BootableDevice
|
13:27:24
|
jim
|
|
2.16.840.1.113719.1.167.6.6.1
|
13:25:21
|
jim
|
|
Virtual Disk
|
13:24:12
|
jim
|
|
Storage device
|
13:20:31
|
jim
|
|
Disk partition
|
13:19:41
|
jim
|
|
File System
|
13:18:47
|
jim
|
|
MBR
|
13:08:35
|
jim
|
|
Booting
|
13:07:14
|
jim
|
|
GRUB
|
13:06:22
|
jim
|
|
Basic Input-Output System
|
12:39:05
|
jim
|
|
POST
|
12:31:09
|
jim
|
|
Boot Loader
|
10:17:41
|
jim
|
|
Hardware
|
10:06:48
|
jim
|
|
LocalStorage
|
10:00:13
|
jim
|
|
Master Boot Record
|
09:57:42
|
jim
|
|
LILO
|
09:50:10
|
jim
|
|
Firmware
|
09:45:53
|
jim
|
|
Das u-boot
|
09:20:26
|
jim
|
Bootstrapping ==> Booting |
Unified Extensible Firmware Interface
|
09:10:03
|
jim
|
|
Coreboot
|
09:08:36
|
jim
|
|
Chromium OS
|
09:03:09
|
jim
|
|
Chrome OS
|
09:01:13
|
jim
|
|
Chromebook
|
08:58:02
|
jim
|
|
U-Boot
|
08:55:20
|
jim
|
|
Booting with GRUB
|
08:43:24
|
jim
|
|
Media Access Control Address
|
08:41:07
|
jim
|
|
SmartMessage Language
|
08:36:43
|
jim
|
|
Hypervisor
|
08:36:20
|
jim
|
|
15.06.2019
|
Identity Assurance Level
|
08:11:52
|
jim
|
|
14.06.2019
|
AAID
|
16:15:17
|
jim
|
|
Android Advertising ID
|
16:06:14
|
jim
|
|
IDFA
|
16:05:10
|
jim
|
|
RTB
|
16:01:19
|
jim
|
|
Web Blog_blogentry_140619_1
|
15:48:59
|
jim
|
|
13.06.2019
|
1.3.6.1.4.1.1466.101.120.111
|
14:00:05
|
jim
|
|
ExtensibleObject
|
13:59:31
|
jim
|
|
11.06.2019
|
N4u.server.idle-threads
|
15:14:25
|
jim
|
|
N4u.server.active-interval
|
15:12:23
|
jim
|
|
NDS Thread Pool
|
14:51:19
|
jim
|
|
Thread delay
|
14:48:16
|
jim
|
|
Thread pool
|
14:46:21
|
jim
|
|
Worker thread
|
14:42:02
|
jim
|
|
Idle thread
|
14:32:03
|
jim
|
|
Waiting task
|
14:27:02
|
jim
|
|
Ready task
|
14:25:26
|
jim
|
|
Task
|
14:24:06
|
jim
|
|
Byte
|
11:15:07
|
jim
|
|
Megabyte
|
11:10:08
|
jim
|
|
Kilobyte
|
11:09:55
|
jim
|
|
KB
|
11:06:33
|
jim
|
|
MB
|
10:46:46
|
jim
|
|
NCP Packet
|
10:45:39
|
jim
|
|
SSL Overhead
|
10:40:44
|
jim
|
|
NMAS Login Update Interval
|
10:37:10
|
jim
|
|
EDirectory Synchronization Tips
|
10:34:51
|
jim
|
|
Asynchronous Outbound Synchronization
|
10:33:23
|
jim
|
|
EDirectory Synchronization
|
10:21:22
|
jim
|
|
ACL (eDirectory Attribute)
|
10:16:12
|
jim
|
|
DClient
|
09:46:54
|
jim
|
|
N4u.server.thread-stack-size
|
09:30:55
|
jim
|
|
N4u.server.start-threads
|
09:24:40
|
jim
|
|
N4u.server.max-threads
|
09:21:39
|
jim
|
|
IMonitor Diagnostic Logger
|
09:11:27
|
jim
|
|
FLAIM checkpoint
|
08:44:23
|
jim
|
|
Maxdirtycache
|
08:30:27
|
jim
|
|
EMBox
|
08:20:50
|
jim
|
|
GAMS
|
08:14:49
|
jim
|
Gams ==> GAMS |
NDSD Loadable Module
|
08:14:35
|
jim
|
|
Graded Authentication Management Service
|
08:14:17
|
jim
|
|
10.06.2019
|
LOCK
|
13:27:46
|
jim
|
|
DIB Lock
|
13:22:53
|
jim
|
|
Lock
|
13:21:19
|
jim
|
|
2.16.840.1.113719.1.1.6.1.10
|
13:18:38
|
jim
|
|
EDirCloneLock
|
13:17:14
|
jim
|
eDirCloneLock ==> EDirCloneLock |
2.16.840.1.113719.1.1.4.1.533
|
13:08:45
|
jim
|
|
CheckLockTag
|
13:05:46
|
jim
|
|
Chubby Lock Service
|
13:04:51
|
jim
|
|
Packet
|
13:03:46
|
jim
|
|
Dynamic Cache Mode
|
12:10:13
|
jim
|
|
FLAIM
|
11:53:24
|
jim
|
|
_ndsdb.ini
|
11:21:12
|
jim
|
|
Hard cache limit
|
11:14:52
|
jim
|
|
Cpinterval
|
11:12:56
|
jim
|
|
Cachecleanupinterval
|
10:59:13
|
jim
|
|
EDirectory DIB
|
10:27:18
|
jim
|
|
FLAIM Cache
|
10:23:34
|
jim
|
|
Ndsconfig Parameters
|
09:39:45
|
jim
|
|
09.06.2019
|
MacOS.10.14
|
09:32:49
|
jim
|
|
MacOS
|
09:30:31
|
jim
|
|
ICloud
|
09:19:21
|
jim
|
|
Instant Messaging
|
09:13:42
|
jim
|
|
Gmail
|
09:01:51
|
jim
|
|
MacOS.10.15
|
08:50:25
|
jim
|
|
IOS.13
|
08:48:48
|
jim
|
|
08.06.2019
|
Payment Services Directive
|
13:19:47
|
jim
|
|
Apple
|
12:56:18
|
jim
|
|
Cyclic Redundancy Check
|
11:24:07
|
jim
|
|
Keccak
|
11:21:40
|
jim
|
|
Arbitrary Length Hash
|
10:36:51
|
jim
|
|
Unkeyed Primitives
|
10:25:10
|
jim
|
|
Cryptographic Primitive
|
10:24:18
|
jim
|
|
Cryptographically secure pseudorandom number generator
|
10:07:55
|
jim
|
|
Cryptographic pseudo-random number generator
|
10:06:03
|
jim
|
|
Security
|
09:38:36
|
jim
|
|
CIA
|
09:38:10
|
jim
|
|
07.06.2019
|
Key Life cycle
|
12:01:18
|
jim
|
|
Key Revocation
|
11:58:08
|
jim
|
|
Public Key
|
11:56:09
|
jim
|
|
Asymmetric Key Cryptography
|
11:54:33
|
jim
|
|
Asymmetric Key
|
11:43:37
|
jim
|
|
China
|
10:15:16
|
jim
|
|
Replacement fertility rate
|
10:13:11
|
jim
|
|
Federal Reserve Bank
|
10:12:37
|
jim
|
|
Population
|
10:11:31
|
jim
|
|
United States Census Bureau
|
10:09:21
|
jim
|
|
ICE
|
10:05:38
|
jim
|
|
United States Citizenship and Immigration Services
|
10:02:20
|
jim
|
|
Green Card
|
09:59:13
|
jim
|
|
Alien
|
09:55:55
|
jim
|
|
Phone Number
|
09:30:14
|
jim
|
|
Level of Identity Proofing
|
09:08:27
|
jim
|
|
CN
|
08:50:28
|
jim
|
|
Year 1912
|
08:49:20
|
jim
|
|
PRC
|
08:48:43
|
jim
|
|
PeopleS Republic of China
|
08:47:45
|
jim
|
|
Year 1949
|
08:43:33
|
jim
|
|
LDAP Authentication
|
08:42:34
|
jim
|
|
06.06.2019
|
Web Blog_blogentry_060619_1
|
09:21:27
|
jim
|
|
05.06.2019
|
National Identity Register
|
20:06:34
|
jim
|
|
Basic Registry of People
|
20:03:56
|
jim
|
|
USPS
|
19:51:28
|
jim
|
|
United States Postal Service
|
19:50:56
|
jim
|
|
Electronic Identity Credential
|
19:32:41
|
jim
|
|
EID
|
19:28:45
|
jim
|
|
BRP
|
19:27:03
|
jim
|
|
Biometric Passport
|
19:15:01
|
jim
|
|
ICAO Document 9303
|
19:12:57
|
jim
|
|
TD1
|
12:52:26
|
jim
|
|
ICAO
|
12:52:06
|
jim
|
Machine-Readable Zone ==> Machine Readable Zone |
MRZ
|
12:52:06
|
jim
|
Machine-Readable Zone ==> Machine Readable Zone |
Machine Readable Zone
|
12:52:06
|
jim
|
Machine-Readable Zone ==> Machine Readable Zone |
ISO 7501
|
12:47:37
|
jim
|
|
EMRTD
|
12:42:29
|
jim
|
|
Electronic Machine Readable Travel Document
|
12:42:10
|
jim
|
|
Passport
|
12:36:14
|
jim
|
|
Emergency Travel Document
|
12:35:45
|
jim
|
|
Visa
|
12:28:44
|
jim
|
|
Machine Readable Visas
|
12:15:10
|
jim
|
|
MROTD
|
12:11:01
|
jim
|
|
MRP
|
12:08:28
|
jim
|
