jspωiki
FullRecentChanges

These are all of the changes made to these pages. A much shorter list is available in RecentChanges.

18.10.2019
ExtensibleMatch 08:27:23 jim
17.10.2019
Subject 09:12:41 jim
Digital Subject 09:11:39 jim
Principal 09:02:51 jim
Law of agency 09:01:39 jim
Identity Correlation 08:58:01 jim
Account Linking 08:46:30 jim
14.10.2019
Phone subscriber 20:26:20 jim
Mobile Equipment Identifier 20:20:41 jim
Mobile 20:20:08 jim
0.9.2342.19200300.100.1.41 20:18:57 jim
Mobile Device 20:13:53 jim
Mobile Subscriber Identification Number 20:08:12 jim
Mobile Station 20:07:35 jim
MSID 20:06:36 jim
Home Location Register 20:00:58 jim
Mobile Station International Subscriber Directory Number 13:42:10 jim
Home Network Identity 13:34:47 jim
Public Land Mobile Network 13:33:52 jim
International Mobile Subscriber Identity 13:31:29 jim
Location Area Identity 13:26:51 jim
Mobile Operator Discovery, Registration & Authentication 13:17:50 jim
Mobile Connect 13:12:59 jim
Subscriber Identification Module 13:01:47 jim
CHV 12:58:52 jim
Password Reuse 12:42:30 jim
Passwordless SMS Authentication 12:39:32 jim
Mobile TAN 12:18:36 jim
SS7 hack 12:17:38 jim
NIST.SP.800-63C 12:16:17 jim
Password Authentication 11:48:29 jim Passwordless Connection ==> Passwordless SMS Authentication
Password-based 11:11:29 jim
Messaging Layer Security 09:25:27 jim
Security Layer 08:56:15 jim
MLS 08:50:56 jim
DID Authentication 08:44:14 jim
Self-Issued OpenID Provider 08:26:56 jim
SIOP 07:59:30 jim
Decentralized Identity Foundation 07:48:44 jim
13.10.2019
Thunderbolt 10:25:18 jim
USB Type-C 10:24:02 jim
DisplayPort 10:23:07 jim
PCI Express 10:20:53 jim
PCI 10:15:19 jim
Universal Serial Bus 10:02:23 jim
USB-C 09:43:15 jim
Mini DisplayPort 09:34:44 jim
11.10.2019
UserInfo Response 10:26:43 jim
UserInfo Request 10:22:42 jim
Userinfo_endpoint 10:17:18 jim
AccountNameHistory 09:56:45 jim
Locality 09:25:29 jim
2.5.4.7 09:21:57 jim
L 09:20:34 jim
OrganizationalUnit 09:06:49 jim
Ou 08:57:36 jim
2.5.4.11 08:57:34 jim
OrganizationalUnitName 08:50:49 jim
Identity Token 08:05:28 jim
10.10.2019
AttributeSelection 09:25:10 jim
Retrieving All Attributes 09:23:46 jim
08.10.2019
Customer Identity and Access Management 10:11:48 jim
CIAM 10:05:15 jim
General Data Protection Regulation 10:01:43 jim
OAuth 2.0 Security Best Current Practice 09:59:35 jim
Knowledge-Based Authentication 09:58:16 jim
Separation of Duty 09:57:49 jim
United States Director of National Intelligence 09:57:09 jim
Identity Verification Service 09:56:22 jim
Access Control 09:55:42 jim
Security Information and Event Management 09:54:49 jim
Cross-site request forgery 09:54:12 jim
Accountability 09:53:06 jim
Data Protection 09:52:45 jim
Telemarketing and Consumer Fraud and Abuse Prevention Act 09:51:49 jim
Data Loss Prevention 09:46:49 jim
Prevention 09:44:48 jim
SIM Swap 09:41:43 jim
07.10.2019
IDM Related Compliance Items 14:22:33 jim
SAFE-BioPharma 14:19:39 jim
United States Food and Drug Administration 14:14:31 jim
Clinical Decision Support 14:14:06 jim
USFDA 14:09:57 jim
FDA 14:09:37 jim
Clinical Data 13:59:53 jim
Poverty 09:12:46 jim
OPAL Project 09:08:11 jim
International Monetary Fund 09:07:45 jim
Facial recognition 09:05:29 jim
COPPA 09:00:16 jim
Childrens Online Privacy Protection Act 08:56:40 jim
Web Blog_blogentry_071019_1 08:42:11 jim
Privacy And Security Conflicts 08:33:30 jim
End-to-end Encryption 08:27:45 jim
State secrets privilege 08:10:03 jim
Five Eyes Intelligence Alliance 07:26:58 jim
Privacy and Economics 07:22:50 jim
06.10.2019
NISTIR 8112 17:52:57 jim
FVEY 17:48:30 jim
Releasability 17:45:20 jim
NIST Interagency Report 17:39:10 jim
World Bank Group 10:10:09 jim
World Bank 10:05:16 jim
WBG 10:04:56 jim
United Nations Economic and Social Council 10:02:46 jim
Group of 7 10:01:17 jim
ECOSOC 10:00:51 jim
Organization for Economic Cooperation and Development 09:55:45 jim
United Nations 09:55:19 jim
G20 09:44:40 jim G-20 ==> G20
Group of 20 09:44:40 jim G-20 ==> G20
Financial Action Task Force 09:42:56 jim
GAFI 09:40:40 jim
FATF 09:40:27 jim
G7 09:38:27 jim
ACH 09:28:35 jim
ISO 15022 09:19:08 jim
Society for Worldwide Interbank Financial Telecommunication 09:05:33 jim
03.10.2019
Virtual List View Control 09:18:45 jim
2.16.840.1.113730.3.4.9 08:44:33 jim
MemberOf 08:42:14 jim
02.10.2019
Privacy 09:15:17 jim
ISO 7498 09:12:16 jim
NIST Privacy Framework 08:13:32 jim
User-agent 07:56:03 jim
30.09.2019
EnhancedSearchGuide 11:07:42 jim
Enhanced Guide 11:07:00 jim
1.3.6.1.4.1.1466.115.121.1.21 11:05:54 jim
SearchGuide 10:58:43 jim
BaseDN 10:51:28 jim
Russian Federation 10:47:06 jim
Union of Soviet Socialist Republics 10:46:16 jim
Commonwealth of Independent States 10:44:53 jim
2.5.4.14 10:42:36 jim
Country 10:37:53 jim
USSR 10:23:51 jim
National Security 09:35:45 jim
Legitimacy 09:35:12 jim
Propaganda 09:34:40 jim
FAIRVIEW 09:32:28 jim
IDM and the Organization Dilemma 09:31:19 jim
Politics 09:29:23 jim
System 09:28:39 jim
26.09.2019
National Provider Identifier 10:29:39 jim
Medicare Beneficiary Identifier 10:27:45 jim
Medicare Number 10:18:49 jim
Unique Health IDentifier 10:17:54 jim
MBI 10:16:42 jim
Patient matching 09:15:13 jim
25.09.2019
Transparency 08:00:43 jim
24.09.2019
DPPA 22:38:11 jim
Drivers Privacy Protection Act 22:37:51 jim
Digital Asset 14:35:03 jim
Revised Uniform Fiduciary Access to Digital Assets Act 14:33:50 jim
Data subject 14:25:52 jim
Resource Owner 14:22:37 jim
Client Operator 14:20:19 jim
Resource Servere Operator 14:19:24 jim
Authorization Server Operator 14:17:47 jim
Resource Rights Administrator 14:16:21 jim
OAuth Client 14:11:13 jim
Requesting Party 14:09:20 jim
Authorization Server 14:07:06 jim
Resource Server 14:05:42 jim
Physical Layer 09:47:20 jim
Network Crossover Cable 09:44:27 jim
Patch Cable 09:43:27 jim
Smart endpoints and dumb pipes 09:40:19 jim
Distributed-Queue Dual-Bus 09:39:16 jim
BUS 09:37:14 jim
I2C 09:27:20 jim
PC Hardware Cables 09:24:07 jim
IEEE 802 09:21:39 jim
23.09.2019
Data Ownership 16:42:00 jim
OAuth Public Client 13:18:04 jim
OAuth Confidential Client 13:15:58 jim
Web Authentication 13:08:22 jim
Grant Types 13:02:54 jim
AppAuth 13:00:29 jim
OAuth 2.0 for Native Apps 12:56:59 jim
Native application 12:52:58 jim
OAuth 2.0 Device Profile 12:49:45 jim
OAuth 2.0 Actors 12:28:42 jim
OpenID Connect 12:23:01 jim
Risk Assessment 10:46:44 jim
Risk 10:30:33 jim
22.09.2019
Logging 20:45:56 jim
Monitoring 20:43:52 jim
Metrics 20:42:42 jim
Auditing 20:37:04 jim
Provenance 20:32:09 jim
Common Event Format 20:31:03 jim
19.09.2019
Web Services Dynamic Discovery 08:39:24 jim
17.09.2019
1.2.840.113556.1.4.1941 16:32:21 jim
LDAP_MATCHING_RULE_IN_CHAIN 16:30:34 jim
Discrimination 15:56:27 jim
Intolerance 15:44:07 jim
Web Blog_blogentry_170919_1 15:29:58 jim
Cell-Site Simulators 10:22:42 jim
Free Expression 10:09:11 jim
Merkle DAG 08:59:44 jim
16.09.2019
Law 15:03:00 jim
United States Privacy Act 13:19:31 jim
ISO 2382 12:41:03 jim
ISO 7816 12:37:55 jim
United States Code 11:05:07 jim
Public Law 11:02:39 jim
DevOps 09:26:50 jim
Infrastructure 09:21:09 jim
Infrastructure As Code 09:13:33 jim
Cloud Native 09:09:06 jim
Software Version Number 09:07:30 jim
Version 09:00:48 jim
API versioning 08:59:12 jim
14.09.2019
War on Poverty 10:37:52 jim
War on 10:24:37 jim
Digital Identity 10:00:27 jim
Copyrighted 09:21:03 jim
Copyleft 09:19:50 jim
Social Websites 09:02:35 jim
Sociality 08:58:45 jim
Delegation 08:54:17 jim
DunbarS Numbers 08:51:25 jim
Hunter-gather 08:49:46 jim
Sympathy group 08:49:04 jim
Social network 08:47:33 jim
12.09.2019
Department of Motor Vehicle 08:26:38 jim
OPSG 08:14:59 jim
Operation Stonegarden 08:14:36 jim
FirstNet 08:06:45 jim
First Responder Network Authority 08:06:26 jim
Government Surveillance 07:56:36 jim
10.09.2019
Unauthorized 10:08:00 jim
Access Control Service 10:07:38 jim
Computer Fraud and Abuse Act 10:04:00 jim
09.09.2019
Tribe 11:07:40 jim
Megaband 11:07:25 jim
Friends 11:07:09 jim
Clique 11:06:09 jim
Social contract 10:45:28 jim
Spam 10:42:09 jim
Solid 10:40:59 jim
JF2 Post Serialization Format 10:39:40 jim
Identity Web Services Framework 10:39:17 jim
Google 10:37:54 jim
Blinding Identity Taxonomy 10:35:26 jim
DNS over HTTPS 09:35:11 jim
DNS Privacy Considerations 09:31:53 jim
DNSCurve 09:22:13 jim
OpenDNS 09:11:45 jim
CISCO 09:08:48 jim
Authenticator App 09:06:56 jim
Zero Trust 08:57:11 jim
07.09.2019
Terrorist Screening Database 10:55:45 jim
National Crime Information Center 10:54:21 jim
CJIS 10:39:19 jim
Criminal Justice Information Services 10:38:41 jim
Facial Analysis, Comparison, and Evaluation 10:34:17 jim
FACE 10:26:11 jim
GAO 10:14:58 jim
United States Government Accountability Office 10:14:38 jim
Next Generation Identification 10:09:43 jim
Repository for Individuals of Special Concern 09:57:45 jim
Advanced Fingerprint Identification Technology 09:57:11 jim
Interstate Photo System 09:56:46 jim
International Association for Identification 09:52:38 jim
Tenprint 09:50:32 jim
IPS 09:45:05 jim
Surveillance 09:31:20 jim
Video Data Intelligence 09:27:03 jim
04.09.2019
OpenID Connect Client Initiated Backchannel Authentication Flow 08:55:30 jim
Financial API 08:47:36 jim
03.09.2019
FAPI Read Write API Security Profile 20:08:02 jim
FAPI Read Only API Security Profile 20:03:59 jim
FAPI Pushed Request Object 19:58:31 jim
RFC 3112 13:50:22 jim
Authentication Password Syntax 13:45:28 jim
Password Storage Scheme 13:44:03 jim
Identifier 10:52:37 jim
Indirect Identifier 10:51:46 jim
Pseudonymous 10:50:56 jim
Attribute 10:47:10 jim
Metadata 10:44:01 jim
Unidirectional identifier 10:29:14 jim
Omnidirectional identifier 10:26:45 jim
Identity Attributes 10:02:21 jim
PIID 09:44:10 jim
Personal data 09:20:22 jim
02.09.2019
Informed Consent 09:57:33 jim
Consent vs Authorization 09:53:58 jim
Health information 09:48:05 jim
ADA Amendments Act of 2008 09:45:40 jim
Protected Health Information 09:44:41 jim
Treatment, Payment and Health care Operations 09:43:31 jim
Health Insurance Portability and Accountability Act 09:39:03 jim
HHSOCR 09:12:29 jim
United States Department of Health and Human Services 09:08:35 jim
01.09.2019
Nucleotide 08:26:47 jim
DNA 08:12:58 jim
Ownership 07:51:23 jim
31.08.2019
Project Zero 08:57:12 jim
30.08.2019
Transport Layer Security 09:29:32 jim
NIST.SP.800-52 09:13:20 jim
Floating-point 08:41:17 jim
IEEE 754 08:31:35 jim
29.08.2019
American Medical Association 10:34:38 jim
Web Blog_blogentry_290819_1 10:31:42 jim
28.08.2019
Rap Back 13:08:21 jim
Sexual orientation 13:04:23 jim
Americans with Disabilities Act 12:45:04 jim
ADA 12:41:51 jim
Civil Right 12:37:28 jim
Disability 12:34:12 jim
Race 12:30:00 jim
Skin color 12:14:40 jim
BirthDate 12:09:37 jim
Sovrin 12:08:21 jim
OpenID Connect Standard Claims 12:08:06 jim
JSON Web Token Claims 12:07:09 jim
Gender 12:06:47 jim
Default Profile Claims 12:06:13 jim
Gender identity 12:01:26 jim
Ethnic 11:59:26 jim
Hate speech 11:57:19 jim
Ageism 11:39:44 jim
Age 11:37:09 jim
Amendment I 11:25:46 jim
Data Privacy 11:24:33 jim
Legal right 11:21:07 jim
Religion 11:16:44 jim
United States PATRIOT Act 11:11:26 jim
Palantir Technologies 11:10:39 jim
STORMBREW 11:09:17 jim
REAL ID 11:08:59 jim
Automated Targeting System 11:08:36 jim
Export restrictions 11:06:45 jim
Foreign Intelligence Surveillance Act 11:06:11 jim
Electronic Identity Verification 11:05:07 jim
Operational Risk 11:03:51 jim
Countering the Financing of Terrorism 11:03:09 jim
Terrorism 11:00:52 jim
United States Immigration and Customs Enforcement 10:57:36 jim
Behavioral analytics 10:55:16 jim
Executive order 10:52:04 jim
President of the United States of America 10:40:04 jim
United States Executive Branch 10:38:46 jim
Integrated Automated Fingerprint Identification System 09:23:05 jim
Analytics 09:19:02 jim
User and Entity Behavior Analytics 09:09:31 jim
Behavioral Characteristics 09:08:38 jim
27.08.2019
Telegram 09:20:37 jim
GRAM 09:07:00 jim
TON 09:05:49 jim