Machine-Readable Passport ==> Machine Readable Passport |
Machine Readable Passport
|
12:08:27
|
jim
|
Machine-Readable Passport ==> Machine Readable Passport |
Machine Readable Official Travel Documents
|
12:06:40
|
jim
|
|
Year 1944
|
11:54:01
|
jim
|
|
International Civil Aviation Organization
|
11:53:35
|
jim
|
|
Computer vision
|
11:51:10
|
jim
|
|
MRTD
|
11:44:57
|
jim
|
|
OCR
|
11:44:13
|
jim
|
|
Optical Character Recognition
|
11:43:53
|
jim
|
|
Machine Readable Travel Document
|
11:32:06
|
jim
|
|
ISO 29003
|
11:09:25
|
jim
|
|
International Organization for Standardization
|
11:05:23
|
jim
|
|
Derivative work
|
10:00:45
|
jim
|
|
Graphical User Interface
|
09:59:53
|
jim
|
|
Command-line
|
09:59:32
|
jim
|
|
GUI
|
09:55:17
|
jim
|
|
LoginShell
|
09:54:35
|
jim
|
|
CLI
|
09:50:25
|
jim
|
|
Bourne Shell
|
09:45:04
|
jim
|
|
Bash
|
09:41:59
|
jim
|
|
Z shell
|
09:39:20
|
jim
|
|
Zsh
|
09:37:32
|
jim
|
|
04.06.2019
|
GNU General Public License
|
11:41:26
|
jim
|
|
GPLv3
|
11:33:06
|
jim
|
|
30.05.2019
|
2.16.840.1.113719.1.39.43.6.4
|
11:37:36
|
jim
|
|
NspmPasswordAux
|
11:37:01
|
jim
|
|
NsimChallengeSet
|
11:33:07
|
jim
|
|
2.16.840.1.113719.1.39.43.4.106
|
11:29:22
|
jim
|
|
PwdAccountLockedTime
|
11:27:27
|
jim
|
|
2.16.840.1.113719.1.39.43.4.2
|
11:15:40
|
jim
|
|
NspmPassword
|
11:15:13
|
jim
|
|
2.16.840.1.113719.1.39.43.4.1
|
11:12:17
|
jim
|
|
NspmPasswordKey
|
11:11:49
|
jim
|
|
NspmDoNotExpirePassword
|
11:05:12
|
jim
|
|
NspmPasswordHistoryExpiration
|
11:00:03
|
jim
|
|
NspmPasswordHistoryLimit
|
10:58:11
|
jim
|
|
NspmPasswordHistory
|
10:54:56
|
jim
|
|
PwdInHistory
|
10:42:34
|
jim
|
|
PasswordsUsed
|
09:24:43
|
jim
|
|
FLAIM Attribute Containerization
|
09:09:04
|
jim
|
|
RECMAN
|
09:08:00
|
jim
|
|
RECM
|
08:58:17
|
jim
|
|
Ndsindex
|
07:38:30
|
jim
|
|
29.05.2019
|
Web Blog_blogentry_290519_1
|
10:50:46
|
jim
|
|
28.05.2019
|
ObjectSID
|
09:57:16
|
jim
|
|
24.05.2019
|
Qbit
|
09:43:57
|
jim
|
|
Superposition
|
09:15:15
|
jim
|
|
Computational complexity
|
08:32:31
|
jim
|
|
Communication complexity
|
08:31:48
|
jim
|
|
Complexity
|
08:30:38
|
jim
|
|
23.05.2019
|
Skulker
|
09:46:12
|
jim
|
|
Purger
|
09:31:26
|
jim
|
|
PURG
|
09:29:43
|
jim
|
|
SKLK
|
09:27:59
|
jim
|
|
EDirectory Background Processes
|
09:09:02
|
jim
|
|
LOST ENTRY
|
08:06:59
|
jim
|
|
22.05.2019
|
CheckPointThread
|
21:37:27
|
jim
|
|
Roll-Forward Log
|
21:37:06
|
jim
|
|
20.05.2019
|
PseudoServer
|
10:11:20
|
jim
|
|
SubjectKeyIdentifier
|
09:15:32
|
jim
|
|
Enablemovetoattrcontainer
|
08:14:07
|
jim
|
|
19.05.2019
|
IA5String
|
20:16:42
|
jim
|
|
Integer
|
20:15:21
|
jim
|
|
XML Object Model
|
20:08:31
|
jim
|
|
XOM
|
20:05:00
|
jim
|
|
Extended Data Service
|
20:02:10
|
jim
|
|
XDS
|
19:59:30
|
jim
|
|
PosixAccount
|
19:49:05
|
jim
|
|
UnixHomeDirectory
|
19:46:00
|
jim
|
|
18.05.2019
|
Attack Service
|
11:28:56
|
jim
|
|
LONGHAUL
|
11:27:24
|
jim
|
|
VAO
|
11:07:53
|
jim
|
|
POISONNUT
|
11:02:07
|
jim
|
|
ISAKMP
|
11:00:14
|
jim
|
|
DNC Decryption Flow
|
10:59:28
|
jim
|
|
Attack Orchestrator
|
10:57:55
|
jim
|
|
Cryptanalysis and Exploitation Services
|
10:51:56
|
jim
|
|
CES
|
10:45:55
|
jim
|
|
Key Recovery
|
09:55:15
|
jim
|
|
Credential Recovery
|
09:54:33
|
jim
|
|
Internet Protocol Security
|
09:29:29
|
jim
|
|
Triple DES
|
09:28:02
|
jim
|
|
Encapsulating Security Payload
|
09:27:41
|
jim
|
|
COMSAT
|
09:23:28
|
jim
|
|
TURMOIL
|
09:19:44
|
jim
|
|
VALIANTSURF
|
09:10:15
|
jim
|
|
Exploitation
|
09:06:00
|
jim
|
|
DNC
|
09:03:46
|
jim
|
|
Data Network Cipher
|
09:02:27
|
jim
|
|
Atomic SIGINT Data Format
|
08:52:13
|
jim
|
|
XKEYSCORE
|
08:47:13
|
jim
|
|
FALLOUT
|
08:44:24
|
jim
|
|
MARINA
|
08:41:37
|
jim
|
|
ASDF
|
08:28:47
|
jim
|
|
APEX
|
08:22:51
|
jim
|
|
15.05.2019
|
Target endpoint
|
16:21:28
|
jim
|
|
Proxy endpoint
|
16:20:30
|
jim
|
|
Apigee Edge
|
16:19:14
|
jim
|
|
Web Blog_blogentry_150519_1
|
16:00:21
|
jim
|
|
Site
|
15:10:29
|
jim
|
|
1.2.840.113556.1.5.31
|
15:09:37
|
jim
|
|
Application Directory Partitions
|
14:42:02
|
jim
|
|
Schema Directory Partition
|
14:38:54
|
jim
|
|
Directory Partition Hierarchy
|
14:35:42
|
jim
|
|
Domain Directory Partition
|
14:25:40
|
jim
|
|
Forest Root Domain
|
14:12:41
|
jim
|
|
AD Forest
|
14:08:47
|
jim
|
|
ObjectClass
|
11:05:25
|
jim
|
|
ObjectCategory
|
11:04:09
|
jim
|
|
1.2.840.113556.1.4.783
|
10:56:33
|
jim
|
|
DefaultObjectCategory
|
10:56:11
|
jim
|
|
ObjectClass Types
|
10:40:18
|
jim
|
|
STRUCTURAL
|
10:38:48
|
jim
|
|
ObjectClassCategory
|
10:36:34
|
jim
|
|
1.2.840.113556.1.5.34
|
10:23:32
|
jim
|
|
1.2.840.113556.1.3.23
|
10:22:37
|
jim
|
|
1.2.840.113556.1.2.26
|
10:22:06
|
jim
|
|
X-HIDDEN
|
10:12:23
|
jim
|
|
DefaultHidingValue
|
10:11:07
|
jim
|
|
MS-ADSC
|
09:36:12
|
jim
|
|
TDO
|
09:21:53
|
jim
|
|
MsDS-TrustForestTrustInfo
|
09:06:31
|
jim
|
|
14.05.2019
|
Local Administrative Accounts
|
17:38:28
|
jim
|
|
Administrative Identity
|
17:37:17
|
jim
|
|
Service Account
|
17:22:27
|
jim
|
|
Privileged Identity
|
17:14:39
|
jim
|
|
NIST.SP.800-57
|
17:07:28
|
jim
|
|
Symmetric Key Cryptography
|
15:23:30
|
jim
|
|
Hash Function
|
15:18:39
|
jim
|
|
Cryptographic Algorithm
|
15:15:32
|
jim
|
|
Algorithm
|
14:50:59
|
jim
|
|
13.05.2019
|
Change-password
|
12:03:50
|
jim
|
|
Web Blog_blogentry_130519_1
|
11:58:35
|
jim
|
|
12.05.2019
|
OpenID Connect for Identity Assurance
|
10:13:45
|
jim
|
|
11.05.2019
|
HIPAA Privacy Rule
|
10:25:36
|
jim
|
|
Key Management
|
08:25:26
|
jim
|
|
EFS
|
08:14:46
|
jim
|
|
Encrypted File Systems
|
08:14:08
|
jim
|
|
Symmetric cipher
|
07:12:58
|
jim
|
|
10.05.2019
|
Pairwise Pseudonymous Identifier
|
14:24:31
|
jim
|
|
Law of Directed Identity
|
14:17:52
|
jim
|
|
Robotic Process Automation
|
14:10:40
|
jim
|
|
Robot
|
14:07:23
|
jim
|
|
Web Blog_blogentry_100519_1
|
13:57:19
|
jim
|
|
09.05.2019
|
ERI
|
15:25:09
|
jim
|
|
Eyring Research Institute
|
15:23:38
|
jim
|
|
Netware Core Protocol
|
15:06:32
|
jim
|
|
DHost
|
15:00:56
|
jim
|
|
Sequenced Packet Exchange
|
15:00:17
|
jim
|
|
SPX
|
14:51:19
|
jim
|
|
Ray Noorda
|
14:46:41
|
jim
|
|
Novell INC
|
14:46:07
|
jim
|
|
ShareNet
|
14:42:00
|
jim
|
|
Network Operating System
|
14:36:47
|
jim
|
|
Drew Major
|
14:32:16
|
jim
|
|
Internetwork Packet Exchange
|
14:22:32
|
jim
|
|
ReplicaAddressHint
|
14:21:49
|
jim
|
Internet Protocol Exchange ==> Internetwork Packet Exchange |
SuperSet Software Group
|
14:21:49
|
jim
|
Internet Protocol Exchange ==> Internetwork Packet Exchange |
Logical Link Control
|
14:21:48
|
jim
|
Internet Protocol Exchange ==> Internetwork Packet Exchange |
NDAP
|
14:21:48
|
jim
|
Internet Protocol Exchange ==> Internetwork Packet Exchange |
IPX
|
14:21:35
|
jim
|
|
Novell Data Systems Inc
|
14:13:23
|
jim
|
|
08.05.2019
|
Well-known Security Identifiers
|
15:02:09
|
jim
|
|
PrimaryGroupID
|
14:28:01
|
jim
|
|
Domain Users
|
14:18:32
|
jim
|
|
Group
|
14:13:52
|
jim
|
|
07.05.2019
|
Containerization vs Metadata
|
10:00:46
|
jim
|
|
Web Blog_blogentry_070519_1
|
09:55:07
|
jim
|
Folder vs Search Debate ==> Containerization vs Metadata |
Folder
|
09:32:05
|
jim
|
|
Content
|
09:31:44
|
jim
|
|
Quantum
|
08:01:36
|
jim
|
|
Decade
|
07:58:13
|
jim
|
|
Universal Declaration of Human Rights
|
07:56:40
|
jim
|
|
Year 1948
|
07:55:24
|
jim
|
|
Data entropy
|
07:54:47
|
jim
|
|
Bit
|
07:22:53
|
jim
|
|
06.05.2019
|
Relational Database Management System
|
06:28:29
|
jim
|
|
MariaDB
|
06:28:07
|
jim
|
|
MySQL
|
06:24:43
|
jim
|
|
MyMysqlCheatSheet
|
06:18:00
|
jim
|
|
Pop
|
06:16:33
|
jim
|
|
RFC 4217
|
06:05:01
|
jim
|
|
RFC 7817
|
06:04:03
|
jim
|
|
Opportunistic TLS
|
06:03:06
|
jim
|
|
1.3.6.1.4.1.1466.20037
|
05:58:45
|
jim
|
|
05.05.2019
|
OAuth 2.0 Incremental Authorization
|
09:06:57
|
jim
|
|
Include_granted_scopes
|
08:51:58
|
jim
|
|
04.05.2019
|
International Call Prefix
|
09:34:59
|
jim
|
|
International Direct Dialling
|
09:34:23
|
jim
|
|
IDD
|
09:29:32
|
jim
|
International Dialing Prefix ==> International Direct Dialling |
DDDS
|
09:15:30
|
jim
|
|
Dynamic Delegation Discovery System
|
09:15:08
|
jim
|
|
RFC 6116
|
09:10:45
|
jim
|
|
N11
|
09:06:54
|
jim
|
|
Easily Recognizable Code
|
09:06:26
|
jim
|
|
Telephone exchange
|
09:00:41
|
jim
|
|
Exchange
|
08:56:07
|
jim
|
|
International Telephone Number
|
08:45:23
|
jim
|
|
Telephone Numbering Plan
|
08:36:03
|
jim
|
|
Country Calling Code
|
08:29:23
|
jim
|
|
03.05.2019
|
DumpEdirectoryPasswordInformationTool
|
09:05:01
|
jim
|
|
Nondeterministic algorithms
|
08:48:45
|
jim
|
|
Turing Machine
|
08:41:59
|
jim
|
|
Year 1936
|
08:35:48
|
jim
|
|
MsDS-PasswordComplexityEnabled
|
08:29:44
|
jim
|
|
Password Complexity
|
08:28:03
|
jim
|
|
Law of Complexity
|
08:27:14
|
jim
|
|
Randomized algorithm
|
08:13:54
|
jim
|
|
Turing test
|
08:09:32
|
jim
|
|
Monte Carlo algorithm
|
08:01:00
|
jim
|
|
Las Vegas algorithm
|
08:00:47
|
jim
|
|
02.05.2019
|
OAuth 2.0 Token Binding
|
08:44:53
|
jim
|
|
RFC 8472
|
08:44:06
|
jim
|
|
Sec-Token-Binding
|
08:32:26
|
jim
|
Token Binding Protocol Negotiation ==> Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation |
Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation
|
08:32:25
|
jim
|
Token Binding Protocol Negotiation ==> Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation |
Web Blog_blogentry_020519_1
|
08:20:03
|
jim
|
|
RFC 8152
|
08:15:26
|
jim
|
|
CBOR Object Signing and Encryption
|
08:14:57
|
jim
|
|
Mutual TLS
|
08:05:56
|
jim
|
|
MTLS
|
08:04:27
|
jim
|
|
01.05.2019
|
Observer Node
|
13:02:19
|
jim
|
|
Sovrin Steward
|
12:52:35
|
jim
|
|
Validator Node
|
12:51:24
|
jim
|
|
Sovrin Node
|
12:46:43
|
jim
|
|
Sovrin Agent
|
12:35:01
|
jim
|
|
Public Ledger
|
12:23:43
|
jim
|
|
Hyperledger Indy
|
12:01:32
|
jim
|
|
Indy Steward
|
11:49:32
|
jim
|
|
Sovrin Ledger
|
11:36:39
|
jim
|
|
Signing key
|
11:27:56
|
jim
|
|
Verkey
|
11:27:34
|
jim
|
|
Verinym
|
11:18:18
|
jim
|
|
30.04.2019
|
Threat Model
|
10:39:15
|
jim
|
|
Vishing
|
10:37:12
|
jim
|
|
Robocall
|
10:24:33
|
jim
|
|
HTML link
|
10:16:25
|
jim
|
|
Keylogger
|
10:09:48
|
jim
|
|
USB Attack
|
10:06:00
|
jim
|
|
Extensible Firmware Interface
|
10:04:28
|
jim
|
|
Exploit
|
09:59:08
|
jim
|
|
Botnet
|
09:56:30
|
jim
|
|
Public Wi-Fi
|
09:49:13
|
jim
|
|
Phishing
|
09:45:16
|
jim
|
|
Smishing
|
09:43:59
|
jim
|
|
Pretexting
|
09:40:48
|
jim
|
|
Spyware
|
09:36:04
|
jim
|
|
Tailgating
|
09:15:48
|
jim
|
|
Cyber
|
09:10:27
|
jim
|
|
Cybercriminals
|
09:09:29
|
jim
|
|
Spear-Phishing
|
09:05:18
|
jim
|
|
Ransomware
|
08:50:42
|
jim
|
|
27.04.2019
|
Subscriber Number
|
20:16:54
|
jim
|
|
National Significant Number
|
19:44:57
|
jim
|
|
Area Code
|
09:47:00
|
jim
|
|
Machine Behavior
|
09:08:58
|
jim
|
|
AI
|
09:05:46
|
jim
|
|
Anguilla
|
08:58:26
|
jim
|
|
Web Blog_blogentry_270419_1
|
08:51:43
|
jim
|
|
24.04.2019
|
Traveler Verification Service
|
09:34:08
|
jim
|
|
Airlines
|
09:22:03
|
jim
|
|
Biometric data
|
09:19:59
|
jim
|
|
SCOTUS
|
08:10:10
|
jim
|
|
United States Supreme Court
|
08:09:45
|
jim
|
|
17.04.2019
|
DirXML-ShimAuthPassword
|
09:32:32
|
jim
|
|
DirXML-NamedPasswords
|
09:32:00
|
jim
|
|
15.04.2019
|
NdsOperationCheckpoint
|
19:00:25
|
jim
|
|
13.04.2019
|
1.2.840.113556.1.4.1413
|
09:12:14
|
jim
|
|
LDAP_SERVER_PERMISSIVE_MODIFY
|
09:10:51
|
jim
|
|
10.04.2019
|
Health Dataset
|
11:22:28
|
jim
|
|
Continuity of Care Record
|
11:14:21
|
jim
|
|
CCR
|
11:12:07
|
jim
|
|
Continuity of Care Document
|
11:11:43
|
jim
|
|
CCD
|
11:01:32
|
jim
|
|
Clinical Document Architecture
|
10:54:37
|
jim
|
|
07.04.2019
|
Lag HTTP headers
|
11:33:30
|
jim
|
|
Logs and File Locations
|
11:31:53
|
jim
|
Laghttpheaders ==> Lag HTTP headers |
LDAPWiki Images
|
11:28:23
|
jim
|
|
Euclidean Vector
|
11:19:42
|
jim
|
|
Point
|
11:14:59
|
jim
|
|
Vector Field
|
11:12:12
|
jim
|
|
Vector Space
|
11:07:12
|
jim
|
|
Grin
|
09:23:43
|