Telegram Open Network 09:05:32 jim
Elasticity 08:20:28 jim
Container 08:19:02 jim
Load Balancing 08:14:15 jim
Scalability 08:13:33 jim
Sharding 08:10:54 jim
Shard 08:07:46 jim
Web Blog_blogentry_270819_1 07:53:41 jim
26.08.2019
ISR 19:05:12 jim
IL 19:04:33 jim
Israel 19:03:09 jim
Country Code 18:58:15 jim
Mellanox Technologies 18:53:08 jim
OpenPOWER Foundation 18:50:13 jim
Linux Foundation 18:34:17 jim
Family Educational Rights and Privacy Act 12:51:26 jim
Portable Document Format 12:44:43 jim
PDF 12:41:37 jim
The Next Big Thing 12:40:36 jim
Consent Receipts 12:23:45 jim
Public Key Infrastructure Weaknesses 09:13:22 jim
Certificate 09:12:27 jim
Web Blog_blogentry_260819_1 08:51:09 jim
24.08.2019
Product 11:04:22 jim
Royalty Fee 11:00:49 jim
Royalty-free 10:58:13 jim
Web Hypertext Application Technology Working Group 10:54:16 jim
Fetch API 10:51:55 jim
Universal Second Factor Challenges 10:49:55 jim
Reflection Style 10:48:58 jim
Firebug 10:47:53 jim
Opera 10:46:15 jim
Cross Origin Resource Sharing 10:42:10 jim
HTTP OPTIONS 10:22:03 jim
Web Origin 10:00:31 jim
23.08.2019
Calling Number Delivery 10:37:38 jim
CDN 10:37:27 jim
CND 10:37:10 jim
VSC 10:26:58 jim
Vertical Service Code 10:26:42 jim
Caller ID 10:21:00 jim
Telecommunications Network Chain 10:18:33 jim
Local Exchange 10:16:12 jim
Customer Premises Equipment 10:14:40 jim
CPE 10:07:07 jim
POTS 09:58:15 jim
Public Switched Telephone Network 09:57:18 jim
Loop Start 09:55:44 jim
Land Line 09:48:32 jim
Spoofing 09:32:07 jim
Artificial Conversational Entity 09:18:23 jim
Virtual assistant 09:18:04 jim
Voice 09:15:33 jim
Implicit Grant 08:59:48 jim
Implicit Flow 08:52:04 jim
22.08.2019
Public Interest Registry 07:50:47 jim
ISOC 07:44:17 jim
Internet Society 07:43:40 jim
Internet Corporation for Assigned Names and Numbers 07:39:54 jim
.org 07:38:01 jim
Top-Level Domain 07:37:39 jim
21.08.2019
Web Blog_blogentry_210819_1 08:51:23 jim
20.08.2019
Bluetooth 08:57:52 jim
19.08.2019
Verified_claims 12:30:39 jim
Tracking 12:25:05 jim
AdvertisingIdentifier 11:21:18 jim
Identifier for Advertisers 11:20:38 jim
Advanced Message Queuing Protocol 09:39:39 jim
AMQP 09:39:05 jim
WebSocket 09:25:33 jim
Publish-Subscribe 09:21:41 jim
Google Cloud Pub-Sub 09:19:59 jim
Pub-sub 09:17:49 jim
Asynchronous Operation 09:00:41 jim
17.08.2019
Input-constrained device 09:36:24 jim
OAuth 2.0 Device Authorization Grant 09:36:01 jim
RFC 8628 09:34:09 jim
15.08.2019
North American Numbering Plan 11:43:12 jim
National Destination Code 10:54:32 jim
Number Plan Area 10:47:32 jim
NXX 10:39:05 jim
Data Leakage 08:57:48 jim
What is missing in OAuth 2.0 08:47:14 jim
Wendy 08:46:43 jim
TLS Client Authentication 08:45:57 jim
Side-channel attacks 08:44:36 jim
Same-site Cookies 08:41:23 jim
Privacy Considerations Distributed Ledger Technology 08:40:56 jim
Passive attacker 08:40:07 jim
OAuth 2.0 Vulnerabilities 08:39:28 jim
Covert Redirect Vulnerability 08:39:03 jim
Computational Hardness Assumption 08:37:18 jim
CRIME 08:36:50 jim
Block Cipher Mode 08:36:32 jim
Whistleblower 08:34:07 jim
Credential Leakage 08:29:55 jim
Tokenization Service 08:28:08 jim
Tokenization 08:27:42 jim
14.08.2019
Body Worn Cameras 15:42:24 jim
Automated License Plate Reader 11:18:21 jim
Motorola Solutions 11:17:38 jim
Vigilant Solutions 11:14:17 jim
Web Blog_blogentry_081018_1 11:07:41 jim
12.08.2019
Zero-day 09:31:19 jim Zero-day exploits ==> Zero-day
Rowhammer 09:15:10 jim
Google Native Client 09:09:49 jim
Web Blog_blogentry_120819_1 08:54:02 jim
11.08.2019
Fiat Currency 08:35:54 jim
10.08.2019
Money 20:02:01 jim
08.08.2019
Foundational ID 11:03:57 jim
Government Identity 10:53:57 jim
MOSIP 10:51:43 jim
National Identification Number 10:50:57 jim
Legal Entity Identifier 10:49:32 jim
Modular Open Source Identity Platform 10:38:08 jim
Good ID 09:48:24 jim
Identity Custodian 09:40:38 jim
Self-Sovereign Identity 08:46:37 jim
05.08.2019
Amazon Web Services 15:04:26 jim
RDS 14:26:35 jim
AWS Relational Database Services 14:26:15 jim
AWS IAM 14:24:56 jim
AWS Role 14:24:23 jim
AWS CLI 14:23:55 jim
AWS Security Group 13:40:47 jim
FanOutDriver 11:17:27 jim
IDMFanOutUnixSystemIntercept 11:16:06 jim
FanOutDriverPlatformReceiverRunModes 11:14:02 jim
CIBA 10:18:26 jim
04.08.2019
Deming 09:36:26 jim
PDCA 09:25:52 jim
Agile 09:20:42 jim
Toyota Production System 09:19:02 jim
DNS cache poisoning 09:07:09 jim
Nationality 08:39:24 jim
Citizen 08:38:35 jim
Citizenship 08:35:20 jim
Nationals 08:29:33 jim
American Samoa 08:22:45 jim
United States Virgin Islands 08:21:05 jim
Palmyra Atoll 08:12:21 jim
02.08.2019
Currency 08:59:55 jim
01.08.2019
Serverless 09:48:53 jim
Functions as a Service 09:07:34 jim
Cloud functions 09:04:40 jim
31.07.2019
Graphics Cables 12:17:10 jim
2.16.840.1.113719.1.4.0.3.2.48 12:06:28 jim Resolution ==> Resolution_AttrubuteType
2.16.840.1.113719.1.4.2.2.0 12:06:28 jim Resolution ==> Resolution_AttrubuteType
Resolution_AttrubuteType 12:06:28 jim Resolution ==> Resolution_AttrubuteType
Decentralized Identifier 12:06:01 jim
Credential Reuse 12:04:59 jim
Liability 09:12:50 jim
Accountable 09:05:43 jim
EMV Liability Shift 09:05:24 jim
Telecommunications 08:58:55 jim
Web Blog_blogentry_240815_1 08:47:34 jim
RUFADAA 08:45:16 jim
Fiduciary Responsibility 08:26:55 jim
30.07.2019
The Twelve-Factor App 18:28:37 jim
Blue-Green Deployment 17:31:18 jim
Kubernetes Service 17:13:10 jim
YAML 17:06:41 jim
Kubernetes 16:56:41 jim
Kubernetes Pod 16:44:31 jim
Kubernetes Node 16:44:10 jim
Software library 15:22:53 jim
Continuous Improvement 15:06:04 jim
Active Directory Groups 13:26:37 jim
TokenGroups 10:52:00 jim
Group-AD 09:38:45 jim
Boolean Sensitivity 09:14:29 jim
Web Blog_blogentry_300719_1 09:04:47 jim
Server-side TLS configuration guide 07:57:17 jim
27.07.2019
Proxy Server 08:54:11 jim
Reverse Proxy 08:48:26 jim
Gateway 08:44:18 jim
Application Load Balancing 08:36:27 jim
GCP Virtual Private Cloud 08:11:51 jim
Proxy 08:07:34 jim
26.07.2019
Key Generation 17:49:18 jim
Advertising 10:53:54 jim
Resource Owner Password Credentials Grant 08:29:31 jim
ROPC 08:27:05 jim
25.07.2019
Knowledge Consistency Checker 12:54:07 jim
Forest functional levels 12:35:28 jim
KCC 12:32:04 jim
Global Catalog 12:28:36 jim
AD DOMAIN 12:26:45 jim
Microsoft Active Directory 12:16:43 jim
2.16.840.1.113719.1.1.4.1.172 11:59:23 jim
DsRevision 11:12:21 jim
Determine LDAP Server Vendor 11:07:14 jim
Verifiable Credentials 09:43:08 jim
Verifiable Claims 09:42:41 jim
Web Blog_blogentry_250719_1 09:26:39 jim
23.07.2019
English 09:08:33 jim
En 09:08:01 jim
Language-Tag 09:06:46 jim
Language-subtag 09:01:24 jim
GB 08:55:17 jim
Blockchain 08:49:19 jim
Video Surveillance 08:44:29 jim
License 08:36:38 jim
Licence 08:32:21 jim
Firearms License 08:24:07 jim
Nautical License 08:23:23 jim
Examples of Evidence 08:21:00 jim
Workplace Surveillance 08:09:54 jim Surveillance in the Workplace ==> Workplace Surveillance
ANPR 08:04:44 jim
Emotion 07:36:21 jim
Convolutional Neural Network 07:31:37 jim
22.07.2019
United States Constitution 13:10:40 jim
Amendment XI 13:08:15 jim
Amendment X 12:58:17 jim
Amendment IX 12:57:45 jim
Amendment II 12:57:00 jim
Amendment VIII 12:56:37 jim
Amendment VII 12:56:01 jim
Amendment VI 12:55:23 jim
Amendment V 12:54:41 jim
Amendment IV 12:54:08 jim
Amendment III 12:53:07 jim
Bill of Rights 12:48:36 jim
Transcription United States Constitution 12:25:53 jim
Government abuse 12:10:00 jim
Usurpation 12:07:51 jim
INA 11:51:07 jim
Immigration and Nationality Act 11:50:44 jim
Lawful Permanent Resident 11:48:17 jim
Open-source intelligence 11:40:30 jim
OSINT 11:39:57 jim
Investigative Data Warehouse 11:38:06 jim
Translingual Information Detection, Extraction and Summarization 11:36:17 jim
TIDES 11:34:42 jim
System of Records Notice 11:16:24 jim
Web Blog_blogentry_260816_1 11:02:57 jim
Best Practices For Unique Identifiers 11:01:50 jim
Government Data Store 10:49:00 jim
Right to Financial Privacy Act 10:45:45 jim
Customer Identification Program 10:45:18 jim
Web Blog_blogentry_220719_1 10:22:51 jim
Government 10:19:23 jim
Bitcoin network genesis block 09:27:04 jim
Nakamoto consensus 09:24:43 jim
SHA-2 09:23:30 jim
Paul Calder Le Roux 09:07:48 jim
Satoshi Nakamoto 08:56:45 jim
Encryption for the Masses 08:31:52 jim
E4M 08:29:56 jim
21.07.2019
Location Area Code 13:31:26 jim
User Equipment 13:27:13 jim
Tracking Area 13:21:05 jim
Tracking Area Code 13:15:58 jim
TAC 13:05:42 jim
CELLID 12:46:04 jim
FASCIA 12:41:45 jim
DROPOUTJEEP 12:41:09 jim
Web Blog_blogentry_210719_1 12:18:19 jim
AWS Shield 11:57:35 jim
0-RTT Handshakes 11:54:35 jim
Network Address Translation 11:51:59 jim
Interconnection 11:50:15 jim
Carrier-Sense Multiple Access 11:49:43 jim
LDAP Protocol dependencies 11:49:08 jim
No CVM required 11:48:31 jim
Google Global Cache 11:47:45 jim
HAMMERCORE 11:44:15 jim
HAMMERSTEIN 11:43:35 jim
SYNC 11:42:53 jim
Firewall 11:42:10 jim
HTTP Over TLS 11:40:18 jim
Web Blog_blogentry_021117_1 11:39:36 jim
Traffic 11:38:23 jim
Network traffic 11:37:52 jim
Edge Proxy 11:34:31 jim
Payload 11:32:43 jim
Network devices 11:24:46 jim
Network Switches 11:20:37 jim
Node 11:18:01 jim
2.16.840.1.113719.1.1.4.1.55 11:16:39 jim
Internet 11:15:38 jim
NetworkAddress 11:13:52 jim
Bridging 11:02:05 jim
Routing 10:57:18 jim
End-to-End Security 09:56:23 jim
Email Address 09:42:54 jim
20.07.2019
ARCOS 21:55:49 jim
18.07.2019
Legal Person 14:45:41 jim
Limber 12:02:53 jim
NdsStatusLimber 11:55:19 jim
LDAP Extensions and Controls Listing 11:40:27 jim
Ndstrace 11:37:56 jim
LMBR 11:32:56 jim
2.16.840.1.113719.1.1.4.1.517 11:10:45 jim
Continuous Delivery 10:30:50 jim
Continuous integration 10:17:20 jim
Continuous testing 10:14:46 jim
Continuous Development 10:11:57 jim
Software development practice 10:01:04 jim
Operating System 09:43:19 jim
DOS 09:26:13 jim
DECnet 09:13:51 jim
ARP Poisoning 09:07:49 jim
Address Resolution Protocol 09:06:17 jim
VINES Internetwork Protocol 09:03:35 jim
ARP 08:57:22 jim
Domain-based Message Authentication, Reporting & Conformance 08:52:15 jim
RFC 6376 08:50:12 jim
DomainKeys Identified Mail 08:48:54 jim
DKIM 08:34:29 jim
RFC 7208 08:33:17 jim
Sender Policy Framework 08:31:29 jim
SPF 08:21:15 jim
RFC 7489 08:12:18 jim
DMARC 08:08:04 jim
Web Blog_blogentry_180719_1 08:07:29 jim
17.07.2019
LDAP and Active Directory 11:55:00 jim
Cyber Attack as a Service 09:00:49 jim
CAaaS 08:49:49 jim
Web Blog_blogentry_170719_1 08:45:14 jim
16.07.2019
OAuth 2.0 NOT an Authentication protocol 10:11:32 jim
Data disclosure 09:40:19 jim
Data loss 09:39:03 jim
Right of access 09:03:54 jim
Disclosure-Alteration-Destruction 08:42:56 jim
NIST.SP.800-122 08:22:28 jim
15.07.2019
Cloud Pricing 19:21:16 jim
Cloud computing 19:12:07 jim
Red Green Refactor 17:48:44 jim
NIST.SP.800-63B 13:44:35 jim
14.07.2019
State 09:40:09 jim
Constitutional Order 09:38:00 jim
Sovereignty 09:37:32 jim
United States Intelligence Community 09:28:32 jim
DHS Office of Intelligence and Analysis 09:15:53 jim
Fusion centers 09:06:33 jim
13.07.2019
Palantir Gotham 09:52:04 jim
DMV 09:41:41 jim
FEMA 09:26:00 jim
United States Federal Emergency Management Agency 09:25:29 jim
United States Department of Homeland Security 09:15:46 jim
Palantir Metropolis 08:51:36 jim
Web Blog_blogentry_130719_1 08:35:56 jim
E2EE 08:21:38 jim
12.07.2019
Entanglement 07:57:51 jim
2.5.6.3 07:48:07 jim
10.07.2019
Id_token_hint 15:19:07 jim
Certification Authority Browser Forum 10:27:58 jim
Extended Validation Certificate 10:26:20 jim
Certificate Level Of Assurance 10:25:04 jim
Organization Validated Certificate 10:17:35 jim
Domain Validated Certificate 10:15:38 jim
08.07.2019
Tomcat And LDAP 14:15:53 jim
Keystore 14:00:12 jim
Truststore 13:57:29 jim Truststores ==> Truststore
Java KeyStore 13:53:09 jim
AWS Elastic Kubernetes Service 13:18:14 jim
AWS VPN 13:10:33 jim
AWS Direct Connect 12:59:05 jim
AWS Virtual Private Cloud 12:57:20 jim
AWS Elastic File System 12:47:47 jim
AWS Elastic Cloud Compute 12:23:50 jim