jim
|
|
MimbleWimble
|
09:17:33
|
jim
|
|
Web Blog_blogentry_070419_1
|
08:48:08
|
jim
|
|
02.04.2019
|
SDI Key
|
15:36:02
|
jim
|
|
NICI server-mode operation
|
15:27:17
|
jim
|
|
NICI client-mode operation
|
15:25:46
|
jim
|
|
NICI Configuration Files
|
15:15:44
|
jim
|
|
Security Domain Infrastructure
|
15:02:33
|
jim
|
|
NDSPKISDKeyServerDN
|
14:59:39
|
jim
|
Niciext ==> NICIEXT |
NICI
|
14:59:39
|
jim
|
Niciext ==> NICIEXT |
NICITreeKeyProvider
|
14:59:39
|
jim
|
Niciext ==> NICIEXT |
NICIEXT
|
14:59:38
|
jim
|
Niciext ==> NICIEXT |
WX Entries
|
14:32:21
|
jim
|
|
NICI Security Domain
|
14:28:09
|
jim
|
|
EDirectory Tree
|
14:27:02
|
jim
|
|
Key Access Partition
|
14:21:35
|
jim
|
|
NDS Tree-name
|
14:18:49
|
jim
|
|
NICISDI Keys
|
13:55:12
|
jim
|
|
NMAS Result Codes
|
13:46:01
|
jim
|
|
NMAS_E_NO_RESOLVE_DN
|
13:10:46
|
jim
|
|
01.04.2019
|
Session Key
|
08:45:31
|
jim
|
|
SASDFM key
|
08:44:09
|
jim
|
|
SASDFM
|
08:41:45
|
jim
|
|
SDIDIAGSwitches
|
08:27:51
|
jim
|
|
SDIDIAG
|
08:23:04
|
jim
|
|
27.03.2019
|
Source-code Repository
|
08:46:57
|
jim
|
|
Source code
|
08:46:39
|
jim
|
|
Repository
|
08:42:30
|
jim
|
|
19.03.2019
|
Ping Identity
|
14:29:51
|
jim
|
|
1.3.6.1.4.1.30221.2.5.9
|
14:27:53
|
jim
|
|
Join Request and Result Controls
|
14:27:16
|
jim
|
|
Differences between LDAP 2 and 3 Protocols
|
11:12:09
|
jim
|
|
LDAPv3
|
11:07:50
|
jim
|
|
AffectsMultipleDSAs
|
10:45:52
|
jim
|
|
SaslBindInProgress
|
10:45:10
|
jim
|
|
ConfidentialityRequired
|
10:44:29
|
jim
|
|
UnavailableCriticalExtension
|
10:43:41
|
jim
|
|
AdminLimitExceeded
|
10:42:05
|
jim
|
|
LDAPv2
|
10:28:07
|
jim
|
|
Electronic Health Record
|
08:38:49
|
jim
|
|
Patient Protection and Affordable Care Act
|
08:38:14
|
jim
|
|
PPACA
|
08:36:57
|
jim
|
|
10.03.2019
|
RFC 8174
|
09:46:25
|
jim
|
|
SHALL
|
09:45:22
|
jim
|
|
SHOULD NOT
|
09:44:28
|
jim
|
|
MUST NOT
|
09:44:01
|
jim
|
|
MUST
|
09:43:28
|
jim
|
|
SHOULD
|
09:42:59
|
jim
|
|
05.03.2019
|
Password Recovery
|
13:30:27
|
jim
|
|
WebAuthn Authentication
|
13:15:59
|
jim
|
|
Security Key
|
11:59:12
|
jim
|
|
WebAuthn Client
|
10:25:16
|
jim
|
|
CTAP2 Platform Host
|
10:23:49
|
jim
|
|
Human-palatable
|
10:18:16
|
jim
|
|
Authorization Gesture
|
09:56:47
|
jim
|
|
WebAuthn Relying Party
|
09:56:21
|
jim
|
|
WebAuthn Client Device
|
09:46:07
|
jim
|
|
Our Clients
|
09:35:29
|
jim
|
|
28.02.2019
|
LDAP_SERVER_SD_FLAGS_OID
|
09:39:28
|
jim
|
|
DACL_SECURITY_INFORMATION
|
09:30:08
|
jim
|
|
OWNER_SECURITY_INFORMATION
|
09:29:29
|
jim
|
|
SACL_SECURITY_INFORMATION
|
09:28:53
|
jim
|
|
GROUP_SECURITY_INFORMATION
|
09:25:57
|
jim
|
|
1.2.840.113556.1.4.801
|
09:04:32
|
jim
|
|
27.02.2019
|
DID method specification
|
17:54:25
|
jim
|
|
26.02.2019
|
2.16.840.1.113719.1.1.4.720
|
16:19:15
|
jim
|
|
DsContainerReadyAttrs
|
16:15:38
|
jim
|
|
25.02.2019
|
Automatic Certificate Management Environment
|
11:38:53
|
jim
|
|
Boulder
|
11:32:34
|
jim
|
|
13.02.2019
|
Imanager
|
12:38:29
|
jim
|
|
IManager 3.1.2
|
12:36:23
|
jim
|
|
Web Blog_blogentry_130219_1
|
08:52:30
|
jim
|
|
09.02.2019
|
Win32 DOS and OS-2 Result Code
|
12:20:52
|
jim
|
|
Result Code
|
12:19:07
|
jim
|
|
04.02.2019
|
RFC 4373
|
18:16:58
|
jim
|
|
Bulk Update-Replication Protocol
|
18:15:47
|
jim
|
|
LBURP
|
18:13:16
|
jim
|
|
LDAP Server Standards and Specifications
|
18:10:09
|
jim
|
|
LDAP and Bind Throttling
|
14:52:32
|
jim
|
|
Supported Novell eDirectory Agent Configuration Parameters
|
14:40:06
|
jim
|
|
03.02.2019
|
LDIF Generator
|
09:53:48
|
jim
|
|
30.01.2019
|
HAL
|
17:57:51
|
jim
|
|
Hardware Virtualization
|
17:51:40
|
jim
|
|
Application Virtualization
|
17:46:21
|
jim
|
|
Virtualization method
|
17:38:28
|
jim
|
|
Orchestration
|
17:34:38
|
jim
|
|
Container Orchestration
|
17:32:56
|
jim
|
|
Event 4673
|
12:54:05
|
jim
|
|
28.01.2019
|
Certificate Validation Tools
|
08:49:54
|
jim
|
|
Cipher Suite
|
08:46:16
|
jim
|
|
18.01.2019
|
User-Account-Control Attribute
|
12:09:18
|
jim
|
|
User-Account-Control Attribute Values
|
12:08:18
|
jim
|
|
PASSWD_CANT_CHANGE
|
11:43:53
|
jim
|
|
17.01.2019
|
CL Signature
|
11:39:36
|
jim
|
|
Anonymous Credential
|
11:31:41
|
jim
|
|
Double Ratchet Algorithm
|
11:31:29
|
jim
|
|
Identity Mixer
|
11:13:26
|
jim
|
|
Digital Signature
|
11:10:29
|
jim
|
|
Signatures with efficient protocols
|
11:06:18
|
jim
|
|
OpenID Connect User Questioning API
|
09:44:58
|
jim
|
|
OpenID Connect Account Porting
|
09:41:07
|
jim
|
|
John Bradley
|
09:30:13
|
jim
|
|
Private URI Scheme
|
09:24:36
|
jim
|
|
OpenID Connect Backchannel Authentication
|
09:18:50
|
jim
|
|
MODRNA
|
09:06:30
|
jim
|
|
15.01.2019
|
DirXML Shim
|
15:09:08
|
jim
|
|
DirXML command
|
14:54:49
|
jim
|
|
Events vs Commands
|
14:49:27
|
jim
|
|
PublicationShim
|
11:28:07
|
jim
|
|
SubscriptionShim
|
11:23:11
|
jim
|
|
DirXML Engine
|
11:20:19
|
jim
|
|
Identity Vault
|
11:12:20
|
jim
|
|
IDV
|
11:09:48
|
jim
|
|
DirXML 4.7
|
10:46:19
|
jim
|
|
IDMDeveloperInfo
|
10:43:06
|
jim
|
|
Temporary Redirect
|
09:48:04
|
jim
|
|
HTTP 307
|
09:43:48
|
jim
|
|
13.01.2019
|
Backslash
|
19:41:47
|
jim
|
Backslash () ==> Backslash |
UserApplications
|
19:37:05
|
jim
|
|
10.01.2019
|
Transport-layer Security Mechanism
|
17:24:27
|
jim
|
|
E-PHI
|
17:20:33
|
jim
|
|
HIPAA Security Rule
|
17:19:09
|
jim
|
|
Do-find-matching-object
|
16:26:38
|
jim
|
|
Error.do-find-matching-object
|
16:20:37
|
jim
|
|
07.01.2019
|
X-SEARCH-FLAGS
|
13:00:44
|
jim
|
|
X-SYSTEMFLAGS
|
13:00:16
|
jim
|
|
1.2.840.113556.1.2.3
|
12:49:16
|
jim
|
|
WhenChanged
|
12:48:59
|
jim
|
|
ModifiersName
|
12:34:25
|
jim
|
|
2.5.18.4
|
12:33:31
|
jim
|
|
03.01.2019
|
Acute Care
|
09:47:49
|
jim
|
|
02.01.2019
|
DIXIE
|
15:34:11
|
jim
|
|
29.12.2018
|
Nuclear
|
09:52:28
|
jim
|
|
DOE
|
09:42:49
|
jim
|
|
DOL
|
09:26:37
|
jim
|
|
United States Department of State
|
09:15:22
|
jim
|
|
27.12.2018
|
RFC 2606
|
13:44:06
|
jim
|
|
26.12.2018
|