On demand 12:16:16 jim
Microservice 12:14:47 jim
AWS Elastic Block Store 12:11:54 jim
S3 09:28:29 jim
Object storage 09:28:03 jim
Data-lake 09:27:36 jim
AWS Simple Storage Service 09:27:00 jim Amazon Simple Storage Service ==> AWS Simple Storage Service
Java Cryptography Extensions 09:24:36 jim
JCE 09:23:07 jim
Java Authentication and Authorization Service 09:22:44 jim
AWS CloudHSM 09:19:30 jim
AWS API-Gateway 09:09:27 jim
AWS Web Application Firewall 09:03:29 jim
OSI-Model 09:00:23 jim
07.07.2019
AWS Application Load Balancer 21:08:55 jim
EC2 21:00:16 jim Amazon Elastic Cloud Compute ==> AWS Elastic Cloud Compute
Virtual Private Cloud 21:00:16 jim Amazon Elastic Cloud Compute ==> AWS Elastic Cloud Compute
EBS 20:59:36 jim
AWS Amazon MQ 20:58:34 jim
AWS Route 53 20:52:36 jim
NFS 20:48:55 jim
RFC 7862 20:48:39 jim
Network File System 20:47:43 jim
AWS Serverless Application Repository 20:38:49 jim
ECR 20:34:04 jim
AWS Elastic Container Registry 20:33:39 jim AWS Amazon Elastic Container Registry ==> AWS Elastic Container Registry
ECS 20:33:23 jim
AWS Elastic Container Service 20:32:53 jim
AWS Management Console 15:56:51 jim
AWS API 15:56:09 jim
AWS Elastic Beanstalk 15:32:06 jim
AB Testing 15:21:58 jim
AWS Trusted Advisor 14:40:28 jim
Reliability 14:36:35 jim
Durability 14:35:38 jim
RFC 793 12:03:33 jim
TIME-WAIT 12:02:48 jim
MSL 12:00:07 jim
Transmission Control Protocol 11:59:44 jim
Connection 10:35:31 jim
LISTEN 10:29:33 jim
SYN-RECEIVED 10:27:14 jim
SYN-ACK 10:23:16 jim
SYN-SENT 10:20:06 jim
ASCII Table 10:17:57 jim SYN ==> SYN-SENT
Control character 10:17:57 jim SYN ==> SYN-SENT
Temp 10:17:57 jim SYN ==> SYN-SENT
ESTABLISHED 10:13:49 jim
Shared Responsibility Model 09:55:55 jim
AWS Inspector 09:30:09 jim
06.07.2019
Privacy Paradox 13:38:58 jim
Internet Trends Report 13:37:33 jim
Venture Capitalist 13:30:38 jim
Mary Meeker 13:29:29 jim
Privacy by Design 12:54:39 jim
Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) 09:52:13 jim
HMQV 09:49:02 jim
Elliptic Curve 09:48:27 jim
Backdoor 09:43:53 jim
EvilRegime 09:42:16 jim
Web Blog_blogentry_021017_1 09:41:11 jim
Optic Nerve 09:40:16 jim
Dual Elliptic Curve Deterministic Random Bit Generator 09:33:18 jim
Dual_EC_DRBG 09:28:57 jim
Trapdoor Function 09:09:08 jim
05.07.2019
Enterprise Service Bus 09:53:58 jim
Message-oriented Middleware 09:48:58 jim
Message queue 09:38:24 jim
Queue 09:30:59 jim
ActiveMQ 09:28:42 jim
AWS Simple Notification Service 09:27:31 jim
Backend as a Service 09:25:50 jim
Cloud Services Model 09:21:57 jim
Service 09:18:37 jim
04.07.2019
AWS Simple Queue Service 16:36:00 jim
Cloud Zone 16:17:16 jim
Cloud Region 16:16:12 jim
GCP Location 16:08:06 jim
GCP Cloud Load Balancing 16:01:57 jim GCP Regional ==> Cloud Region
GCP Multi-Regional 16:01:57 jim GCP Regional ==> Cloud Region
GCP Storage Classes 16:01:57 jim GCP Regional ==> Cloud Region
Fault tolerance 15:50:46 jim
Availability 15:50:18 jim
Edirectory Replicas 15:30:25 jim
Computing platform 13:15:19 jim
Stack 13:14:31 jim
AWS CloudFormation 13:09:47 jim
Production tier 13:08:25 jim
API Planing 13:06:48 jim
Testing tier 13:01:47 jim
Development tier 12:59:11 jim
Local tier 12:58:03 jim
Deployment tier 12:56:16 jim
AWS CloudFront 12:34:35 jim
AWS CloudWatch 12:22:47 jim Amazon Cloudwatch ==> AWS CloudWatch
Google Cloud Dataflow 09:20:57 jim
Google Cloud Platform 09:16:52 jim
ForgeRock 08:55:19 jim
Middleware 08:52:31 jim
Platform as a Service 08:30:47 jim
DynamoDB 08:16:16 jim
AWS Lambda 08:08:00 jim
ACDC Grant type 07:47:16 jim
Web Blog_blogentry_041118_1 07:44:57 jim
Micropub 07:43:44 jim
Touch ID 07:43:10 jim
Google Wallet vs Apple Pay 07:42:30 jim
IPhone 07:41:04 jim
Safari 07:40:36 jim
CHIMNEYPOOL 07:39:15 jim
FREEFLOW 07:38:53 jim
HTTP Request Header 07:29:32 jim
XMLHttpRequest 07:21:18 jim
03.07.2019
Web IDL 20:39:44 jim
RFC 6455 20:36:02 jim
Infrastructure as a Service 15:54:14 jim
Testing 15:09:33 jim
Distributed system 14:57:07 jim
Health-check 14:54:54 jim
Abstraction 14:01:10 jim
Refinement 14:00:19 jim
Throttling 13:20:38 jim
Server-Side Login throttling schemes 13:11:52 jim
Software design 09:42:07 jim
Domain 09:33:27 jim
Bounded Context 09:28:25 jim
Encapsulation 09:21:04 jim
02.07.2019
Outbound 19:36:48 jim
Inbound 19:36:38 jim
Mechanical Disk 17:04:45 jim
Disk 17:03:58 jim
Block storage 17:02:55 jim
Data Subject Access Request 15:16:39 jim
DSAR 15:15:31 jim
Manager 10:44:01 jim
0.9.2342.19200300.100.1.10 10:39:33 jim
Data Provenance 10:04:50 jim
Data Accuracy 10:04:18 jim
Verified Claim 10:02:31 jim
Phone_number_verified 09:56:04 jim
Email_verified 09:49:31 jim
Level Of Assurance 09:41:09 jim
Authentication 09:37:54 jim
Claimant 09:32:23 jim
Identity Assurance Framework 09:26:22 jim
IAWG 09:19:59 jim
Identity Assurance Work Group 09:19:36 jim
Credential Management 09:13:05 jim
Credential Service Provider 09:08:22 jim
Identity Proofing 08:30:33 jim
29.06.2019
Yocto 09:46:19 jim
Zepto 09:46:09 jim
Atto 09:45:59 jim
Femto 09:45:48 jim
Nano 09:45:38 jim
Micro 09:45:28 jim
Centi 09:45:17 jim
Deci 09:45:07 jim
Deca 09:44:56 jim
Hecto 09:44:46 jim
Yotta 09:44:36 jim
Zetta 09:44:25 jim
Exa 09:44:14 jim
Peta 09:44:02 jim
Tera 09:43:51 jim
Giga 09:43:38 jim
Kilo 09:43:25 jim
Mega 09:42:36 jim
Milli 09:11:16 jim
Meter 09:09:32 jim
Mm 09:07:18 jim
International System of Units 09:05:40 jim
HTTP 304 07:34:20 jim
Not Modified 07:30:08 jim
Unvalidated redirects and forwards 07:18:46 jim
27.06.2019
Certificate Request Process 21:09:43 jim
Certificate Validation Levels 21:07:12 jim
Well-known 11:04:37 jim
Credential Enrollment 10:17:13 jim
Certificate Authority 10:14:54 jim
25.06.2019
Time synchronization 09:54:35 jim
Malfeasance 09:45:36 jim
Feasance 09:41:16 jim
Time.cloudflare.com 09:29:29 jim
Cloudflare 09:24:13 jim
RFC 7384 09:19:18 jim
Packet Switched Networks 09:18:21 jim
NTS 09:17:44 jim
Cryptographic proof 09:16:21 jim
CIRCL 09:05:12 jim
Roughtime 08:57:29 jim
Web Blog_blogentry_250619_1 08:52:55 jim
Network Time Security 08:50:57 jim
Warp 08:41:28 jim
SHA-1 Deprecation 08:26:54 jim
DNS Queries over HTTPS 08:26:31 jim
1.1.1.1 08:26:02 jim
Polyglot 08:13:30 jim
Tink 08:12:09 jim
Requested_token_use 08:04:05 jim
OAuth Parameters Registry 08:02:48 jim
23.06.2019
Configuration Directory Partition 09:43:35 jim
XDAS Setup and Configuration 09:43:18 jim
IManager Server Configuration 09:42:40 jim
DirXML-ConfigValues 09:41:20 jim
Global Configuration Variables 09:36:56 jim
LDAP Client Configuration 09:36:03 jim
Zero-configuration networking 09:33:30 jim
Configuration 09:31:33 jim
Provider Configuration URI 09:30:26 jim
Openid-configuration 09:29:17 jim
Uma-configuration 09:28:27 jim
NAM Configuration Notes 09:26:28 jim
Solaris Configuration 09:24:25 jim
Configuration Management 09:23:33 jim
Change Management 09:20:42 jim
Information Technology Infrastructure Library 09:17:13 jim
ITIL 09:16:11 jim
Service Support 09:13:18 jim
SSD 09:11:40 jim
Solid State Disk 09:11:24 jim
EDirectory Performance Tuning 09:04:08 jim
BIOS 09:03:48 jim
Redhat Configuration 08:59:19 jim
Issuer Action Codes 08:41:40 jim
IAC 08:38:16 jim
22.06.2019
Stateless 09:40:01 jim
Scale 09:16:43 jim
Cloud 08:12:37 jim
Non-functional requirement 08:08:22 jim
Functional Requirement 08:04:47 jim
Requirement 08:01:25 jim
Features 07:47:11 jim
Constraint 07:42:28 jim
Identity Verification 07:31:08 jim
21.06.2019
Claim 10:33:40 jim
Identity Assurance 10:18:11 jim
Codebase 09:04:47 jim
Release 09:04:01 jim
Operations Team 09:03:36 jim
Development Team 09:03:19 jim
Dev 08:57:00 jim
Programming 08:56:12 jim
20.06.2019
OAuth and OIDC Adoption 11:31:45 jim
IdentityServer 11:25:26 jim
Web Blog_blogentry_200619_1 10:44:54 jim OAuth Adoption ==> OAuth and OIDC Adoption
AWS Cognito 10:31:37 jim
Cloud Foundry 10:27:29 jim
Red Hat 10:24:20 jim
Keycloak 10:21:58 jim RedHat ==> Red Hat
RPM 10:21:58 jim RedHat ==> Red Hat
Red Hat Directory Server 10:21:58 jim RedHat ==> Red Hat
389 Directory Server 10:21:57 jim RedHat ==> Red Hat
Enterprise Access Manager Product 10:21:57 jim RedHat ==> Red Hat
History of LDAP 10:21:57 jim RedHat ==> Red Hat
19.06.2019
Rich Communication Services 12:03:17 jim
RCS Chat 11:52:37 jim
IMessage 11:21:49 jim
Apple ID 11:09:57 jim
Jibe Platform 11:02:41 jim
18.06.2019
CLOUD Act 13:21:05 jim
Independent contractor 13:11:38 jim
Year 2020 12:54:50 jim
2020s 12:53:34 jim
Libra Cryptocurrency 12:48:35 jim
Libra Blockchain 12:48:07 jim
HotStuff 12:23:21 jim
LibraBFT 12:17:13 jim
Web Blog_blogentry_180619_1 11:50:30 jim
Sign in with Apple 11:03:30 jim
17.06.2019
Data Origin 17:39:00 jim
2.16.840.1.113719.1.1.4.721 14:26:52 jim
NDSRightsToMonitor 14:25:52 jim
X-NDS_NEVER_SYNC 14:23:24 jim
EDirectory Monitor Entry 14:12:11 jim
16.06.2019
Linux Boot Process 13:42:21 jim
BootableDevice 13:27:24 jim
2.16.840.1.113719.1.167.6.6.1 13:25:21 jim
Virtual Disk 13:24:12 jim
Storage device 13:20:31 jim
Disk partition 13:19:41 jim
File System 13:18:47 jim
MBR 13:08:35 jim
Booting 13:07:14 jim
GRUB 13:06:22 jim
Basic Input-Output System 12:39:05 jim
POST 12:31:09 jim
Boot Loader 10:17:41 jim
Hardware 10:06:48 jim
LocalStorage 10:00:13 jim
Master Boot Record 09:57:42 jim
LILO 09:50:10 jim
Firmware 09:45:53 jim
Das u-boot 09:20:26 jim Bootstrapping ==> Booting
Unified Extensible Firmware Interface 09:10:03 jim
Coreboot 09:08:36 jim
Chromium OS 09:03:09 jim
Chrome OS 09:01:13 jim
Chromebook 08:58:02 jim
U-Boot 08:55:20 jim
Booting with GRUB 08:43:24 jim
Media Access Control Address 08:41:07 jim
Roots of Trust 08:37:50 jim
SmartMessage Language 08:36:43 jim
Hypervisor 08:36:20 jim
15.06.2019
Identity Assurance Level 08:11:52 jim
14.06.2019
AAID 16:15:17 jim
Advertising ID 16:14:06 jim
Android Advertising ID 16:06:14 jim
IDFA 16:05:10 jim
RTB 16:01:19 jim
Real-Time Bidding 16:00:59 jim
Web Blog_blogentry_140619_1 15:48:59 jim
13.06.2019
1.3.6.1.4.1.1466.101.120.111 14:00:05 jim
ExtensibleObject 13:59:31 jim
11.06.2019
N4u.server.idle-threads 15:14:25 jim
N4u.server.active-interval 15:12:23 jim
NDS Thread Pool 14:51:19 jim
Thread delay 14:48:16 jim
Thread pool 14:46:21 jim
Worker thread 14:42:02 jim
Idle thread 14:32:03 jim
Waiting task 14:27:02 jim
Ready task 14:25:26 jim
Task 14:24:06 jim
Byte 11:15:07 jim
Megabyte 11:10:08 jim
Kilobyte 11:09:55 jim
KB 11:06:33 jim
MB 10:46:46 jim
NCP Packet 10:45:39 jim
SSL Overhead 10:40:44 jim
NMAS Login Update Interval 10:37:10 jim
EDirectory Synchronization Tips 10:34:51 jim
Asynchronous Outbound Synchronization 10:33:23 jim
EDirectory Synchronization 10:21:22 jim
ACL (eDirectory Attribute) 10:16:12 jim
DClient 09:46:54 jim
N4u.server.thread-stack-size 09:30:55 jim
N4u.server.start-threads 09:24:40 jim
N4u.server.max-threads 09:21:39 jim
IMonitor Diagnostic Logger 09:11:27 jim
FLAIM checkpoint 08:44:23 jim
Maxdirtycache 08:30:27 jim
EMBox 08:20:50 jim
GAMS 08:14:49 jim Gams ==> GAMS
NDSD Loadable Module 08:14:35 jim
Graded Authentication Management Service 08:14:17 jim
10.06.2019
LOCK 13:27:46 jim
DIB Lock 13:22:53 jim
Lock 13:21:19 jim
2.16.840.1.113719.1.1.6.1.10 13:18:38 jim
EDirCloneLock 13:17:14 jim eDirCloneLock ==> EDirCloneLock
2.16.840.1.113719.1.1.4.1.533 13:08:45 jim
CheckLockTag 13:05:46 jim
Chubby Lock Service 13:04:51 jim
Packet 13:03:46 jim
Dynamic Cache Mode 12:10:13 jim
FLAIM 11:53:24 jim
_ndsdb.ini 11:21:12 jim
Hard cache limit 11:14:52 jim
Cpinterval 11:12:56 jim
Cachecleanupinterval 10:59:13 jim
EDirectory DIB 10:27:18 jim
FLAIM Cache 10:23:34 jim
Ndsconfig Parameters 09:39:45 jim
09.06.2019
MacOS.10.14 09:32:49 jim
MacOS 09:30:31 jim
ICloud 09:19:21 jim
Instant Messaging 09:13:42 jim
Gmail 09:01:51 jim
MacOS.10.15 08:50:25 jim
IOS.13 08:48:48 jim
08.06.2019
Payment Services Directive 13:19:47 jim
Apple 12:56:18 jim
Cyclic Redundancy Check 11:24:07 jim
Keccak 11:21:40 jim
Arbitrary Length Hash 10:36:51 jim
Unkeyed Primitives 10:25:10 jim
Cryptographic Primitive 10:24:18 jim
Cryptographically secure pseudorandom number generator 10:07:55 jim