Id_token_signing_alg_values_supported
|
09:43:11
|
jim
|
|
RFC 2119
|
09:42:13
|
jim
|
|
Id_token_encryption_enc_values_supported
|
09:04:49
|
jim
|
|
25.12.2018
|
NameConstraints
|
10:08:25
|
jim
|
|
Web Blog_blogentry_251218_1
|
09:55:38
|
jim
|
Subject Key IDentifier ==> SubjectKeyIdentifier |
AuthorityKeyIdentifier
|
09:54:40
|
jim
|
|
Root Certificate
|
09:41:10
|
jim
|
|
Certification path
|
09:39:20
|
jim
|
|
21.12.2018
|
CommonWell Health Alliance
|
10:37:36
|
jim
|
|
Epic Systems Corporation
|
10:24:37
|
jim
|
|
Web Blog_blogentry_211218_1
|
10:15:04
|
jim
|
|
20.12.2018
|
Cached and Stored Credentials
|
19:38:26
|
jim
|
|
MS-WKST
|
19:35:30
|
jim
|
|
How passwords are used in Windows
|
19:17:39
|
jim
|
|
Ticket Granting Ticket
|
18:53:46
|
jim
|
|
Kerberos Authentication Service
|
18:45:46
|
jim
|
|
19.12.2018
|
Modify Request
|
09:46:54
|
jim
|
|
17.12.2018
|
Cryptocurrency
|
14:40:56
|
jim
|
|
Independent United States Federal Agency
|
14:32:20
|
jim
|
|
Federal Trade Commission
|
14:28:25
|
jim
|
|
Fair Credit Reporting Act
|
14:24:25
|
jim
|
|
FCRA
|
14:23:32
|
jim
|
|
Commodity
|
14:17:28
|
jim
|
|
XRP
|
14:14:04
|
jim
|
|
Debtor
|
14:11:06
|
jim
|
|
Creditor
|
14:10:01
|
jim
|
|
Debt
|
14:07:42
|
jim
|
|
Interest
|
14:02:16
|
jim
|
|
Distributism
|
13:20:08
|
jim
|
|
Taiwan
|
12:24:22
|
jim
|
|
Web Blog_blogentry_171218_1
|
11:52:32
|
jim
|
|
NANP
|
11:28:05
|
jim
|
|
Central Office
|
11:21:25
|
jim
|
|
Market
|
11:13:44
|
jim
|
|
Chartered company
|
11:10:30
|
jim
|
|
Centralized Exchange
|
11:03:55
|
jim
|
|
Decentralized Exchange
|
11:01:30
|
jim
|
|
Monopsony
|
10:59:35
|
jim
|
|
Market structure
|
10:58:14
|
jim
|
|
Monopoly
|
10:55:18
|
jim
|
|
Medium of exchange
|
10:41:37
|
jim
|
|
Oligopoly
|
10:36:37
|
jim
|
|
16.12.2018
|
20th Century
|
11:28:06
|
jim
|
|
21st Century
|
11:27:16
|
jim
|
|
Century
|
11:19:46
|
jim
|
|
19th Century
|
11:16:37
|
jim
|
|
Web Storage
|
09:01:22
|
jim
|
|
SessionStorage
|
08:59:43
|
jim
|
|
15.12.2018
|
1800s
|
13:45:30
|
jim
|
|
Year 1899
|
13:44:15
|
jim
|
|
14.12.2018
|
HTML Colour Names
|
09:27:34
|
jim
|
|
Web Blog_blogentry_141218_1
|
09:20:09
|
jim
|
|
11.12.2018
|
ConfigFilesUnixinfo.log
|
11:31:36
|
jim
|
|
Jim
|
10:58:56
|
jim
|
|
MyStartPage
|
10:49:58
|
jim
|
|
1.3.6.1.4.1.8876.2.1
|
10:47:36
|
jim
|
|
1.3.6.1.4.1.8876.2.2
|
10:47:24
|
jim
|
|
1.3.6.1.4.1.8876.2
|
10:45:43
|
jim
|
|
1.3.6.1.4.1.8876.1
|
10:45:29
|
jim
|
|
Schema Extensions
|
10:43:24
|
jim
|
|
09.12.2018
|
IMF
|
10:38:45
|
jim
|
|
Web Blog_blogentry_091218_1
|
10:34:16
|
jim
|
|
Penetration Test
|
10:19:37
|
jim
|
|
Vulnerability Assessment
|
10:13:48
|
jim
|
|
Vulnerability
|
10:13:00
|
jim
|
|
Decentralized system
|
09:51:27
|
jim
|
|
Common Criteria for Information Technology Security Evaluation
|
09:42:37
|
jim
|
|
07.12.2018
|
Coherence
|
12:09:41
|
jim
|
|
CurveZMQ
|
11:44:54
|
jim
|
|
Plenum Byzantine Fault Tolerant Protocol
|
11:37:57
|
jim
|
|
06.12.2018
|
Organizational friction
|
16:43:05
|
jim
|
|
Mura
|
16:21:27
|
jim
|
|
Muda
|
16:20:10
|
jim
|
|
Muri
|
16:11:49
|
jim
|
|
Kanban
|
16:06:26
|
jim
|
|
Friction
|
15:48:32
|
jim
|
|
NDS Threads
|
11:55:42
|
jim
|
|
Web Blog_blogentry_061218_1
|
10:46:18
|
jim
|
|
05.12.2018
|
N4u.server.listen-on-loopback
|
15:07:18
|
jim
|
|
04.12.2018
|
MS Access Mask
|
12:40:12
|
jim
|
|
MS Access Mask/ms-accctrl4.png
|
12:37:51 |
jim
|
MS Access Mask Format |
Image Styles
|
12:32:05
|
jim
|
|
Access Control Entry
|
12:20:56
|
jim
|
|
Access Control Entry Type
|
12:15:22
|
jim
|
|
Rights
|
12:03:35
|
jim
|
|
Discretionary Access Control List
|
11:37:34
|
jim
|
|
Access Control List
|
10:14:27
|
jim
|
|
System Access Control List
|
10:12:27
|
jim
|
|
SID identifier authority
|
09:55:50
|
jim
|
|
SECURITY_NT_AUTHORITY
|
09:36:17
|
jim
|
|
Security Identifier
|
09:29:45
|
jim
|
|
03.12.2018
|
Mimikatz
|
17:24:55
|
jim
|
|
Golden Ticket
|
17:16:31
|
jim
|
|
MLLP
|
13:44:01
|
jim
|
|
Minimal Lower Layer Protocol
|
13:42:01
|
jim
|
|
Book
|
13:32:48
|
jim
|
|
Web Blog_blogentry_200918_1
|
13:32:24
|
jim
|
Health Care ==> HealthCare |
Web Blog_blogentry_281018_1
|
13:32:24
|
jim
|
Health Care ==> HealthCare |
Medical ID Card
|
13:32:23
|
jim
|
Health Care ==> HealthCare |
Personal Health Record
|
13:32:23
|
jim
|
Health Care ==> HealthCare |
Regulatory Risk
|
13:32:23
|
jim
|
Health Care ==> HealthCare |
United States Office of Personnel Management
|
13:32:23
|
jim
|
Health Care ==> HealthCare |
Web Blog_blogentry_030618_1
|
13:32:23
|
jim
|
Health Care ==> HealthCare |
Integrating the Healthcare Enterprise
|
13:32:22
|
jim
|
Health Care ==> HealthCare |
Meaningful Use
|
13:32:22
|
jim
|
Health Care ==> HealthCare |
Health Care Provider
|
13:32:21
|
jim
|
Health Care ==> HealthCare |
Health Information Technology for Economic and Clinical Health
|
13:32:21
|
jim
|
Health Care ==> HealthCare |
Industry Specific
|
13:32:21
|
jim
|
Health Care ==> HealthCare |
Electronic Medical Record
|
13:32:20
|
jim
|
Health Care ==> HealthCare |
Federal Health Care Law
|
13:32:20
|
jim
|
Health Care ==> HealthCare |
HIPAA Covered Entity
|
13:32:20
|
jim
|
Health Care ==> HealthCare |
Health Care Organization
|
13:32:20
|
jim
|
Health Care ==> HealthCare |
Digital Imaging and Communications in Medicine
|
13:32:19
|
jim
|
Health Care ==> HealthCare |
Electronic Fitness Device
|
13:32:19
|
jim
|
Health Care ==> HealthCare |
HealthCare
|
13:32:19
|
jim
|
Health Care ==> HealthCare |
Data anonymization
|
13:30:21
|
jim
|
|
Cloud Data Store
|
13:24:24
|
jim
|
|
Dataset
|
13:20:17
|
jim
|
|
Windows registry
|
13:19:18
|
jim
|
Data Store ==> DataStore |
System Authorization Facility
|
13:19:17
|
jim
|
Data Store ==> DataStore |
Update
|
13:19:17
|
jim
|
Data Store ==> DataStore |
Web Blog_blogentry_090418_1
|
13:19:17
|
jim
|
Data Store ==> DataStore |
Web Blog_blogentry_211217_1
|
13:19:17
|
jim
|
Data Store ==> DataStore |
Password Policy
|
13:19:16
|
jim
|
Data Store ==> DataStore |
Protocol Buffers
|
13:19:16
|
jim
|
Data Store ==> DataStore |
Read
|
13:19:16
|
jim
|
Data Store ==> DataStore |
Replication
|
13:19:16
|
jim
|
Data Store ==> DataStore |
NoSQL
|
13:19:15
|
jim
|
Data Store ==> DataStore |
Oracle Unified Directory
|
13:19:15
|
jim
|
Data Store ==> DataStore |
LDAP Overview
|
13:19:14
|
jim
|
Data Store ==> DataStore |
HBase
|
13:19:13
|
jim
|
Data Store ==> DataStore |
Faythe
|
13:19:12
|
jim
|
Data Store ==> DataStore |
GCP Storage Products
|
13:19:12
|
jim
|
Data Store ==> DataStore |
Delete
|
13:19:11
|
jim
|
Data Store ==> DataStore |
Delete Request
|
13:19:11
|
jim
|
Data Store ==> DataStore |
Distributed Data Store
|
13:19:11
|
jim
|
Data Store ==> DataStore |
Data Metadata
|
13:19:10
|
jim
|
Data Store ==> DataStore |
Data Processor
|
13:19:10
|
jim
|
Data Store ==> DataStore |
Data warehouse
|
13:19:10
|
jim
|
Data Store ==> DataStore |
Database
|
13:19:10
|
jim
|
Data Store ==> DataStore |
Create
|
13:19:09
|
jim
|
Data Store ==> DataStore |
Credential Repository
|
13:19:09
|
jim
|
Data Store ==> DataStore |
Credential Vault
|
13:19:09
|
jim
|
Data Store ==> DataStore |
Cryptocurrency wallet
|
13:19:09
|
jim
|
Data Store ==> DataStore |
Biometric Identification
|
13:19:08
|
jim
|
Data Store ==> DataStore |
Brocade Communications Systems
|
13:19:08
|
jim
|
Data Store ==> DataStore |
By-reference
|
13:19:08
|
jim
|
Data Store ==> DataStore |
American Association of Motor Vehicle Administrators
|
13:19:07
|
jim
|
Data Store ==> DataStore |
Biometric Enrollment
|
13:19:07
|
jim
|
Data Store ==> DataStore |
DataStore
|
13:19:07
|
jim
|
Data Store ==> DataStore |
Personal Information Protection and Electronic Documents Act
|
10:00:12
|
jim
|
|
02.12.2018
|
Matrix
|
10:38:36
|
jim
|
|
Graph
|
10:32:15
|
jim
|
|
Binary Tree
|
10:28:27
|
jim
|
|
JSONArray
|
10:22:47
|
jim
|
|
Array
|
10:21:28
|
jim
|
|
Linked List
|
10:20:13
|
jim
|
|
Data Structure
|
10:13:45
|
jim
|
|
Delivery Team
|
09:41:58
|
jim
|
|
Software
|
09:38:09
|
jim
|
|
Perl
|
09:33:29
|
jim
|
|
Debug
|
09:31:28
|
jim
|
|
Firebase
|
09:29:54
|
jim
|
|
Application
|
09:29:24
|
jim
|
|
Waterfall model
|
09:28:11
|
jim
|
|
Software Development Kit
|
09:24:33
|
jim
|
|
Lean Product Development
|
09:24:02
|
jim
|
|
01.12.2018
|
Refactoring
|
13:39:48
|
jim
|
|
Remote Procedure Call
|
11:16:03
|
jim
|
|
Function
|
11:13:54
|
jim
|
|
Class
|
11:10:54
|
jim
|
|
Method
|
11:09:43
|
jim
|
|
Object
|
11:08:57
|
jim
|
|
SNMP
|
11:06:09
|
jim
|
|
Session Management
|
11:04:55
|
jim
|
|
SAML Web Browser Profiles
|
11:04:19
|
jim
|
|
Certification Authority Rating And Trust
|
11:02:48
|
jim
|
|
Binding_message
|
11:01:51
|
jim
|
|
Commitment Scheme
|
10:58:55
|
jim
|
|
FAL 2
|
10:57:33
|
jim
|
|
GS2 Mechanism Family
|
10:56:35
|
jim
|
|
SAML Bindings
|
10:54:46
|
jim
|
|
Subroutine
|
10:26:54
|
jim
|
|
Backus Normal Form
|
10:00:52
|
jim
|
|
Inheritance
|
09:58:05
|
jim
|
|
Python
|
09:56:53
|
jim
|
|
Property
|
09:56:35
|
jim
|
|
Object-oriented Programming
|
09:53:25
|
jim
|
|
Extreme Programming
|
09:52:32
|
jim
|
|
Software development
|
09:51:22
|
jim
|
|
Protocol
|
09:23:52
|
jim
|
|
Protocol Stack
|
09:22:25
|
jim
|
|
DIAMETER
|
09:20:21
|
jim
|
|
30.11.2018
|
Ecash
|
11:04:38
|
jim
|
|
Store of value
|
10:48:11
|
jim
|
|
Unit of measurement
|
10:46:01
|
jim
|
|
Store
|
10:23:18
|
jim
|
|
Identity Data Store
|
10:21:37
|
jim
|
|
29.11.2018
|
Fractional Reserve
|
17:52:34
|
jim
|
|
OpenLedger
|
17:48:05
|
jim
|
|
Pwd-Last-Set attribute
|
14:55:16
|
jim
|
|
PwdLastSet
|
14:46:06
|
jim
|
|
DID path
|
14:13:56
|
jim
|
|
DID record
|
14:13:38
|
jim
|
|
DID Operations
|
14:13:23
|
jim
|
|
DID reference
|
14:12:09
|
jim
|
|
DID Fragment
|
14:11:36
|
jim
|
|
DID Service Endpoint
|
13:58:02
|
jim
|
|
DID Document
|
13:55:32
|
jim
|
|
Trust Anchor
|
13:23:52
|
jim
|
|
27.11.2018
|
OBIT_COUNT_FROM_DATABASE_INDEX
|
13:01:45
|
jim
|
|
Cn=Partition, cn=Agent, cn=monitor
|
13:00:31
|
jim
|
|
ChangeCacheCount
|
12:59:30
|
jim
|
|
UserAttribute
|
12:58:06
|
jim
|
|
NDS Obituaries
|
12:49:40
|
jim
|
|
Change Cache
|
12:40:50
|
jim
|
|
PerishableData
|
12:23:25
|
jim
|
|
Glossary Of LDAP And Directory Terminology
|
12:11:32
|
jim
|
ReplicaS Perishable Data Delta ==> PerishableData |
MaxRingDelta
|
12:09:16
|
jim
|
Maximum Ring Delta ==> MaxRingDelta |
PurgeVector
|
11:59:22
|
jim
|
|
2.16.840.1.113719.1.1.4.1.500
|
11:34:55
|
jim
|
|
ObituaryNotify
|
11:34:32
|
jim
|
|
PlaceOfBirth
|
11:13:05
|
jim
|
|
SapAddOnUM
|
11:11:47
|
jim
|
|
1.3.6.1.4.1.694.2.1.104
|
11:10:08
|
jim
|
|
BirthName
|
11:09:07
|
jim
|
|
DateOfBirth
|
11:04:52
|
jim
|
|
Date Of Birth
|
11:04:30
|
jim
|
|
Birth Certificate
|
11:03:21
|
jim
|
|
Birth Record
|
11:03:02
|
jim
|
|
Monitor Entry
|
10:07:47
|
jim
|
|
Canada
|
10:02:13
|
jim
|
|
United States
|
10:00:11
|
jim
|
|
Earth
|
09:56:54
|
jim
|
|
Australia
|
09:56:00
|
jim
|
|
Antarctica
|
09:53:20
|
jim
|
|
South America
|
09:52:11
|
jim
|
|
North America
|
09:50:12
|
jim
|
|
Europe
|
09:47:43
|
jim
|
|
Africa
|
09:46:15
|
jim
|
|
Asia
|
09:44:07
|
jim
|
|
Continent
|
09:42:28
|
jim
|
|
Estonia
|
09:36:55
|
jim
|
|
DigiD
|
09:30:46
|
jim
|
|
Netherlands
|
09:28:01
|
jim
|
|
National ID
|
09:13:16
|
jim
|
|
Xdas.properties
|
09:09:22
|
jim
|
|
XDAS
|
09:08:14
|
jim
|
|
26.11.2018
|
OBIT_MOVED_PURGEABLE
|
15:34:23
|
jim
|
|
OBIT_MOVED_OK_TO_PURGE
|
15:33:46
|
jim
|
|
OBIT_MOVED_NOTIFIED
|
15:33:29
|
jim
|
|
OBIT_MOVED_ISSUED
|
15:33:10
|
jim
|
|
OBIT_NEWRDN_PURGEABLE
|
15:32:43
|
jim
|
|
OBIT_DEAD_ISSUED
|
15:32:14
|
jim
|
|
OBIT_NEWRDN_NOTIFIED
|
15:32:07
|
jim
|
|
OBIT_NEWRDN_OK_TO_PURGE
|
15:31:37
|
jim
|
|
OBIT_NEWRDN_ISSUED
|
15:31:18
|
jim
|
|
OBIT_DEAD_PURGEABLE
|
15:30:55
|
jim
|
|
OBIT_DEAD_OK_TO_PURGE
|
15:30:29
|
jim
|
|
OBIT_DEAD_NOTIFIED
|
15:30:03
|
jim
|
|
NDS Obituary State
|
15:28:26
|
jim
|
|
OBIT_NOTIFIED
|
15:27:28