FIDO Authenticator 10:06:53 jim
Cryptographic pseudo-random number generator 10:06:03 jim
Security 09:38:36 jim
CIA 09:38:10 jim
Cryptosystem 09:17:26 jim
07.06.2019
Key Life cycle 12:01:18 jim
Key Revocation 11:58:08 jim
Public Key 11:56:09 jim
Asymmetric Key Cryptography 11:54:33 jim
Asymmetric Key 11:43:37 jim
China 10:15:16 jim
Replacement fertility rate 10:13:11 jim
Federal Reserve Bank 10:12:37 jim
Population 10:11:31 jim
United States Census Bureau 10:09:21 jim
ICE 10:05:38 jim
United States Citizenship and Immigration Services 10:02:20 jim
Green Card 09:59:13 jim
Alien 09:55:55 jim
Name 09:43:35 jim
Phone Number 09:30:14 jim
Level of Identity Proofing 09:08:27 jim
CN 08:50:28 jim
Year 1912 08:49:20 jim
PRC 08:48:43 jim
PeopleS Republic of China 08:47:45 jim
Year 1949 08:43:33 jim
LDAP Authentication 08:42:34 jim
06.06.2019
Web Blog_blogentry_060619_1 09:21:27 jim
05.06.2019
National Identity Register 20:06:34 jim
Basic Registry of People 20:03:56 jim
USPS 19:51:28 jim
United States Postal Service 19:50:56 jim
Electronic Identity Credential 19:32:41 jim
EID 19:28:45 jim
BRP 19:27:03 jim
Biometric Passport 19:15:01 jim
ICAO Document 9303 19:12:57 jim
TD1 12:52:26 jim
ICAO 12:52:06 jim Machine-Readable Zone ==> Machine Readable Zone
MRZ 12:52:06 jim Machine-Readable Zone ==> Machine Readable Zone
Machine Readable Zone 12:52:06 jim Machine-Readable Zone ==> Machine Readable Zone
ISO 7501 12:47:37 jim
EMRTD 12:42:29 jim
Electronic Machine Readable Travel Document 12:42:10 jim
Passport 12:36:14 jim
Emergency Travel Document 12:35:45 jim
Visa 12:28:44 jim
Machine Readable Visas 12:15:10 jim
MROTD 12:11:01 jim
MRP 12:08:28 jim Machine-Readable Passport ==> Machine Readable Passport
Machine Readable Passport 12:08:27 jim Machine-Readable Passport ==> Machine Readable Passport
Machine Readable Official Travel Documents 12:06:40 jim
Year 1944 11:54:01 jim
International Civil Aviation Organization 11:53:35 jim
Computer vision 11:51:10 jim
MRTD 11:44:57 jim
OCR 11:44:13 jim
Optical Character Recognition 11:43:53 jim
Machine Readable Travel Document 11:32:06 jim
ISO 29003 11:09:25 jim
International Organization for Standardization 11:05:23 jim
Derivative work 10:00:45 jim
Graphical User Interface 09:59:53 jim
Command-line 09:59:32 jim
GUI 09:55:17 jim
LoginShell 09:54:35 jim
CLI 09:50:25 jim
Bourne Shell 09:45:04 jim
Bash 09:41:59 jim
Z shell 09:39:20 jim
Zsh 09:37:32 jim
04.06.2019
Original work 11:48:23 jim
GNU General Public License 11:41:26 jim
GPL 11:40:02 jim
GPLv3 11:33:06 jim
30.05.2019
2.16.840.1.113719.1.39.43.6.4 11:37:36 jim
NspmPasswordAux 11:37:01 jim
NsimChallengeSet 11:33:07 jim
2.16.840.1.113719.1.39.43.4.106 11:29:22 jim
PwdAccountLockedTime 11:27:27 jim
2.16.840.1.113719.1.39.43.4.2 11:15:40 jim
NspmPassword 11:15:13 jim
2.16.840.1.113719.1.39.43.4.1 11:12:17 jim
NspmPasswordKey 11:11:49 jim
NspmDoNotExpirePassword 11:05:12 jim
NspmPasswordHistoryExpiration 11:00:03 jim
NspmPasswordHistoryLimit 10:58:11 jim
NspmPasswordHistory 10:54:56 jim
PwdInHistory 10:42:34 jim
PasswordsUsed 09:24:43 jim
FLAIM Attribute Containerization 09:09:04 jim
RECMAN 09:08:00 jim
RECM 08:58:17 jim
Ndsindex 07:38:30 jim
29.05.2019
Web Blog_blogentry_290519_1 10:50:46 jim
28.05.2019
ObjectSID 09:57:16 jim
24.05.2019
Qbit 09:43:57 jim
Superposition 09:15:15 jim
Computational complexity 08:32:31 jim
Communication complexity 08:31:48 jim
Complexity 08:30:38 jim
23.05.2019
Skulker 09:46:12 jim
Purger 09:31:26 jim
PURG 09:29:43 jim
SKLK 09:27:59 jim
EDirectory Background Processes 09:09:02 jim
LOST ENTRY 08:06:59 jim
22.05.2019
CheckPointThread 21:37:27 jim
Roll-Forward Log 21:37:06 jim
20.05.2019
PseudoServer 10:11:20 jim
SubjectKeyIdentifier 09:15:32 jim
Certificate Extensions 09:14:13 jim
Enablemovetoattrcontainer 08:14:07 jim
19.05.2019
IA5String 20:16:42 jim
Integer 20:15:21 jim
Boolean 20:13:34 jim
XML Object Model 20:08:31 jim
XOM 20:05:00 jim
Extended Data Service 20:02:10 jim
XDS 19:59:30 jim
OMSyntax 19:55:52 jim
PosixAccount 19:49:05 jim
UnixHomeDirectory 19:46:00 jim
18.05.2019
Attack Service 11:28:56 jim
LONGHAUL 11:27:24 jim
CGDB 11:21:58 jim
VAO 11:07:53 jim
POISONNUT 11:02:07 jim
ISAKMP 11:00:14 jim
DNC Decryption Flow 10:59:28 jim
Attack Orchestrator 10:57:55 jim
Cryptanalysis and Exploitation Services 10:51:56 jim
CES 10:45:55 jim
Key Recovery 09:55:15 jim
Credential Recovery 09:54:33 jim
Internet Protocol Security 09:29:29 jim
Triple DES 09:28:02 jim
Encapsulating Security Payload 09:27:41 jim
Satellite 09:26:00 jim
COMSAT 09:23:28 jim
TURMOIL 09:19:44 jim
VALIANTSURF 09:10:15 jim
Exploitation 09:06:00 jim
DNC 09:03:46 jim
Data Network Cipher 09:02:27 jim
Atomic SIGINT Data Format 08:52:13 jim
XKEYSCORE 08:47:13 jim
FALLOUT 08:44:24 jim
MARINA 08:41:37 jim
ASDF 08:28:47 jim
APEX 08:22:51 jim
15.05.2019
Target endpoint 16:21:28 jim
Proxy endpoint 16:20:30 jim
Apigee Edge 16:19:14 jim
Web Blog_blogentry_150519_1 16:00:21 jim
How Domain Controllers Are Located in Windows 15:13:20 jim
Site 15:10:29 jim
1.2.840.113556.1.5.31 15:09:37 jim
Active Directory Site 14:59:36 jim
Application Directory Partitions 14:42:02 jim
Schema Directory Partition 14:38:54 jim
Directory Partition Hierarchy 14:35:42 jim
Domain Directory Partition 14:25:40 jim
Forest Root Domain 14:12:41 jim
AD Forest 14:08:47 jim
Trusted Domain Object 14:05:42 jim
ObjectClass vs ObjectCategory 11:06:06 jim
ObjectClass 11:05:25 jim
ObjectCategory 11:04:09 jim
1.2.840.113556.1.4.783 10:56:33 jim
DefaultObjectCategory 10:56:11 jim
ObjectClass Types 10:40:18 jim
STRUCTURAL 10:38:48 jim
ObjectClassCategory 10:36:34 jim
1.2.840.113556.1.5.34 10:23:32 jim
1.2.840.113556.1.3.23 10:22:37 jim
1.2.840.113556.1.2.26 10:22:06 jim
MS-ADSA 10:21:41 jim
RdnAttId 10:20:00 jim
X-HIDDEN 10:12:23 jim
DefaultHidingValue 10:11:07 jim
MS-ADSC 09:36:12 jim
TrustedDomain 09:34:32 jim
TrustAuthOutgoing 09:28:37 jim
TrustAuthIncoming 09:28:21 jim
TDO 09:21:53 jim
MsDS-TrustForestTrustInfo 09:06:31 jim
DefaultNamingContext 08:47:05 jim
14.05.2019
Local Administrative Accounts 17:38:28 jim
Administrative Identity 17:37:17 jim
Service Account 17:22:27 jim
Privileged Identity 17:14:39 jim
NIST.SP.800-57 17:07:28 jim
Symmetric Key Cryptography 15:23:30 jim
Hash Function 15:18:39 jim
Cryptographic Algorithm 15:15:32 jim
Algorithm 14:50:59 jim
13.05.2019
Change-password 12:03:50 jim
Web Blog_blogentry_130519_1 11:58:35 jim
12.05.2019
OpenID Connect for Identity Assurance 10:13:45 jim
11.05.2019
HIPAA Privacy Rule 10:25:36 jim
Key Management 08:25:26 jim
EFS 08:14:46 jim
Encrypted File Systems 08:14:08 jim
Symmetric cipher 07:12:58 jim
10.05.2019
Pairwise Pseudonymous Identifier 14:24:31 jim
Law of Directed Identity 14:17:52 jim
Robotic Process Automation 14:10:40 jim
Robot 14:07:23 jim
Web Blog_blogentry_100519_1 13:57:19 jim
09.05.2019
ERI 15:25:09 jim
Eyring Research Institute 15:23:38 jim
Netware Core Protocol 15:06:32 jim
DHost 15:00:56 jim
Sequenced Packet Exchange 15:00:17 jim
SPX 14:51:19 jim
Ray Noorda 14:46:41 jim
Novell INC 14:46:07 jim
ShareNet 14:42:00 jim
Network Operating System 14:36:47 jim
Drew Major 14:32:16 jim
Internetwork Packet Exchange 14:22:32 jim
ReplicaAddressHint 14:21:49 jim Internet Protocol Exchange ==> Internetwork Packet Exchange
SuperSet Software Group 14:21:49 jim Internet Protocol Exchange ==> Internetwork Packet Exchange
Logical Link Control 14:21:48 jim Internet Protocol Exchange ==> Internetwork Packet Exchange
NDAP 14:21:48 jim Internet Protocol Exchange ==> Internetwork Packet Exchange
IPX 14:21:35 jim
Novell Data Systems Inc 14:13:23 jim
08.05.2019
Well-known Security Identifiers 15:02:09 jim
PrimaryGroupID 14:28:01 jim
Domain Users 14:18:32 jim
Group 14:13:52 jim
07.05.2019
Containerization vs Metadata 10:00:46 jim
Web Blog_blogentry_070519_1 09:55:07 jim Folder vs Search Debate ==> Containerization vs Metadata
Folder 09:32:05 jim
Content 09:31:44 jim
Groups Are Bad 09:09:51 jim
Quantum 08:01:36 jim
Decade 07:58:13 jim
Universal Declaration of Human Rights 07:56:40 jim
Year 1948 07:55:24 jim
Data entropy 07:54:47 jim
Bit 07:22:53 jim
06.05.2019
Relational Database Management System 06:28:29 jim
MariaDB 06:28:07 jim
MySQL 06:24:43 jim
MyMysqlCheatSheet 06:18:00 jim
POP 06:16:56 jim
Pop 06:16:33 jim
RFC 4217 06:05:01 jim
RFC 7817 06:04:03 jim
Opportunistic TLS 06:03:06 jim
1.3.6.1.4.1.1466.20037 05:58:45 jim
05.05.2019
OAuth 2.0 Incremental Authorization 09:06:57 jim
Include_granted_scopes 08:51:58 jim
04.05.2019
International Call Prefix 09:34:59 jim
International Direct Dialling 09:34:23 jim
E.164 09:29:53 jim
IDD 09:29:32 jim International Dialing Prefix ==> International Direct Dialling
DDDS 09:15:30 jim
Dynamic Delegation Discovery System 09:15:08 jim
RFC 6116 09:10:45 jim
N11 09:06:54 jim
Easily Recognizable Code 09:06:26 jim
Telephone exchange 09:00:41 jim
Exchange 08:56:07 jim
International Telephone Number 08:45:23 jim
Telephone Numbering Plan 08:36:03 jim
Country Calling Code 08:29:23 jim
03.05.2019
DumpEdirectoryPasswordInformationTool 09:05:01 jim
Nondeterministic algorithms 08:48:45 jim
Turing Machine 08:41:59 jim
Year 1936 08:35:48 jim
MsDS-PasswordComplexityEnabled 08:29:44 jim
Password Complexity 08:28:03 jim
Law of Complexity 08:27:14 jim
Randomized algorithm 08:13:54 jim
Turing test 08:09:32 jim
Monte Carlo algorithm 08:01:00 jim
Las Vegas algorithm 08:00:47 jim
02.05.2019
OAuth 2.0 Token Binding 08:44:53 jim
RFC 8472 08:44:06 jim
Sec-Token-Binding 08:32:26 jim Token Binding Protocol Negotiation ==> Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation
Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation 08:32:25 jim Token Binding Protocol Negotiation ==> Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation
OAuth 2.0 Demonstration of Proof-of-Possession at the Application Layer 08:25:53 jim
Web Blog_blogentry_020519_1 08:20:03 jim
RFC 8152 08:15:26 jim
CBOR Object Signing and Encryption 08:14:57 jim
Mutual TLS 08:05:56 jim
MTLS 08:04:27 jim
01.05.2019
Observer Node 13:02:19 jim
Sovrin Steward 12:52:35 jim
Validator Node 12:51:24 jim
Sovrin Node 12:46:43 jim
Sovrin Agent 12:35:01 jim
Public Ledger 12:23:43 jim
Hyperledger Indy 12:01:32 jim
Indy Steward 11:49:32 jim
Sovrin Ledger 11:36:39 jim
Signing key 11:27:56 jim
Verkey 11:27:34 jim
Verinym 11:18:18 jim
30.04.2019
Threat Model 10:39:15 jim
Vishing 10:37:12 jim
Robocall 10:24:33 jim
Social Engineering Attack 10:21:12 jim
HTML link 10:16:25 jim
Keylogger 10:09:48 jim
USB Attack 10:06:00 jim
Extensible Firmware Interface 10:04:28 jim
Exploit 09:59:08 jim
Botnet 09:56:30 jim
Public Wi-Fi 09:49:13 jim
Phishing 09:45:16 jim
Smishing 09:43:59 jim
Pretexting 09:40:48 jim
Spyware 09:36:04 jim
Tailgating 09:15:48 jim
Cyber 09:10:27 jim
Cybercriminals 09:09:29 jim
Spear-Phishing 09:05:18 jim
Ransomware 08:50:42 jim
27.04.2019
Subscriber Number 20:16:54 jim
National Significant Number 19:44:57 jim
Area Code 09:47:00 jim
Machine Behavior 09:08:58 jim
AI 09:05:46 jim
Anguilla 08:58:26 jim
Web Blog_blogentry_270419_1 08:51:43 jim
26.04.2019
Password Periodic Changes 09:46:02 jim
24.04.2019
Traveler Verification Service 09:34:08 jim
Airlines 09:22:03 jim
Biometric data 09:19:59 jim
SCOTUS 08:10:10 jim
United States Supreme Court 08:09:45 jim
20.04.2019
Encryption key 08:34:14 jim
Key 08:29:33 jim
17.04.2019
DirXML-ShimAuthPassword 09:32:32 jim
DirXML-NamedPasswords 09:32:00 jim
15.04.2019
NdsOperationCheckpoint 19:00:25 jim
13.04.2019
1.2.840.113556.1.4.1413 09:12:14 jim
LDAP_SERVER_PERMISSIVE_MODIFY 09:10:51 jim
10.04.2019
Health Dataset 11:22:28 jim
Continuity of Care Record 11:14:21 jim
CCR 11:12:07 jim
Continuity of Care Document 11:11:43 jim
CCD 11:01:32 jim
Clinical Document Architecture 10:54:37 jim
Identity Broker 09:23:41 jim
07.04.2019
Lag HTTP headers 11:33:30 jim
Logs and File Locations 11:31:53 jim Laghttpheaders ==> Lag HTTP headers
LDAPWiki Images 11:28:23 jim
Euclidean Vector 11:19:42 jim
Vector 11:17:36 jim