|
jim
|
|
OBIT_ISSUED
|
15:26:24
|
jim
|
|
OBIT_PURGEABLE
|
15:25:51
|
jim
|
|
OBIT_OK_TO_PURGE
|
15:24:04
|
jim
|
|
NDS Obituaries Type
|
15:11:54
|
jim
|
|
INHIBIT_MOVE Obituary
|
15:11:15
|
jim
|
|
OBIT_MOVED
|
15:10:35
|
jim
|
MOVED Obituary ==> OBIT_MOVED |
NDS Primary Obituaries
|
15:10:15
|
jim
|
|
OBIT_NEWRDN
|
15:09:35
|
jim
|
NEW RDN Obituary ==> OBIT_NEWRDN |
OBIT_DEAD
|
15:07:09
|
jim
|
DEAD Obituary ==> OBIT_DEAD |
NDS Obituaries Classification
|
14:21:19
|
jim
|
|
25.11.2018
|
XDAS Security Events
|
20:36:54
|
jim
|
|
Locked By Intruder
|
20:33:38
|
jim
|
|
NMAS_LOGIN
|
12:35:53
|
jim
|
|
RFC 4301
|
12:31:58
|
jim
|
|
SASL EXTERNAL
|
12:29:51
|
jim
|
|
22.11.2018
|
Encoding claims in the OAuth 2 state parameter using a JWT
|
16:16:31
|
jim
|
|
OAuth 2.0 Mix-Up Attack
|
16:01:07
|
jim
|
|
21.11.2018
|
UAF
|
09:46:53
|
jim
|
|
20.11.2018
|
Policy
|
12:47:52
|
jim
|
|
17.11.2018
|
Pic
|
12:35:38
|
jim
|
|
TitleBox
|
11:54:49
|
jim
|
|
OSI-Model/OSI Model.svg
|
10:11:46 |
jim
|
ODI Model |
Kim Cameron
|
09:17:27
|
jim
|
|
16.11.2018
|
Edirectory Indexes
|
10:29:38
|
jim
|
|
SasUpdateLoginInfo
|
10:11:40
|
jim
|
|
13.11.2018
|
LDAPSyntaxes
|
14:57:29
|
jim
|
|
Postal Address_LDAPSyntax
|
14:56:15
|
jim
|
|
Case Ignore List
|
14:54:38
|
jim
|
|
1.3.6.1.4.1.1466.115.121.1.41
|
14:49:18
|
jim
|
|
Counter_LDAPSyntax
|
14:33:03
|
jim
|
|
2.16.840.1.113719.1.1.5.1.22
|
14:06:24
|
jim
|
Counter_AttribuType ==> Counter_LDAPSyntax |
Counter
|
14:01:08
|
jim
|
XCounter ==> Counter |
JSPWikiCorePlugins
|
14:01:08
|
jim
|
XCounter ==> Counter |
JSPWikiPlugins
|
14:01:08
|
jim
|
XCounter ==> Counter |
Time To Live
|
14:01:08
|
jim
|
XCounter ==> Counter |
Edirectory Filtered Replicas
|
13:57:22
|
jim
|
|
ReplicaType
|
13:56:48
|
jim
|
|
X-NDS_FILTERED_OPERATIONAL
|
11:34:17
|
jim
|
|
X-NDS_FILTERED_REQUIRED
|
11:33:45
|
jim
|
|
ReplicaState
|
11:08:06
|
jim
|
|
NDS Sparse Read Replica
|
10:44:02
|
jim
|
|
NDS Sparse Write Replica
|
10:37:03
|
jim
|
EdirectoryFilteredReadWriteReplica ==> NDS Sparse Write Replica |
NDS Replica Pointer
|
10:30:07
|
jim
|
|
2.16.840.1.113719.1.1.5.1.16
|
10:15:35
|
jim
|
|
Replica
|
10:14:28
|
jim
|
|
Replica number
|
10:05:33
|
jim
|
|
Replica List
|
10:03:26
|
jim
|
|
Partition Root Entry
|
10:01:25
|
jim
|
|
Schema Sync
|
09:56:21
|
jim
|
|
Removing Failed Server
|
09:44:51
|
jim
|
|
NDS Subordinate Reference Replica
|
09:41:58
|
jim
|
EdirectorySubordinateReferenceReplica ==> NDS Subordinate Reference Replica |
NDS Read-Only Replica
|
09:36:50
|
jim
|
Edirectory ReadOnly Replica ==> NDS Read-Only Replica |
NDS Read-Write Replica
|
09:33:00
|
jim
|
EdirectoryReadWriteReplica ==> NDS Read-Write Replica |
NDS Master Replica
|
09:28:52
|
jim
|
|
12.11.2018
|
Web Blog_blogentry_121118_1
|
13:50:23
|
jim
|
|
Identifier registry
|
12:06:28
|
jim
|
|
Web Blog_blogentry_090217_1
|
11:57:17
|
jim
|
|
Password Statistics
|
11:41:10
|
jim
|
|
CAPTCHA
|
11:40:30
|
jim
|
|
Relying Party
|
11:40:12
|
jim
|
|
OpenAM
|
11:39:55
|
jim
|
|
Social Login
|
11:39:33
|
jim
|
|
11.11.2018
|
Office of Tailored Access Operations
|
18:57:15
|
jim
|
|
QUANTUM
|
18:43:49
|
jim
|
|
DISHFIRE
|
18:43:21
|
jim
|
|
National Security Agency
|
18:33:21
|
jim
|
|
10.11.2018
|
RFC 269
|
10:28:44
|
jim
|
|
Foo
|
10:27:53
|
jim
|
|
RFC 3092
|
10:23:36
|
jim
|
|
The Twelve Networking Truths
|
10:04:19
|
jim
|
|
RFC 1925
|
09:58:18
|
jim
|
|
RFC 1776
|
09:57:00
|
jim
|
|
RFC 1217
|
09:53:19
|
jim
|
|
RFC 6214
|
09:46:31
|
jim
|
|
RFC 2549
|
09:45:24
|
jim
|
|
A Standard for the Transmission of IP Datagrams on Avian Carriers
|
09:41:32
|
jim
|
|
09.11.2018
|
Password Authentication is Broken
|
12:24:16
|
jim
|
|
Credential Leaked Databases
|
12:09:21
|
jim
|
|
Web Blog_blogentry_230418_1
|
12:03:59
|
jim
|
|
Ontology
|
09:36:07
|
jim
|
|
OperationalAttribute
|
08:59:07
|
jim
|
|
Requesting Attributes by Object Class
|
08:56:59
|
jim
|
|
1.3.6.1.4.1.4203.1.5.2
|
08:45:48
|
jim
|
|
08.11.2018
|
DirXML-DriverStartOption
|
18:48:08
|
jim
|
|
07.11.2018
|
TRAFFICTHIEF
|
15:33:59
|
jim
|
|
MAINWAY
|
15:28:54
|
jim
|
|
PINWALE
|
15:13:58
|
jim
|
|
05.11.2018
|
Attack Effort
|
16:56:30
|
jim
|
Risk Taxonomy ==> Risk Taxonomy Technical Standard |
Risk Taxonomy Technical Standard
|
16:56:30
|
jim
|
Risk Taxonomy ==> Risk Taxonomy Technical Standard |
Open Factor Analysis of Information Risk
|
16:55:59
|
jim
|
|
The Open Group
|
16:42:58
|
jim
|
|
2.16.840.1.113719.1.8.4.6
|
12:29:09
|
jim
|
|
04.11.2018
|
Web Blog_blogentry_251018_1
|
12:01:57
|
jim
|
|
Event Data Recorder
|
10:58:19
|
jim
|
|
EDR
|
10:57:19
|
jim
|
|
TAO
|
10:18:53
|
jim
|
|
Attribution
|
10:02:49
|
jim
|
|
03.11.2018
|
Host Name Resolution
|
21:28:53
|
jim
|
|
Hostname
|
21:19:10
|
jim
|
|
Web Blog_blogentry_021118_1
|
13:01:01
|
jim
|
|
Loyalty Card
|
09:56:28
|
jim
|
|
Web Blog_blogentry_031118_1
|
08:40:51
|
jim
|
|
Human Element
|
08:19:00
|
jim
|
|
Human
|
08:12:00
|
jim
|
|
Windows Client Authentication Architecture/Windows Client Authentication Architecture.svg
|
07:27:13 |
jim
|
|
Security Account Manager
|
07:24:24
|
jim
|
|
02.11.2018
|
User mode and Kernel mode
|
22:04:52
|
jim
|
|
PKU2U
|
11:53:42
|
jim
|
|
Year 1934
|
09:43:47
|
jim
|
|
Telecommunications Act
|
09:43:16
|
jim
|
|
01.11.2018
|
Encryption
|
14:14:29
|
jim
|
|
ROT13
|
14:10:31
|
jim
|
|
Substitution Cipher
|
14:01:21
|
jim
|
|
Caesar Cipher
|
13:57:32
|
jim
|
|
Offset Codebook Mode
|
13:53:44
|
jim
|
|
XorEncryptXor
|
13:46:18
|
jim
|
|
TBC
|
13:45:33
|
jim
|
|
Tweakable Block Cipher
|
13:45:19
|
jim
|
Tweakable Blockcipher ==> Tweakable Block Cipher |
XEX
|
13:42:53
|
jim
|
|
OCB2
|
13:37:15
|
jim
|
|
Consent
|
13:10:09
|
jim
|
|
Contract
|
13:01:04
|
jim
|
|
Smart contracts
|
12:37:16
|
jim
|
|
Mutual Authentication
|
08:12:54
|
jim
|
|
31.10.2018
|
Web Blog_blogentry_301018_1
|
12:10:35
|
jim
|
|
Year 1960
|
09:11:34
|
jim
|
|
Year 2099
|
09:10:40
|
jim
|
|
Year 1999
|
09:09:43
|
jim
|
|
1990s
|
09:05:01
|
jim
|
|
Year 1900
|
09:03:53
|
jim
|
|
Year 1924
|
08:49:22
|
jim
|
|
Year 1901
|
08:48:55
|
jim
|
|
Year 1939
|
08:48:15
|
jim
|
|
World War II
|
08:47:35
|
jim
|
|
Great Depression
|
08:46:33
|
jim
|
|
G.I. Generation
|
08:45:15
|
jim
|
|
Generation Y
|
08:43:03
|
jim
|
|
World War I
|
08:42:18
|
jim
|
|
Lost Generation
|
08:41:18
|
jim
|
|
Silent Generation
|
08:36:58
|
jim
|
|
Generation X
|
08:34:44
|
jim
|
|
Baby boomers
|
08:29:07
|
jim
|
|
Millennials
|
08:28:01
|
jim
|
|
Generation
|
08:26:03
|
jim
|
|
Generation Z
|
08:22:15
|
jim
|
|
Login_hint
|
07:53:25
|
jim
|
|
30.10.2018
|
Millennium
|
16:45:40
|
jim
|
|
Billion
|
16:40:57
|
jim
|
|
Million
|
16:34:56
|
jim
|
|
Number
|
16:32:18
|
jim
|
|
Thousand
|
16:29:12
|
jim
|
|
Hundred
|
16:27:03
|
jim
|
|
One
|
16:25:15
|
jim
|
|
Trillion
|
16:11:09
|
jim
|
|
OPM
|
16:03:36
|
jim
|
|
United States Federal Agency
|
16:00:54
|
jim
|
|
29.10.2018
|
PDC Emulator FSMO Role
|
18:11:11
|
jim
|
|
Infrastructure Master FSMO Role
|
18:08:24
|
jim
|
|
RID Master FSMO Role
|
18:08:18
|
jim
|
|
Domain Naming Master FSMO Role
|
18:08:12
|
jim
|
|
Schema Master FSMO Role
|
18:08:06
|
jim
|
|
Flexible Single Master Operation
|
18:05:16
|
jim
|
|
DirXMLState
|
18:05:08
|
jim
|
|
28.10.2018
|
Notify and Reset Subscriber Filter
|
15:16:12
|
jim
|
|
Group Signatures
|
14:11:08
|
jim
|
|
Blue Button
|
12:13:25
|
jim
|
|
Patient Data
|
11:02:28
|
jim
|
|
Registry
|
09:44:30
|
jim
|
|
ERROR_DS_ENCODING_ERROR
|
08:07:15
|
jim
|
|
DN Escape Values
|
08:06:16
|
jim
|
|
ERROR_DS_NON_BASE_SEARCH
|
08:01:06
|
jim
|
|
LDAP Dereference Control
|
07:44:44
|
jim
|
|
1.3.6.1.4.1.4203.666.5.16
|
07:38:56
|
jim
|
|
27.10.2018
|
Paper Size
|
15:38:53
|
jim
|
|
Web Blog_blogentry_271018_1
|
15:03:55
|
jim
|
|
Guam
|
11:40:37
|
jim
|
|
Northern Mariana Islands
|
11:39:19
|
jim
|
|
Puerto Rico
|
11:39:03
|
jim
|
|
Insular Areas
|
11:38:17
|
jim
|
|
Year 1954
|
11:36:57
|
jim
|
|
Unorganized territory
|
11:20:14
|
jim
|
|
Commonwealth
|
11:20:05
|
jim
|
|
Organized territory
|
11:19:45
|
jim
|
|
Incorporated territory
|
11:13:14
|
jim
|
|
Unincorporated territory
|
11:13:04
|
jim
|
|
Organic Act
|
11:12:39
|
jim
|
|
United States Territories
|
11:03:26
|
jim
|
|
DOI
|
10:42:51
|
jim
|
|
MP
|
10:07:55
|
jim
|
|
Indian Reservation
|
09:51:19
|
jim
|
|
United States Minor Outlying Islands
|
09:40:43
|
jim
|
|
2.16.840.1.113719.1.8.4.4
|
09:28:21
|
jim
|
|
City
|
09:28:05
|
jim
|
|
Townships
|
09:20:36
|
jim
|
|
County
|
09:14:10
|
jim
|
|
US States
|
09:06:41
|
jim
|
|
26.10.2018
|
Internet User Authorization
|
13:34:47
|
jim
|
|
IUA
|
13:34:09
|
jim
|
|
WorkFlow
|
12:55:44
|
jim
|
|
Trigger
|
12:51:01
|
jim
|
|
21st Century Cures Act
|
10:53:20
|
jim
|
|
NIH
|
10:50:58
|
jim
|
|
National Institutes of Health
|
10:47:53
|
jim
|
|
NHIN
|
10:35:08
|
jim
|
|
Nationwide Health Information Network
|
10:34:20
|
jim
|
|
Federal Risk and Authorization Management Program
|
09:09:47
|
jim
|
|
Use cases
|
08:37:08
|
jim
|
|
25.10.2018
|
Certificate Signing Request
|
20:33:31
|
jim
|
|
RFC 5967
|
20:25:46
|
jim
|
|
PKCS10
|
20:24:35
|
jim
|
|
Federal Information Security and Management Act
|
14:35:16
|
jim
|
|
Gramm-Leach-Bliley Act
|
14:29:01
|
jim
|
|
Bank Secrecy Act
|
14:26:38
|
jim
|
|
BSA
|
14:24:39
|
jim
|
|
Sarbanes-Oxley Act
|
14:19:33
|
jim
|
|
Federal Reserve Act
|
14:14:21
|
jim
|
|
Telephone Consumer Protection Act
|
14:12:09
|
jim
|
|
Do-Not-Call
|
14:10:10
|
jim
|
|
NSL
|
13:24:26
|
jim
|
|
National Security Letter
|
13:24:02
|
jim
|
|
RFPA
|
13:20:15
|
jim
|
|
Money laundering
|
13:11:29
|
jim
|
|
Money Laundering Control Act
|
13:08:59
|
jim
|
|
Stored Communications Act
|
11:26:12
|
jim
|
|
SCA
|
11:21:02
|
jim
|
|
RFC 7292
|
11:16:37
|
jim
|
|
ECPA
|
11:15:41
|
jim
|
|
24.10.2018
|
Federal Tax Information
|
13:42:02
|
jim
|
|
United States Social Security Administration
|
13:40:39
|
jim
|
|
Social Security Number
|
13:40:21
|
jim
|
|
Medicaid
|
13:39:49
|
jim
|
|
U.S.C. Title 18
|
13:36:40
|
jim
|
|
Electronic Communications Privacy Act
|
13:34:22
|
jim
|
|
One-party consent
|
13:31:02
|
jim
|
|
18 U.S.C. 2511
|
13:27:05
|
jim
|
|
Social Security Act
|
13:25:52
|
jim
|
|
U.S.C.
|
13:25:00
|
jim
|
|
Dialed Number Recorder
|
13:23:48
|
jim
|
|
Private Law
|
13:18:30
|
jim
|
|
Act of Congress
|
13:10:33
|
jim
|
|
Web Blog_blogentry_241018_1
|
12:57:15
|
jim
|
|
SEPA
|
10:42:15
|
jim
|
|
Single Euro Payments Area
|
10:41:42
|
jim
|
|
European Payments Council
|
10:37:08
|
jim
|
|
The Berlin Group
|
10:29:35
|
jim
|
|
NextGenPSD2
|
10:26:11
|
jim
|
|
Four-Party Credit Card System
|
10:21:06
|
jim
|
|
Access to Account
|
10:18:12
|
jim
|
|
Payment Service User
|
10:14:00
|
jim
|
|
XS2A
|
10:12:59
|
jim
|
|
Payment Initiation Service Provider
|
10:10:39
|
jim
|
|
Account Information Service Provider
|
10:10:14
|
jim
|
|
Third Party Payment Service Provider
|
10:08:51
|
jim
|
|
OAuth 2.0 Proof-of-Possession (PoP) Security Architecture
|
09:32:48
|
jim
|
|
1.3.6.1.4.1.42.2.27.8.1.23
|
09:12:00
|
jim
|
|
21.10.2018
|
Information security
|
08:37:13
|
jim
|
|
Secure Remote Password Protocol
|
08:34:49
|
jim
|
|
3rd Generation Partnership Project
|
08:31:33
|
jim
|
|
Secure by design
|
08:15:46
|
jim
|
|
European Telecommunications Standards Institute
|
08:12:23
|
jim
|
|
Web Blog_blogentry_211018_1
|
07:51:26
|
jim
|
|
20.10.2018
|
Ten Principles of Self-Sovereign Identity
|
10:17:46
|
jim
|
|
Web Blog_blogentry_191018_1
|
10:07:14
|
jim
|
|
Right to be forgotten
|
10:03:53
|
jim
|
|
18.10.2018
|
Local Security Authority Subsystem Service
|
12:49:06
|
jim
|
|
HKCU
|
12:43:53
|
jim
|
|
HIVE
|
12:43:24
|
jim
|
|
HKEY_DYN_DATA
|
12:42:55
|
jim
|
|
Windows ME
|
12:40:31
|
jim
|
|
Windows 9x
|
12:37:47
|
jim
|
|
Personal Computer
|
12:35:30
|
jim
|
|
Windows NT
|
12:34:55
|
jim
|
|
HKEY_PERFORMANCE_DATA
|
12:30:02
|
|