Point 11:14:59 jim
Vector Field 11:12:12 jim
Vector Space 11:07:12 jim
Grin 09:23:43 jim
MimbleWimble 09:17:33 jim
Web Blog_blogentry_070419_1 08:48:08 jim
02.04.2019
SDI Key 15:36:02 jim
NICI server-mode operation 15:27:17 jim
NICI client-mode operation 15:25:46 jim
NICI Configuration Files 15:15:44 jim
Security Domain Infrastructure 15:02:33 jim
NDSPKISDKeyServerDN 14:59:39 jim Niciext ==> NICIEXT
NICI 14:59:39 jim Niciext ==> NICIEXT
NICITreeKeyProvider 14:59:39 jim Niciext ==> NICIEXT
NICIEXT 14:59:38 jim Niciext ==> NICIEXT
WX Entries 14:32:21 jim
NICI Security Domain 14:28:09 jim
EDirectory Tree 14:27:02 jim
Key Access Partition 14:21:35 jim
NDS Tree-name 14:18:49 jim
NICISDI Keys 13:55:12 jim
NMAS Result Codes 13:46:01 jim
NMAS_E_MISSING_KEY 13:43:37 jim
NMAS_E_NO_RESOLVE_DN 13:10:46 jim
01.04.2019
TreeKey 08:51:28 jim
Session Key 08:45:31 jim
SASDFM key 08:44:09 jim
SASDFM 08:41:45 jim
SDIDIAGSwitches 08:27:51 jim
SDIDIAG 08:23:04 jim
27.03.2019
Source-code Repository 08:46:57 jim
Source code 08:46:39 jim
Repository 08:42:30 jim
19.03.2019
Ping Identity 14:29:51 jim
1.3.6.1.4.1.30221.2.5.9 14:27:53 jim
Join Request and Result Controls 14:27:16 jim
Differences between LDAP 2 and 3 Protocols 11:12:09 jim
LDAPv3 11:07:50 jim
LDAP Referral 10:48:00 jim
AffectsMultipleDSAs 10:45:52 jim
SaslBindInProgress 10:45:10 jim
ConfidentialityRequired 10:44:29 jim
UnavailableCriticalExtension 10:43:41 jim
AdminLimitExceeded 10:42:05 jim
LDAP_ADMINLIMIT_EXCEEDED 10:41:09 jim
LDAPv2 10:28:07 jim
Electronic Health Record 08:38:49 jim
Patient Protection and Affordable Care Act 08:38:14 jim
PPACA 08:36:57 jim
10.03.2019
RFC 8174 09:46:25 jim
SHALL 09:45:22 jim
MAY 09:44:53 jim
SHOULD NOT 09:44:28 jim
MUST NOT 09:44:01 jim
MUST 09:43:28 jim
SHOULD 09:42:59 jim
05.03.2019
Password Recovery 13:30:27 jim
Web Authentication API 13:28:05 jim
WebAuthn Authentication 13:15:59 jim
WebAuthn Registration 13:12:28 jim
Security Key 11:59:12 jim
Platform Authenticator 11:39:16 jim
Roaming Authenticator 11:35:11 jim
WebAuthn Client 10:25:16 jim
CTAP2 Platform Host 10:23:49 jim
Human-palatable 10:18:16 jim
WebAuthn Authenticator 10:16:27 jim
Authorization Gesture 09:56:47 jim
WebAuthn Relying Party 09:56:21 jim
U2F device 09:49:17 jim
WebAuthn Client Device 09:46:07 jim
Clients 09:37:18 jim
Our Clients 09:35:29 jim
Client Device 09:33:07 jim
WebAuthn Attestation 09:08:38 jim
WebAuthn 09:07:48 jim
Credential Management API 09:07:15 jim
CTAP2 09:06:35 jim
FIDO Standards 09:02:14 jim
Client To Authenticator Protocol 09:01:14 jim
28.02.2019
LDAP_SERVER_SD_FLAGS_OID 09:39:28 jim
Security Descriptor 09:38:27 jim
DACL_SECURITY_INFORMATION 09:30:08 jim
OWNER_SECURITY_INFORMATION 09:29:29 jim
SACL_SECURITY_INFORMATION 09:28:53 jim
GROUP_SECURITY_INFORMATION 09:25:57 jim
1.2.840.113556.1.4.801 09:04:32 jim
27.02.2019
DID method specification 17:54:25 jim
26.02.2019
2.16.840.1.113719.1.1.4.720 16:19:15 jim
DsContainerReadyAttrs 16:15:38 jim
25.02.2019
Automatic Certificate Management Environment 11:38:53 jim
Lets encrypt 11:36:05 jim
Boulder 11:32:34 jim
13.02.2019
Imanager 12:38:29 jim
IManager 3.1.2 12:36:23 jim
Web Blog_blogentry_130219_1 08:52:30 jim
09.02.2019
Win32 DOS and OS-2 Result Code 12:20:52 jim
Result Code 12:19:07 jim
07.02.2019
Certificate File Formats 17:25:37 jim
Edirectory Certificate Management 14:37:12 jim
Converting Certificate Formats 14:36:45 jim
Certificate Keystores 14:36:14 jim
04.02.2019
RFC 4373 18:16:58 jim
Bulk Update-Replication Protocol 18:15:47 jim
LBURP 18:13:16 jim
LDAP Server Standards and Specifications 18:10:09 jim
LDAP and Bind Throttling 14:52:32 jim
Supported Novell eDirectory Agent Configuration Parameters 14:40:06 jim
03.02.2019
LDIF Generator 09:53:48 jim
30.01.2019
HAL 17:57:51 jim
Hardware Abstraction Layer 17:57:07 jim
Operating-system-level virtualization 17:53:18 jim
Hardware Virtualization 17:51:40 jim
Application Virtualization 17:46:21 jim
Virtualization method 17:38:28 jim
Orchestration 17:34:38 jim
Container Orchestration 17:32:56 jim
Event 4673 12:54:05 jim
28.01.2019
Certificate Validation Tools 08:49:54 jim
Cipher Suite 08:46:16 jim
24.01.2019
Event 4625 13:39:48 jim
18.01.2019
User-Account-Control Attribute 12:09:18 jim
User-Account-Control Attribute Values 12:08:18 jim
PASSWD_CANT_CHANGE 11:43:53 jim
17.01.2019
CL Signature 11:39:36 jim
Anonymous Credential 11:31:41 jim
Double Ratchet Algorithm 11:31:29 jim
Identity Mixer 11:13:26 jim
Digital Signature 11:10:29 jim
Signatures with efficient protocols 11:06:18 jim
OpenID Connect User Questioning API 09:44:58 jim
OpenID Connect Account Porting 09:41:07 jim
John Bradley 09:30:13 jim
Private URI Scheme 09:24:36 jim
OpenID Connect Backchannel Authentication 09:18:50 jim
MODRNA 09:06:30 jim
15.01.2019
DirXML Shim 15:09:08 jim
DirXML command 14:54:49 jim
Events vs Commands 14:49:27 jim
PublicationShim 11:28:07 jim
SubscriptionShim 11:23:11 jim
DirXML Engine 11:20:19 jim
Identity Vault 11:12:20 jim
IDV 11:09:48 jim
DirXML 4.7 10:46:19 jim
IDMDeveloperInfo 10:43:06 jim
Temporary Redirect 09:48:04 jim
HTTP 307 09:43:48 jim
13.01.2019
ObjectGUID 19:42:51 jim
Backslash 19:41:47 jim Backslash () ==> Backslash
UserApplications 19:37:05 jim
10.01.2019
Transport-layer Security Mechanism 17:24:27 jim
E-PHI 17:20:33 jim
HIPAA Security Rule 17:19:09 jim
Do-find-matching-object 16:26:38 jim
Error.do-find-matching-object 16:20:37 jim
07.01.2019
Extended Flags 13:01:47 jim
X-SEARCH-FLAGS 13:00:44 jim
X-SYSTEMFLAGS 13:00:16 jim
1.2.840.113556.1.2.3 12:49:16 jim
WhenChanged 12:48:59 jim
ModifyTimestamp 12:37:44 jim
ModifiersName 12:34:25 jim
2.5.18.4 12:33:31 jim
03.01.2019
Acute Care 09:47:49 jim
02.01.2019
DIXIE 15:34:11 jim
29.12.2018
Nuclear 09:52:28 jim
DOE 09:42:49 jim
United States Department of Energy 09:42:12 jim
United States Department of Housing and Urban Development 09:34:48 jim
United States Department of Agriculture 09:27:19 jim
DOL 09:26:37 jim
United States Department of Labor 09:26:15 jim
United States Department of State 09:15:22 jim
United States Cabinet Department 09:12:18 jim
27.12.2018
RFC 2606 13:44:06 jim
26.12.2018
Id_token_signing_alg_values_supported 09:43:11 jim
RFC 2119 09:42:13 jim
Id_token_encryption_enc_values_supported 09:04:49 jim
25.12.2018
NameConstraints 10:08:25 jim
Web Blog_blogentry_251218_1 09:55:38 jim Subject Key IDentifier ==> SubjectKeyIdentifier
AuthorityKeyIdentifier 09:54:40 jim
Root Certificate 09:41:10 jim
Certificate Chain 09:40:33 jim
Certification path 09:39:20 jim
21.12.2018
Kerberos 14:18:42 jim
CommonWell Health Alliance 10:37:36 jim
Epic Systems Corporation 10:24:37 jim
Web Blog_blogentry_211218_1 10:15:04 jim
20.12.2018
Public Key Cryptography Based User-to-User 19:41:50 jim
Security Support Provider 19:39:44 jim
Local Security Authority 19:38:59 jim
Cached and Stored Credentials 19:38:26 jim
MS-WKST 19:35:30 jim
How passwords are used in Windows 19:17:39 jim
Windows Client Authentication Architecture 19:15:56 jim
Key Distribution Center 18:59:51 jim
Ticket Granting Ticket 18:53:46 jim
Kerberos Authentication Service 18:45:46 jim
19.12.2018
LDAP Data Interchange Format 09:49:18 jim
Modify Request 09:46:54 jim
17.12.2018
Cryptocurrency 14:40:56 jim
Independent United States Federal Agency 14:32:20 jim
Federal Trade Commission 14:28:25 jim
Fair Credit Reporting Act 14:24:25 jim
FCRA 14:23:32 jim
Commodity 14:17:28 jim
XRP 14:14:04 jim
Debtor 14:11:06 jim
Creditor 14:10:01 jim
Debt 14:07:42 jim
Interest 14:02:16 jim
Distributism 13:20:08 jim
Taiwan 12:24:22 jim
Web Blog_blogentry_171218_1 11:52:32 jim
NANP 11:28:05 jim
Central Office 11:21:25 jim
Market 11:13:44 jim
Chartered company 11:10:30 jim
Centralized Exchange 11:03:55 jim
Decentralized Exchange 11:01:30 jim
Monopsony 10:59:35 jim
Market structure 10:58:14 jim
Monopoly 10:55:18 jim
Medium of exchange 10:41:37 jim
Oligopoly 10:36:37 jim
16.12.2018
20th Century 11:28:06 jim
21st Century 11:27:16 jim
Century 11:19:46 jim
19th Century 11:16:37 jim
Web Storage 09:01:22 jim
SessionStorage 08:59:43 jim
15.12.2018
1800s 13:45:30 jim
Year 1899 13:44:15 jim
Time And Epochs 13:43:28 jim
14.12.2018
HTML Colour Names 09:27:34 jim
Web Blog_blogentry_141218_1 09:20:09 jim
11.12.2018
ConfigFilesUnixinfo.log 11:31:36 jim
Jim 10:58:56 jim
MyStartPage 10:49:58 jim
1.3.6.1.4.1.8876.2.1 10:47:36 jim
1.3.6.1.4.1.8876.2.2 10:47:24 jim
1.3.6.1.4.1.8876.2 10:45:43 jim
1.3.6.1.4.1.8876.1 10:45:29 jim
Schema Extensions 10:43:24 jim
Sudo 10:39:23 jim
09.12.2018
IMF 10:38:45 jim
Web Blog_blogentry_091218_1 10:34:16 jim
Penetration Test 10:19:37 jim
Vulnerability Assessment 10:13:48 jim
Vulnerability 10:13:00 jim
Decentralized system 09:51:27 jim
Common Criteria for Information Technology Security Evaluation 09:42:37 jim
07.12.2018
Coherence 12:09:41 jim
CurveZMQ 11:44:54 jim
Plenum Byzantine Fault Tolerant Protocol 11:37:57 jim
06.12.2018
Organizational friction 16:43:05 jim
Mura 16:21:27 jim
Muda 16:20:10 jim
Muri 16:11:49 jim
Kanban 16:06:26 jim
Friction 15:48:32 jim
NDS Threads 11:55:42 jim
Web Blog_blogentry_061218_1 10:46:18 jim
05.12.2018
N4u.server.listen-on-loopback 15:07:18 jim
04.12.2018
MS Access Mask 12:40:12 jim
MS Access Mask/ms-accctrl4.png 12:37:51 jim MS Access Mask Format
Image Styles 12:32:05 jim
Access Control Entry 12:20:56 jim
Access Control Entry Type 12:15:22 jim
Rights 12:03:35 jim
Discretionary Access Control List 11:37:34 jim
Securable object 11:17:45 jim
Access Control Model-Microsoft Windows 11:15:58 jim
MSFT Access Token 10:34:55 jim
Access Control Models 10:17:49 jim
Access Control List 10:14:27 jim
System Access Control List 10:12:27 jim
SID identifier authority 09:55:50 jim
SECURITY_NT_AUTHORITY 09:36:17 jim
Security Identifier 09:29:45 jim
03.12.2018
Mimikatz 17:24:55 jim
Golden Ticket 17:16:31 jim
MLLP 13:44:01 jim
Minimal Lower Layer Protocol 13:42:01 jim
Health Level Seven 13:39:15 jim
Book 13:32:48 jim
Web Blog_blogentry_111017_1 13:32:24 jim Health Care ==> HealthCare
Web Blog_blogentry_200918_1 13:32:24 jim Health Care ==> HealthCare
Web Blog_blogentry_281018_1 13:32:24 jim Health Care ==> HealthCare
Medical ID Card 13:32:23 jim Health Care ==> HealthCare
Personal Health Record 13:32:23 jim Health Care ==> HealthCare
Regulatory Risk 13:32:23 jim Health Care ==> HealthCare
United States Office of Personnel Management 13:32:23 jim Health Care ==> HealthCare
Web Blog_blogentry_030618_1 13:32:23 jim Health Care ==> HealthCare
Integrating the Healthcare Enterprise 13:32:22 jim Health Care ==> HealthCare
Meaningful Use 13:32:22 jim Health Care ==> HealthCare
Health Care Provider 13:32:21 jim Health Care ==> HealthCare
Health Information Technology for Economic and Clinical Health 13:32:21 jim Health Care ==> HealthCare
Industry Specific 13:32:21 jim Health Care ==> HealthCare
Electronic Medical Record 13:32:20 jim Health Care ==> HealthCare
Federal Health Care Law 13:32:20 jim Health Care ==> HealthCare
HIPAA Covered Entity 13:32:20 jim Health Care ==> HealthCare
Health Care Organization 13:32:20 jim Health Care ==> HealthCare
Digital Imaging and Communications in Medicine 13:32:19 jim Health Care ==> HealthCare
Electronic Fitness Device 13:32:19 jim Health Care ==> HealthCare
HealthCare 13:32:19 jim Health Care ==> HealthCare
Data anonymization 13:30:21 jim
Cloud Data Store 13:24:24 jim
Dataset 13:20:17 jim
Windows registry 13:19:18 jim Data Store ==> DataStore
System Authorization Facility 13:19:17 jim Data Store ==> DataStore
Update 13:19:17 jim Data Store ==> DataStore
Web Blog_blogentry_090418_1 13:19:17 jim Data Store ==> DataStore
Web Blog_blogentry_211217_1 13:19:17 jim Data Store ==> DataStore
Password Policy 13:19:16 jim Data Store ==> DataStore
Protocol Buffers 13:19:16 jim Data Store ==> DataStore
Read 13:19:16 jim Data Store ==> DataStore
Replication 13:19:16 jim Data Store ==> DataStore
NoSQL 13:19:15 jim Data Store ==> DataStore
OAuth Scope Example 13:19:15 jim Data Store ==> DataStore
Oracle Unified Directory 13:19:15 jim Data Store ==> DataStore
LDAP Overview 13:19:14 jim Data Store ==> DataStore
HBase 13:19:13 jim Data Store ==> DataStore
Faythe 13:19:12 jim Data Store ==> DataStore
GCP Storage Products 13:19:12 jim Data Store ==> DataStore
Delegation vs Impersonation 13:19:11 jim Data Store ==> DataStore
Delete 13:19:11 jim Data Store ==> DataStore
Delete Request 13:19:11 jim Data Store ==> DataStore
Distributed Data Store 13:19:11 jim Data Store ==> DataStore
Data Metadata 13:19:10 jim Data Store ==> DataStore
Data Processor 13:19:10 jim Data Store ==> DataStore
Data warehouse 13:19:10 jim Data Store ==> DataStore
Database 13:19:10 jim Data Store ==> DataStore
Create 13:19:09 jim Data Store ==> DataStore
Credential Repository 13:19:09 jim Data Store ==> DataStore
Credential Vault 13:19:09 jim Data Store ==> DataStore
Cryptocurrency wallet 13:19:09 jim Data Store ==> DataStore
Biometric Identification 13:19:08 jim Data Store ==> DataStore
Brocade Communications Systems 13:19:08 jim Data Store ==> DataStore
By-reference 13:19:08 jim Data Store ==> DataStore
American Association of Motor Vehicle Administrators 13:19:07 jim Data Store ==> DataStore
Biometric Enrollment 13:19:07 jim Data Store ==> DataStore
DataStore 13:19:07 jim Data Store ==> DataStore
AD Password Filters 13:18:52 jim
OpenID Connect Federation 12:19:17 jim
Personal Information Protection and Electronic Documents Act 10:00:12 jim
02.12.2018
Matrix 10:38:36 jim
Graph 10:32:15 jim
Binary Tree 10:28:27 jim
JSONArray 10:22:47 jim
Array 10:21:28 jim
Linked List 10:20:13 jim
Data Structure 10:13:45 jim
Delivery Team 09:41:58 jim
Software 09:38:09 jim
Agile Principles 09:37:34 jim
Perl 09:33:29 jim
Debug 09:31:28 jim
Firebase 09:29:54 jim
Application 09:29:24 jim
Waterfall model 09:28:11 jim
Software Development Kit 09:24:33 jim
Lean Product Development 09:24:02 jim
01.12.2018
Refactoring 13:39:48 jim
Remote Procedure Call 11:16:03 jim
Idempotent 11:15:23 jim
Function 11:13:54 jim
Class 11:10:54 jim
Method 11:09:43 jim
Object 11:08:57 jim
SNMP 11:06:09 jim
Session Management 11:04:55 jim
SAML Web Browser Profiles 11:04:19 jim
Certification Authority Rating And Trust 11:02:48 jim
Binding_message 11:01:51 jim
Commitment Scheme 10:58:55 jim
FAL 2 10:57:33 jim
GS2 Mechanism Family 10:56:35 jim
SAML Bindings 10:54:46 jim
Binding 10:48:50 jim
Subroutine 10:26:54 jim
Backus Normal Form 10:00:52 jim
Inheritance 09:58:05 jim
Python 09:56:53 jim
Property 09:56:35 jim
Application Programing Interface 09:55:12 jim
Object-oriented Programming 09:53:25 jim
Extreme Programming 09:52:32 jim
Software development 09:51:22 jim
Functional Programming 09:47:19 jim
Protocol 09:23:52 jim
Protocol Stack 09:22:25 jim
DIAMETER 09:20:21 jim
30.11.2018
Ecash 11:04:38 jim
Store of value 10:48:11 jim
Unit of measurement 10:46:01 jim
Store 10:23:18 jim
Identity Data Store 10:21:37 jim
29.11.2018
Fractional Reserve 17:52:34 jim
OpenLedger 17:48:05 jim
Pwd-Last-Set attribute 14:55:16 jim
PwdLastSet 14:46:06 jim
DID Context 14:14:24 jim
DID path 14:13:56 jim
DID record 14:13:38 jim
DID Operations 14:13:23 jim
DID reference 14:12:09 jim
DID Fragment 14:11:36 jim
DID Subject 14:09:54 jim
DID Service Endpoint 13:58:02 jim
DID Document 13:55:32 jim
Trust Anchor 13:23:52 jim
27.11.2018
OBIT_COUNT_FROM_DATABASE_INDEX 13:01:45 jim
Cn=Partition, cn=Agent, cn=monitor 13:00:31 jim
ChangeCacheCount 12:59:30 jim
UserAttribute 12:58:06 jim
NDS Obituaries 12:49:40 jim
Change Cache 12:40:50 jim
PerishableData 12:23:25 jim
Glossary Of LDAP And Directory Terminology 12:11:32 jim ReplicaS Perishable Data Delta ==> PerishableData
MaxRingDelta 12:09:16 jim Maximum Ring Delta ==> MaxRingDelta
PurgeVector 11:59:22 jim
2.16.840.1.113719.1.1.4.1.500 11:34:55 jim
ObituaryNotify 11:34:32 jim
PlaceOfBirth 11:13:05 jim
SapAddOnUM 11:11:47 jim
1.3.6.1.4.1.694.2.1.104 11:10:08 jim
BirthName 11:09:07 jim
DateOfBirth 11:04:52 jim
Date Of Birth 11:04:30 jim
Birth Certificate 11:03:21 jim
Birth Record 11:03:02 jim
Monitor Entry 10:07:47 jim
Canada 10:02:13 jim
United States 10:00:11 jim
Earth 09:56:54 jim
Australia 09:56:00 jim
Antarctica 09:53:20 jim
South America 09:52:11 jim
North America 09:50:12 jim
Europe 09:47:43 jim
Africa 09:46:15 jim
Asia 09:44:07 jim
Continent 09:42:28 jim
Mobile Country Code 09:39:41 jim
Estonia 09:36:55 jim
DigiD 09:30:46 jim
Netherlands 09:28:01 jim
National ID 09:13:16 jim
Xdas.properties 09:09:22 jim
XDAS 09:08:14 jim
XDAS for eDirectory 09:06:40 jim
26.11.2018
OBIT_MOVED_PURGEABLE 15:34:23 jim
OBIT_MOVED_OK_TO_PURGE 15:33:46 jim
OBIT_MOVED_NOTIFIED 15:33:29 jim
OBIT_MOVED_ISSUED 15:33:10 jim
OBIT_NEWRDN_PURGEABLE 15:32:43 jim
OBIT_DEAD_ISSUED 15:32:14 jim
OBIT_NEWRDN_NOTIFIED 15:32:07 jim
OBIT_NEWRDN_OK_TO_PURGE 15:31:37 jim
OBIT_NEWRDN_ISSUED 15:31:18 jim
OBIT_DEAD_PURGEABLE 15:30:55 jim
OBIT_DEAD_OK_TO_PURGE 15:30:29 jim
OBIT_DEAD_NOTIFIED 15:30:03 jim
NDS Obituary State 15:28:26 jim
OBIT_NOTIFIED 15:27:28 jim
OBIT_ISSUED 15:26:24 jim
OBIT_PURGEABLE 15:25:51 jim
OBIT_OK_TO_PURGE 15:24:04 jim
NDS Obituaries Type 15:11:54 jim
INHIBIT_MOVE Obituary 15:11:15 jim
OBIT_MOVED 15:10:35 jim MOVED Obituary ==> OBIT_MOVED
NDS Primary Obituaries 15:10:15 jim
OBIT_NEWRDN 15:09:35 jim NEW RDN Obituary ==> OBIT_NEWRDN
OBIT_DEAD 15:07:09 jim DEAD Obituary ==> OBIT_DEAD
NDS Obituaries Classification 14:21:19 jim
25.11.2018
XDAS Security Events 20:36:54 jim
Locked By Intruder 20:33:38 jim
Universal Password 12:42:38 jim
NMAS_LOGIN 12:35:53 jim
RFC 4301 12:31:58 jim
SASL EXTERNAL 12:29:51 jim
SASL 12:27:23 jim
22.11.2018
Encoding claims in the OAuth 2 state parameter using a JWT 16:16:31 jim
OAuth 2.0 Mix-Up Attack 16:01:07 jim
21.11.2018
Public Key Credential 10:12:38 jim
UAF 09:46:53 jim
20.11.2018
Policy 12:47:52 jim
17.11.2018
Pic 12:35:38 jim
TitleBox 11:54:49 jim
OSI-Model/OSI Model.svg 10:11:46 jim ODI Model
Kim Cameron 09:17:27 jim
16.11.2018
Edirectory Indexes 10:29:38 jim
SasUpdateLoginInfo 10:11:40 jim
13.11.2018
LDAPSyntaxes 14:57:29 jim
Postal Address_LDAPSyntax 14:56:15 jim
Case Ignore List 14:54:38 jim
1.3.6.1.4.1.1466.115.121.1.41 14:49:18 jim
Counter_LDAPSyntax 14:33:03 jim
2.16.840.1.113719.1.1.5.1.22 14:06:24 jim Counter_AttribuType ==> Counter_LDAPSyntax
Counter 14:01:08 jim XCounter ==> Counter
JSPWikiCorePlugins 14:01:08 jim XCounter ==> Counter
JSPWikiPlugins 14:01:08 jim XCounter ==> Counter
Time To Live 14:01:08 jim XCounter ==> Counter
Edirectory Filtered Replicas 13:57:22 jim
ReplicaType 13:56:48 jim
X-NDS_FILTERED_OPERATIONAL 11:34:17 jim
X-NDS_FILTERED_REQUIRED 11:33:45 jim
ReplicaState 11:08:06 jim
NDS Sparse Read Replica 10:44:02 jim
NDS Sparse Write Replica 10:37:03 jim EdirectoryFilteredReadWriteReplica ==> NDS Sparse Write Replica
NDS Replica Pointer 10:30:07 jim
2.16.840.1.113719.1.1.5.1.16 10:15:35 jim
Replica 10:14:28 jim
Replica number 10:05:33 jim
Replica List 10:03:26 jim
Partition Root Entry 10:01:25 jim
Schema Sync 09:56:21 jim
Removing Failed Server 09:44:51 jim
NDS Subordinate Reference Replica 09:41:58 jim EdirectorySubordinateReferenceReplica ==> NDS Subordinate Reference Replica
NDS Read-Only Replica 09:36:50 jim Edirectory ReadOnly Replica ==> NDS Read-Only Replica
NDS Read-Write Replica 09:33:00 jim EdirectoryReadWriteReplica ==> NDS Read-Write Replica
NDS Master Replica 09:28:52 jim
12.11.2018
Web Blog_blogentry_121118_1 13:50:23 jim
Identifier registry 12:06:28 jim
Web Blog_blogentry_090217_1 11:57:17 jim
Password Statistics 11:41:10 jim
CAPTCHA 11:40:30 jim
Relying Party 11:40:12 jim
OpenAM 11:39:55 jim
Social Login 11:39:33 jim
Best Practices Password 11:39:15 jim
How SSL-TLS Works 08:38:09 jim
11.11.2018
Office of Tailored Access Operations 18:57:15 jim
QUANTUM 18:43:49 jim
DISHFIRE 18:43:21 jim
National Security Agency 18:33:21 jim
10.11.2018
RFC 269 10:28:44 jim
Foo 10:27:53 jim
RFC 3092 10:23:36 jim
Web Blog_blogentry_100818_1 10:21:32 jim
The Twelve Networking Truths 10:04:19 jim
RFC 1925 09:58:18 jim
RFC 1776 09:57:00 jim
RFC 1217 09:53:19 jim
Humorous RFCs 09:51:12 jim
RFC 6214 09:46:31 jim
RFC 2549 09:45:24 jim
A Standard for the Transmission of IP Datagrams on Avian Carriers 09:41:32 jim
09.11.2018
Password Authentication is Broken 12:24:16 jim
Credential Leaked Databases 12:09:21 jim
Web Blog_blogentry_230418_1 12:03:59 jim
Password 11:54:50 jim
Ontology 09:36:07 jim
OperationalAttribute 08:59:07 jim
Requesting Attributes by Object Class 08:56:59 jim
1.3.6.1.4.1.4203.1.5.2 08:45:48 jim
08.11.2018
DirXML-DriverStartOption 18:48:08 jim
07.11.2018
TRAFFICTHIEF 15:33:59 jim
MAINWAY 15:28:54 jim
PINWALE 15:13:58 jim
05.11.2018
Attack Effort 16:56:30 jim Risk Taxonomy ==> Risk Taxonomy Technical Standard
Risk Taxonomy Technical Standard 16:56:30 jim Risk Taxonomy ==> Risk Taxonomy Technical Standard
Open Factor Analysis of Information Risk 16:55:59 jim
The Open Group 16:42:58 jim
2.16.840.1.113719.1.8.4.6 12:29:09 jim
DirectReports 12:28:43 jim
04.11.2018
Web Blog_blogentry_251018_1 12:01:57 jim
Event Data Recorder 10:58:19 jim
EDR 10:57:19 jim
TAO 10:18:53 jim
Attribution 10:02:49 jim
03.11.2018
Host Name Resolution 21:28:53 jim
Hostname 21:19:10 jim
Web Blog_blogentry_021118_1 13:01:01 jim
Loyalty Card 09:56:28 jim
Web Blog_blogentry_031118_1 08:40:51 jim
Human Element 08:19:00 jim
Human 08:12:00 jim
Windows Client Authentication Architecture/Windows Client Authentication Architecture.svg 07:27:13 jim
Security Account Manager 07:24:24 jim
Netlogon service 07:23:34 jim
Winlogon 07:21:52 jim
02.11.2018
User mode and Kernel mode 22:04:52 jim
Web Blog_blogentry_011118_1 12:04:09 jim
PKU2U 11:53:42 jim
Negotiate SSP 11:52:59 jim
CredSSP 11:45:20 jim
Corporate Censorship 10:08:59 jim
Year 1934 09:43:47 jim
Telecommunications Act 09:43:16 jim
Organizational Censorship 09:19:07 jim
Censorship 09:05:24 jim
01.11.2018
Encryption 14:14:29 jim
ROT13 14:10:31 jim
Substitution Cipher 14:01:21 jim
Caesar Cipher 13:57:32 jim
Offset Codebook Mode 13:53:44 jim
XorEncryptXor 13:46:18 jim
TBC 13:45:33 jim
Tweakable Block Cipher 13:45:19 jim Tweakable Blockcipher ==> Tweakable Block Cipher
XEX 13:42:53 jim
OCB2 13:37:15 jim
Consent 13:10:09 jim
Contract 13:01:04 jim
Uniform Commercial Code 12:49:00 jim
Smart contracts 12:37:16 jim
Contract of Adhesion 12:36:14 jim
Mutual Authentication 08:12:54 jim
31.10.2018
Web Blog_blogentry_301018_1 12:10:35 jim
Year 1960 09:11:34 jim
Year 2099 09:10:40 jim
Year 1999 09:09:43 jim
1990s 09:05:01 jim
Year 1900 09:03:53 jim
Year 08:54:11 jim
Year 1924 08:49:22 jim
Year 1901 08:48:55 jim
Year 1939 08:48:15 jim
World War II 08:47:35 jim
Great Depression 08:46:33 jim
G.I. Generation 08:45:15 jim
Generation Y 08:43:03 jim
World War I 08:42:18 jim
Lost Generation 08:41:18 jim
Silent Generation 08:36:58 jim
Generation X 08:34:44 jim
Baby boomers 08:29:07 jim
Millennials 08:28:01 jim
Generation 08:26:03 jim
Generation Z 08:22:15 jim
Login_hint 07:53:25 jim
30.10.2018
Millennium 16:45:40 jim
Billion 16:40:57 jim
Million 16:34:56 jim
Number 16:32:18 jim
Thousand 16:29:12 jim
Hundred 16:27:03 jim
One 16:25:15 jim
Trillion 16:11:09 jim
OPM 16:03:36 jim
United States Federal Agency 16:00:54 jim
29.10.2018
PDC Emulator FSMO Role 18:11:11 jim
Infrastructure Master FSMO Role 18:08:24 jim
RID Master FSMO Role 18:08:18 jim
Domain Naming Master FSMO Role 18:08:12 jim
Schema Master FSMO Role 18:08:06 jim
Flexible Single Master Operation 18:05:16 jim
DirXMLState 18:05:08 jim
DirXML Driver 18:05:01 jim
Main 09:02:49 jim
28.10.2018
Notify and Reset Subscriber Filter 15:16:12 jim
Group Signatures 14:11:08 jim
Blue Button 12:13:25 jim
Patient Data 11:02:28 jim
Registry 09:44:30 jim
Web Blog_blogentry_161018_1 09:00:21 jim
ERROR_DS_ENCODING_ERROR 08:07:15 jim
DN Escape Values 08:06:16 jim
ERROR_DS_NON_BASE_SEARCH 08:01:06 jim
LDAP Dereference Control 07:44:44 jim
1.3.6.1.4.1.4203.666.5.16 07:38:56 jim
SupportedControl 07:26:17 jim
27.10.2018
Paper Size 15:38:53 jim
Web Blog_blogentry_271018_1 15:03:55 jim
Guam 11:40:37 jim
Northern Mariana Islands 11:39:19 jim
Puerto Rico 11:39:03 jim
Insular Areas 11:38:17 jim
Year 1954 11:36:57 jim
Unorganized territory 11:20:14 jim
Commonwealth 11:20:05 jim
Organized territory 11:19:45 jim
Incorporated territory 11:13:14 jim
Unincorporated territory 11:13:04 jim
Organic Act 11:12:39 jim
United States Territories 11:03:26 jim
DOI 10:42:51 jim
United States Department of the Interior 10:42:00 jim
MP 10:07:55 jim
Indian Reservation 09:51:19 jim
United States Minor Outlying Islands 09:40:43 jim
2.16.840.1.113719.1.8.4.4 09:28:21 jim
City 09:28:05 jim
Townships 09:20:36 jim
County 09:14:10 jim
US States 09:06:41 jim
26.10.2018
Fast Healthcare Interoperability Resources 13:40:44 jim
Internet User Authorization 13:34:47 jim
IUA 13:34:09 jim
WorkFlow 12:55:44 jim
Trigger 12:51:01 jim
Office of the National Coordinator for Health Information Technology 10:57:13 jim
21st Century Cures Act 10:53:20 jim
NIH 10:50:58 jim
National Institutes of Health 10:47:53 jim
NHIN 10:35:08 jim
Nationwide Health Information Network 10:34:20 jim
Federal Risk and Authorization Management Program 09:09:47 jim
User Story 08:37:59 jim
Use cases 08:37:08 jim
25.10.2018
Certificate Signing Request 20:33:31 jim
RFC 5967 20:25:46 jim
PKCS10 20:24:35 jim
Federal Information Security and Management Act 14:35:16 jim
Gramm-Leach-Bliley Act 14:29:01 jim
Bank Secrecy Act 14:26:38 jim
BSA 14:24:39 jim
Sarbanes-Oxley Act 14:19:33 jim
Federal Reserve Act 14:14:21 jim
Telephone Consumer Protection Act 14:12:09 jim
Do-Not-Call 14:10:10 jim
NSL 13:24:26 jim
National Security Letter 13:24:02 jim
RFPA 13:20:15 jim
Money laundering 13:11:29 jim
Money Laundering Control Act 13:08:59 jim
Stored Communications Act 11:26:12 jim
SCA 11:21:02 jim
RFC 7292 11:16:37 jim
ECPA 11:15:41 jim
24.10.2018
Federal Tax Information 13:42:02 jim
United States Social Security Administration 13:40:39 jim
Social Security Number 13:40:21 jim
Medicaid 13:39:49 jim
U.S.C. Title 18 13:36:40 jim
Electronic Communications Privacy Act 13:34:22 jim
One-party consent 13:31:02 jim
18 U.S.C. 2511 13:27:05 jim
Social Security Act 13:25:52 jim
U.S.C. 13:25:00 jim
Dialed Number Recorder 13:23:48 jim
Private Law 13:18:30 jim
Act of Congress 13:10:33 jim
Web Blog_blogentry_241018_1 12:57:15 jim
SEPA 10:42:15 jim
Single Euro Payments Area 10:41:42 jim
European Payments Council 10:37:08 jim
The Berlin Group 10:29:35 jim
NextGenPSD2 10:26:11 jim
Four-Party Credit Card System 10:21:06 jim
Access to Account 10:18:12 jim
Payment Service User 10:14:00 jim
XS2A 10:12:59 jim
Payment Initiation Service Provider 10:10:39 jim
Account Information Service Provider 10:10:14 jim
Third Party Payment Service Provider 10:08:51 jim
OAuth 2.0 Proof-of-Possession (PoP) Security Architecture 09:32:48 jim
1.3.6.1.4.1.42.2.27.8.1.23 09:12:00 jim
21.10.2018
Information security 08:37:13 jim
Secure Remote Password Protocol 08:34:49 jim
3rd Generation Partnership Project 08:31:33 jim
Password-authenticated Key Exchange 08:28:05 jim
Secure by design 08:15:46 jim
European Telecommunications Standards Institute 08:12:23 jim
Web Blog_blogentry_211018_1 07:51:26 jim
20.10.2018
Ten Principles of Self-Sovereign Identity 10:17:46 jim
Web Blog_blogentry_191018_1 10:07:14 jim
Right to be forgotten 10:03:53 jim
19.10.2018
Credential 08:39:31 jim
18.10.2018
Local Security Authority Subsystem Service 12:49:06 jim
HKCU 12:43:53 jim
HIVE 12:43:24 jim
HKEY_DYN_DATA 12:42:55 jim
Windows ME 12:40:31 jim
Windows 9x 12:37:47 jim
Personal Computer 12:35:30 jim
Windows NT 12:34:55 jim
HKEY_PERFORMANCE_DATA 12:30:02 jim
HKEY_CURRENT_CONFIG 12:27:25 jim
HKU 12:25:52 jim
HKEY_USERS 12:25:36 jim
HKCC 12:24:00 jim
HKEY_CURRENT_USER 12:23:37 jim
HKEY_CLASSES_ROOT 12:20:52 jim
HKCR 12:10:01 jim
Relative IDentifier 11:36:59 jim
Primary Access Token 11:19:50 jim
Security Reference Monitor 11:12:46 jim
Access Token 11:11:23 jim
MSFT 11:09:09 jim
SRM 11:00:16 jim
Local Identity 10:32:28 jim
HKEY_LOCAL_MACHINE 10:00:11 jim
HKLM 09:49:41 jim
17.10.2018
Multiple-Input and Multiple-Output 13:41:49 jim
MIMO 13:41:25 jim
16.10.2018
Sovrin Connector 16:39:43 jim
Key pair 16:13:13 jim
DIGIT 15:18:53 jim
ALPHA 15:16:20 jim
National Motor Vehicle Title Information System 14:16:38 jim
VIN 14:15:46 jim
NMVTIS 14:15:19 jim
AAMVA 14:09:49 jim
State Pointer Exchange Services 13:50:19 jim
SPEXS 13:34:44 jim
BCCH 10:50:31 jim
ARFCN 10:50:00 jim
Absolute Radio-Frequency Channel Numbers 10:49:31 jim
Broadcast Control CHannel 10:47:34 jim
LAI 10:24:32 jim
Integrated Circuit Card Identifier 10:06:45 jim
Temporary Mobile Subscriber Identity 09:40:53 jim
International Mobile Equipment Identity 08:40:41 jim
15.10.2018
Threat landscape 18:07:29 jim
The Seven Laws Of Identity 17:53:32 jim
ISO 29100 17:50:21 jim
Principle of least privilege 17:37:22 jim
UF_ACCOUNTDISABLE 17:15:24 jim
USER_ACCOUNT_DISABLED 17:11:12 jim
Common Active Directory Bind Errors 16:45:34 jim
Microsoft Active Directory Extensible Match Rules 15:46:48 jim
Holder 08:53:31 jim
Possession Factor 08:34:24 jim
W3C Decentralized Identifiers 08:32:54 jim
14.10.2018
RFC 8485 17:25:36 jim
Vectors of Trust 17:25:04 jim
Create Read Update Delete 13:18:50 jim
Decentralized Identity 12:47:56 jim
Know Your Customer 12:46:01 jim
Verifiable Claims/vc-ecosystem-overview.png 11:57:44 jim
Entity 11:43:06 jim
Inspector-verifier 11:34:51 jim
Issuer 11:32:35 jim
Key Rotation 11:18:26 jim
CKMS 11:08:35 jim
KMS 11:07:50 jim
Key Management Service 11:07:23 jim
13.10.2018
Attack Surface 18:33:28 jim
API Development 10:40:00 jim
Bad Actor 10:36:38 jim
Attack vectors 10:31:32 jim
11.10.2018
Social Identity 17:27:13 jim
Identity Relationship Framework 17:24:26 jim
User-centric Identity 17:01:33 jim
Responsive Organizations 11:41:15 jim
10.10.2018
ServiceOutput 17:03:16 jim
Profile 16:57:36 jim
PostalCode 16:55:32 jim
Address 16:52:32 jim
Schema.org 16:50:25 jim
Organization 12:42:17 jim
Place 12:38:00 jim
Thing 12:37:04 jim
Yandex 12:21:19 jim
Link Relation Types 12:16:09 jim
StreetAddress 12:07:03 jim
Street 12:05:23 jim
2.5.4.9 11:59:25 jim
Taxonomy 11:12:58 jim
AtMention 11:11:09 jim
Folksonomy 11:09:57 jim
Hashtag 11:08:32 jim
User-generated content 11:03:48 jim
Bug 09:58:55 jim
Data Breach 09:54:51 jim
Implementation Vulnerability 09:44:24 jim
Breach 09:42:09 jim
09.10.2018
Jim Willeke Resume 16:14:54 jim
Custodial Wallet 15:23:11 jim
RFC 8473 14:24:39 jim
RFC 8471 14:23:51 jim
Token Binding Protocol 14:21:40 jim
Token Binding over HTTP 14:21:09 jim
Bitcoin address 12:35:21 jim
Web Blog_blogentry_091018_1 12:29:52 jim
Acceptable Use 11:26:10 jim
Unexpected benefit 10:57:56 jim
Data portability 10:31:10 jim
Electronic Health 09:17:27 jim
EHealth 09:05:24 jim
08.10.2018
STRAITBIZARRE 11:21:01 jim
CountryOfResidence 10:56:58 jim
1.3.6.1.4.1.8876.2.1.30 10:56:29 jim
Nonimmigrant Information System 10:50:40 jim
Combined DNA Index System 10:50:06 jim
State Identification Number 10:49:29 jim
OAKSTAR 10:39:30 jim
BLARNEY 10:38:56 jim
TOYGRIPPE 10:36:28 jim
Unified Passenger Module 10:35:18 jim
United States Visitor and Immigrant Status Indicator 10:35:04 jim
Intelligence Agencies 10:34:52 jim
Border Crossing Information 10:34:12 jim
Automated Biometric Identification System 10:33:10 jim
Advance Passenger Information System 10:30:07 jim
KEYCARD 10:29:45 jim
BOUNDLESSINFORMANT 10:12:13 jim
PRISM 10:12:00 jim
ECHELON 10:11:14 jim
TURBULENCE 10:10:21 jim
SIGINT 10:09:50 jim
Spying 10:05:57 jim
Implied consent 09:41:55 jim
Express Consent 09:35:42 jim
Explicit consent 09:35:19 jim Express consent ==> Explicit consent
Upstream Surveillance 09:11:32 jim
LPR 08:52:17 jim
ALPR 08:51:52 jim
License Plate 08:49:12 jim
CarLicense 08:45:15 jim
07.10.2018
Web Blog_blogentry_071018_1 11:50:51 jim
UPort 11:18:39 jim
ERC1056 11:12:07 jim
Lightweight Ethereum Identity 11:11:45 jim
Issued_token_type 10:43:20 jim
Want_composite 10:40:30 jim
Subject_token_type 10:38:18 jim
Actor_token_type 10:37:36 jim
Actor_token 10:36:24 jim
Subject_token 10:34:00 jim
Requested_token_type 10:32:50 jim
Token Type Identifiers 10:30:40 jim
OAuth 2.0 Token Exchange 10:21:29 jim
OAuth 2.0 Token Exchange Request 10:20:42 jim
Token-exchange 10:14:01 jim
Cool Identity Token Uses 10:08:37 jim
Impersonation 09:41:05 jim
May_act (May Act For) Claim 09:33:00 jim
Act (Actor) Claim 09:17:31 jim
06.10.2018
Multi-Source Identity 10:48:35 jim
NIS 10:11:51 jim
Discovery Mechanism 10:06:40 jim
NetBIOS Name Service 10:01:16 jim
Domain Name System 09:58:46 jim
Windows Internet Name Service 09:54:40 jim
Name Service 09:51:59 jim
Namespace 09:51:09 jim
RFC 1002 09:49:54 jim
RFC 1001 09:48:23 jim
DIF 09:24:10 jim
Domain of OneS Own 09:06:17 jim
Sovereign-source Identity 08:58:44 jim
Independent Identity 08:54:36 jim
05.10.2018
ADSTYPE_DN_STRING 11:08:34 jim
DN String 11:06:23 jim
Microsoft Active Directory Syntax 11:05:50 jim
Object(DS-DN) 10:57:22 jim
2.5.5.1 10:55:46 jim
Access Point 10:51:29 jim
1.3.6.1.4.1.1466.115.121.1.2 10:51:02 jim
Object(Access-Point) 10:42:47 jim
2.5.5.14 10:39:59 jim
ADSTYPE_DN_WITH_STRING 10:33:04 jim
DNWithString 10:32:21 jim
DN-String 10:32:03 jim
ADSTYPE_DN_WITH_BINARY 10:26:12 jim
DNWithOctetString 10:25:11 jim
DNWithBinary 10:24:11 jim
DN-Binary 10:24:04 jim
DN Syntax 10:14:03 jim
Draft-armijo-ldap-syntax-00 09:53:41 jim
LDAP_SERVER_EXTENDED_DN_OID 09:31:20 jim
1.2.840.113556.1.4.529 09:26:06 jim
Security Descriptor Description Language 09:24:12 jim
2.5.5.16 09:11:44 jim
2.5.5.9 09:10:28 jim
AttributeSchema 09:04:54 jim
MapiID 08:56:55 jim
IsEphemeral 08:44:10 jim
ClassDisplayName 08:35:27 jim
IsDefunct 08:31:37 jim
AttributeSecurityGUID 08:24:48 jim
ExtendedCharsAllowed 08:16:47 jim
04.10.2018
Microsoft Active Directory Attributes 21:08:14 jim
1.2.840.113556.1.4.914 21:02:52 jim
AllowedAttributesEffective 21:02:21 jim
FLAG_DOMAIN_DISALLOW_RENAME 20:58:34 jim
LegacyExchangeDN 20:52:16 jim
Assistant 20:51:05 jim
RSVP 20:15:11 jim Resource Reservation Protocol ==> Resource ReSerVation Protocol
Resource ReSerVation Protocol 20:15:11 jim Resource Reservation Protocol ==> Resource ReSerVation Protocol
RFC 2205 20:14:59 jim
QoS 20:13:42 jim
Quality of Service 20:13:27 jim
AccountExpires 20:02:01 jim
AttributeSyntax 19:55:38 jim
Access Token Validation 11:42:33 jim
Data Controller 10:02:29 jim
Data curation 09:56:37 jim
Copyright 09:15:14 jim
Open data 09:09:44 jim
Linked Data 09:06:43 jim
Inrupt, Inc 08:59:04 jim
WebID 08:39:25 jim SOLID ==> Solid
GS1 Country Code 08:12:48 jim
Iran 08:10:19 jim
03.10.2018
FOXACID 16:47:15 jim
TURBINE 16:11:21 jim QUANTUMTHEORY ==> QUANTUM
RAMPART-A 16:05:47 jim
Year 1971 15:58:47 jim
PRESSUREWAVE 15:57:56 jim
NZL 15:55:20 jim
NZ 15:55:04 jim
New Zealand 15:53:22 jim
NSA Suite A Cryptography 15:46:57 jim
Menezes-Qu-Vanstone 15:32:45 jim
RFC 6379 15:32:02 jim
RFC 6239 15:31:31 jim
RFC 6460 15:31:11 jim
RFC 5759 15:31:07 jim
NSA Suite B Cryptography 15:24:23 jim
FIPS Based Cipher Suites 15:15:44 jim
N4u.server.fips_tls 15:09:01 jim
EDirectory TLS 15:06:15 jim
EDirectory 14:41:12 jim
NumericStringMatch 11:55:32 jim
KeywordMatch 11:48:05 jim
MatchingRule 11:37:13 jim
RFC 3641 11:29:49 jim
GSER 11:29:15 jim
Generic String Encoding Rules 11:28:55 jim
RdnMatch 11:27:03 jim
Component Matching Rules 11:10:52 jim
IntegerFirstComponentMatch 10:44:42 jim
DirectoryStringFirstComponentMatch 10:33:15 jim
CaseIgnoreOrderingMatch 10:26:49 jim
CaseIgnoreListSubstringsMatch 10:20:18 jim
EQUALITY 10:15:07 jim
MatchingRuleUse 10:10:36 jim
Greater-Or-Equal SearchFilter 10:03:32 jim
AND SearchFilter 10:02:02 jim
EqualityMatch 09:59:13 jim
Substrings 09:55:07 jim
Schema Partition 09:42:41 jim
LDAP Filter Choices 09:37:57 jim
LDAP Three-valued logic 09:32:52 jim
SearchResultEntry 09:28:12 jim
Search Responses 09:26:08 jim
Web Blog_blogentry_031018_1 09:10:37 jim
Ambiguous Name Resolution 09:05:21 jim
ANR attribute set 08:49:22 jim
02.10.2018
ANR 21:18:16 jim
UsnChanged 18:28:14 jim
1.2.840.113556.1.2.120 18:25:10 jim
FLAG_ATTR_IS_OPERATIONAL 18:22:24 jim
UTCTime 18:11:18 jim
USN 18:11:07 jim
Update Sequence Number 18:10:49 jim
Web Blog_blogentry_021018_1 18:04:47 jim
Microsoft TIME 17:51:23 jim
X-NDS_SYNTAX 17:29:49 jim
LDAP Schema 17:06:54 jim
EDirectory Schema Reference 14:10:34 jim
LDAP Schema Element Type 14:01:51 jim
Write-managed 13:53:19 jim Novell Schema Documentation ==> EDirectory Schema Reference
Novell Developer Kit 13:52:01 jim
NDK 13:46:41 jim
Resource 13:46:03 jim
2.16.840.1.113719.1.1.6.1.21 13:42:48 jim
HostResourceName 13:41:58 jim
Smssmdrclass 13:36:11 jim
Status 13:31:15 jim status ==> Status
CertificateRevocationList 13:30:43 jim certificateRevocationList ==> CertificateRevocationList
CertificateRevocation 13:29:42 jim certificateRevocation ==> CertificateRevocation
MailHost 13:24:26 jim mailHost ==> MailHost
MailAlternateAddress 13:23:49 jim mailAlternateAddress ==> MailAlternateAddress
MailForwardingAddress 13:23:05 jim mailForwardingAddress ==> MailForwardingAddress
LDAPSchemasForNISInLDAP 13:22:31 jim
NSCP 13:20:53 jim
2.16.840.1.113730.3.1.3 13:16:27 jim
EmployeeNumber 13:16:06 jim
LDAP Schema for NDS 13:04:06 jim
1.3.6.1.1.1.2.4 13:01:55 jim
IpProtocol 13:01:31 jim
IpProtocolNumber 12:57:00 jim ipProtocolNumber ==> IpProtocolNumber
AutomountMapName 12:56:16 jim automountMapName ==> AutomountMapName
LDAP Schema Element Extensions 12:52:49 jim
DS_NONREMOVABLE_ATTR 12:41:29 jim
X-NDS_NON_REMOVABLE 12:40:44 jim
X-NDS_NONREMOVABLE 12:40:30 jim
X-NDS_NOT_CONTAINER 12:37:57 jim
X-NDS_NAME 12:36:49 jim
X-NDS_CONTAINMENT 12:35:47 jim
X-NDS_NAMING 12:34:31 jim
Draft-sermersheim-nds-ldap-schema 12:07:47 jim
GS1 Company Prefix 10:00:23 jim
Global Trade Item Number 09:50:45 jim
GS1 Product Code 09:47:58 jim
GS1 Manufacturer Code 09:45:01 jim Manufacturer Code ==> GS1 Manufacturer Code
GTIN 09:30:14 jim
United Nations Standard Products and Services Code 09:28:13 jim
UNSPSC 09:10:06 jim
GS1 09:02:13 jim
Industry 08:59:58 jim
SWIFT code 08:58:27 jim
Common Vulnerability Scoring System 08:54:14 jim
ISO 10646 08:53:30 jim
Car Connectivity Consortium 08:52:53 jim
PCI Data Security Standard v3.1 08:51:48 jim
DSL 08:50:23 jim
Export Control Classification Number 08:48:19 jim
Commerce Control list 08:46:50 jim
NASD 08:42:37 jim
Financial Industry Regulatory Authority Inc 08:41:56 jim
Industry Classification 08:37:26 jim
Major Industry Identifier 08:29:02 jim
Payment Card Industry 08:27:17 jim
LOB 08:22:23 jim
Line Of Business 08:21:56 jim
Merchant Category Code 08:18:13 jim
Merchant 07:47:05 jim
01.10.2018
AVS 18:31:29 jim
Address Verification System 18:30:28 jim
Card Verification Method 18:27:59 jim
Merchant Service Provider 18:24:40 jim
Card Issuer 18:23:08 jim
Interchange Fee 18:21:22 jim
Card Processor 18:12:30 jim
Payment Network 18:03:26 jim
MSP 18:00:17 jim
Vector of Trust Request 09:23:16 jim
Vtr 09:12:46 jim
Upgraded 09:08:53 jim
Permission ticket 09:03:12 jim
Ticket 09:01:09 jim
Claim_token 08:56:39 jim
Persisted Claims Token 08:53:17 jim
PCT 08:50:33 jim
User-Managed Access Work Group 08:38:31 jim
UMA 2.0 Grant for OAuth 2.0 08:35:29 jim
Claims_locales 08:21:47 jim
Ui_locales 08:14:53 jim
BCP 47 08:07:47 jim
Tel 08:03:56 jim
RFC 3966 08:02:55 jim
RFC 5341 08:02:24 jim
30.09.2018
Web Blog_blogentry_300918_1 11:38:57 jim
BoringSSL 11:25:19 jim
The Onion Router 11:09:35 jim
Quick UDP Internet Connections 10:58:13 jim
CurveCP 10:55:29 jim
Perfect Forward Secrecy 10:45:25 jim
Forward Secrecy 10:43:18 jim
X25519 10:07:11 jim
29.09.2018
Modernity 12:21:22 jim
SRI 12:18:53 jim
SRI International 12:18:34 jim
ARPANET 12:17:48 jim
NPL Data Communications Network 12:16:13 jim
Metrology 12:13:55 jim
National Physical Laboratory 12:13:02 jim
Packet switching 12:11:04 jim
Year 1964 11:59:34 jim
Defense Advanced Research Projects Agency 11:53:08 jim
ARPA 11:51:21 jim
Advanced Research Projects Agency 11:50:27 jim
RAND Corporation 11:30:48 jim
Web Blog_blogentry_290918_1 11:18:55 jim
John Doerr 10:03:19 jim
Objectives and Key Results 09:59:46 jim
Single Sign-On 09:32:31 jim
WEB Single Sign-On 09:27:19 jim
Local device 09:24:00 jim
On-premise 09:23:34 jim
Cloud Access Security Broker 09:21:40 jim
28.09.2018
Client Login Extension 13:16:01 jim
SASLoginSequence 11:35:43 jim sASLoginSequence ==> SASLoginSequence
NMAS_E_INVALID_SPM_REQUEST 11:27:53 jim
Dump Password Information Tool-Trouble Shooting 11:27:19 jim
NMAS_E_ACCESS_NOT_ALLOWED 11:22:55 jim
DSE_NMAS_LOG_FINISH_LOGIN_STATUS 11:19:50 jim
NMAS_E_LOGIN_FAILED 11:17:43 jim NMAS -1642 ==> NMAS_E_LOGIN_FAILED
NMAS 11:16:32 jim
SSSD 10:27:16 jim
Server_error 10:21:03 jim
Action 10:18:41 jim
XDAS Action 10:14:53 jim
Unfortunate event 10:11:43 jim
Unintended consequence 10:08:49 jim
Perverse result 10:01:37 jim
SSL-TLS Interception 09:57:11 jim
U2F 09:33:27 jim
27.09.2018
Filtering for Bit Fields 18:00:40 jim
LDAP_MATCHING_RULE_BIT_AND 17:56:58 jim
1.2.840.113556.1.4.803 17:56:44 jim
LDAP_MATCHING_RULE_BIT_OR 17:55:57 jim
1.2.840.113556.1.4.804 17:55:40 jim
Bitmask 17:42:13 jim
Filtered Attribute Set 17:12:29 jim
Directory Partition Subtrees 16:11:02 jim
NamingContext 15:44:21 jim
PDC 15:16:07 jim
BackLink 14:32:53 jim
Forward link 14:30:47 jim
Linked Attribute 14:28:10 jim
2.5.5.7 14:23:55 jim
ISIN 14:17:55 jim
ISO 6166 14:17:20 jim
International Securities Identifying Number 14:15:14 jim
ISO 3901 14:11:27 jim
International Standard Recording Code 14:10:20 jim
ISRC 14:08:31 jim
US 13:45:15 jim
UM 13:42:54 jim
Co 13:41:16 jim
0.9.2342.19200300.100.1.48 13:37:06 jim
BuildingName 13:36:50 jim
0.9.2342.19200300.100.1.38 13:31:27 jim
AssociatedName 13:27:57 jim
1.2.840.113556.1.2.50 13:14:10 jim
LinkID 13:13:51 jim
MsDS-User-Account-Control-Computed 12:52:01 jim
Constructed Attribute 12:51:22 jim
ACCOUNTDISABLE 12:16:08 jim
SCRIPT 12:13:48 jim
USER_USE_AES_KEYS 12:08:19 jim
MsDS-SupportedEncryptionTypes 11:45:27 jim
NO-USER-MODIFICATION 11:19:53 jim
Messaging Application Programming Interface 11:18:32 jim
MAPI 11:10:00 jim
2.5.5.10 11:02:43 jim
1.2.840.113556.1.2.218 10:59:21 jim
OMObjectClass 10:58:52 jim
RFC 1278 10:49:33 jim
Presentation Address 10:48:34 jim
1.2.840.113556.1.1.1.12 10:46:48 jim
Replica Link 10:13:50 jim
PresentationAddress 09:25:21 jim
1.3.6.1.4.1.1466.115.121.1.38 09:16:05 jim
1.2.840.113556.1.2.49 08:35:31 jim
LDAPDisplayName 08:21:17 jim
26.09.2018
IsMemberOfPartialAttributeSet 19:18:06 jim
SchemaIDGUID 19:12:25 jim
AttributeID 19:10:31 jim
IsSingleValued 19:09:43 jim
RangeUpper 19:08:35 jim
RangeLower 19:07:37 jim
LOWERBOUND 19:07:00 jim
SchemaFlagsEx 19:00:30 jim
SystemOnly 18:55:58 jim
MsDS-PhoneticDepartment 18:50:08 jim
FRODCFilteredAttribute 18:49:48 jim
Active Directory Schema Attributes 18:27:51 jim
MsDS-PhoneticCompanyName 18:25:28 jim
25.09.2018
Integrated Digital Enhanced Network 14:45:37 jim
IDEN 14:43:53 jim
MEID 14:32:22 jim
SNR 14:31:28 jim
SVN 14:29:09 jim
IMEI Software Version 14:22:20 jim
Type Allocation Code 14:20:12 jim
Digit 14:19:16 jim
Final Assembly Code 14:17:25 jim
FAC 14:10:34 jim
Reporting Body Identifier 14:03:42 jim
British Approvals Board for Telecommunications 13:52:52 jim
BABT 13:52:29 jim
SerialNumber 13:44:33 jim
Wiki Link Syntax 13:31:18 jim
L10n 13:29:01 jim
I18n 13:28:35 jim
Internationalization and Localization 11:24:26 jim
Preparation, Enforcement, and Comparison of Internationalized Strings 11:19:15 jim
RFC 3454 11:17:20 jim Internationalization ==> Internationalization and Localization
RFC 7564 11:04:28 jim
RFC 8264 11:04:01 jim
PRECIS 11:00:33 jim
RFC 2377 10:49:26 jim
24.09.2018
Netflix 18:36:31 jim
Join AD Domain 18:34:34 jim
Policy Core Information Model 18:16:55 jim
Common Open Policy Service 18:15:21 jim
RFC 3060 18:06:15 jim
RFC 3460 18:05:01 jim
PCIM 18:03:05 jim
Policy Core Extension LDAP Schema 17:56:24 jim
PCELS 17:53:58 jim
HomePhone 17:49:52 jim
1.3.6.1.4.1.453.7.2.8 17:42:32 jim
AssociatedInternetGateway 17:42:14 jim
0.9.2342.19200300.100.1.37 17:32:21 jim
Name Registration Scheme 17:31:38 jim
NRS 17:28:46 jim
AssociatedDomain 17:26:11 jim
0.9.2342.19200300.100.1.26 17:21:01 jim
ARecord 17:20:19 jim
AliasedEntryName 17:13:58 jim
LDAP Object Identifier Descriptors 17:12:50 jim
Draft-wahl-ldap-adminaddr-05 17:08:23 jim
2.5.13.21 17:02:14 jim
TelephoneNumberSubstringsMatch 17:00:30 jim
Access Log 16:41:59 jim
LDAP Protocol Exchanges 16:40:32 jim
LDAP Message 16:37:33 jim
PUM 16:32:34 jim
Matched DN 16:31:12 jim DefinitionMatchedDN ==> Matched DN
LDAP Result 16:30:49 jim
DcObject 09:24:38 jim
Dc 09:20:05 jim
2.16.840.1.113719.1.48.4.1.18 09:13:51 jim
NdspkiIssueTime 09:13:29 jim
2.5.5.11 09:09:15 jim
1.3.6.1.4.1.1466.115.121.1.53 09:08:44 jim
ADSTYPE_UTC_TIME 09:04:45 jim
GeneralizedTime 08:50:39 jim
DefinitionGeneralizedTime 08:45:03 jim
Windows Time service 08:35:54 jim
Time sync 08:33:45 jim
Synchronization 08:29:55 jim
W32Time 08:24:40 jim
RFC 5905 08:11:32 jim
Network Time Protocol 08:10:41 jim
Simple Network Time Protocol 08:09:44 jim
SNTP 08:09:06 jim
Why is Time Important 08:02:38 jim
Verify Time is Synchronized 07:59:21 jim
23.09.2018
Cluster Orchestration System 20:33:26 jim
State of the Internet-Security Report 19:50:28 jim
Credential stuffing 09:06:13 jim
Akamai 09:03:27 jim
VNM 09:01:33 jim
VN 09:01:13 jim
Vietnam 09:00:43 jim
RFC 1267 08:53:17 jim
Border Gateway Protocol 08:52:39 jim
BGP 08:51:37 jim
AS 08:51:03 jim
Autonomous System 08:49:54 jim Autonomous system ==> Autonomous System
Autonomous System Number 08:49:54 jim Autonomous system ==> Autonomous System
RFC 6793 08:49:33 jim
ASN 08:47:09 jim
Web Blog_blogentry_230918_1 08:44:07 jim
Bot 08:38:13 jim
22.09.2018
BaseObject 21:53:22 jim
FAS 10:42:56 jim
Read-Only Domain Controller 10:30:35 jim
Active Directory Functional Levels 10:28:10 jim
RODC 10:26:00 jim
PARTIAL_SECRETS_ACCOUNT 10:25:04 jim
Windows Server 2003 R2 09:27:02 jim
Code 09:24:44 jim
FPARTITIONSECRET 09:20:33 jim
FBASEONLY 09:20:20 jim
FEXTENDEDLINKTRACKING 09:20:11 jim
FNEVERVALUEAUDIT 09:19:49 jim
FCONFIDENTIAL 09:19:42 jim
FSUBTREEATTINDEX 09:19:33 jim
FTUPLEINDEX 09:19:14 jim
FCOPY 09:19:04 jim
FPRESERVEONDELETE 09:18:56 jim
FPDNTATTINDEX 09:18:47 jim
FATTINDEX 09:18:25 jim
SystemFlags 09:17:26 jim
ProxyAddresses 09:14:15 jim
FANR 09:12:03 jim
LDAP Indexes 09:06:19 jim
SubstringIndex 09:04:55 jim DefinitionSubstringIndex ==> SubstringIndex
PhysicalDeliveryOfficeName 08:42:40 jim
2.5.4.19 08:41:57 jim
MsDS-AdditionalSamAccountName 08:32:30 jim
SearchFlags 08:03:37 jim
Web Blog_blogentry_220918_1 07:55:14 jim
NAME 07:51:15 jim
1.2.840.113556.1.4.1 07:46:50 jim
20.09.2018
Business to Business 17:54:52 jim
Financial-grade API 15:39:01 jim
Authorization Code 15:31:48 jim
Authorization Code Flow 15:29:47 jim
Refresh Token 15:27:53 jim
Sender Constrained Token 15:20:31 jim
Token 15:17:50 jim
Contractor 11:30:35 jim
Vender 11:29:46 jim
Dat Protocol 09:53:09 jim
Member 09:16:18 jim
Distributed Web 09:04:17 jim
EE 08:54:37 jim
19.09.2018
MGT 18:28:06 jim
E.214 18:25:50 jim
Signalling Connection Control Part 18:24:33 jim
Mobile Global Title 18:23:42 jim
Mobile Network Code 18:08:45 jim
ERC 17:31:05 jim
NPA 17:17:14 jim
9-1-1 16:59:03 jim
ELS 16:58:06 jim
Public Safety Answering Point 16:57:27 jim
PSAP 16:56:56 jim
Next Generation 9-1-1 16:56:34 jim
United States Department of Transportation 16:56:09 jim
USDOT 16:55:28 jim
Emergency Location Service 16:40:15 jim
Web Blog_blogentry_190918_1 16:15:29 jim
18.09.2018
Primitive data type 09:28:48 jim
Mailbox 09:20:51 jim
DOLLAR 09:17:15 jim
Other Mailbox 09:13:43 jim
LDAP Syntax Description 09:08:35 jim
DESC 09:07:15 jim
1.3.6.1.4.1.1466.115.121.1.7 08:53:58 jim
Fixed-point 08:36:56 jim
NaN 08:19:22 jim
17.09.2018
SP 14:32:42 jim
ESC 14:31:36 jim
CAN 14:31:18 jim
NAK 14:30:45 jim
ACK 14:29:41 jim
NUL 14:27:18 jim
Null 14:27:03 jim
SCIM Attributes 14:25:39 jim
SAFE-INIT-CHAR 14:25:15 jim
SAFE-CHAR 14:24:47 jim
1.3.6.1.4.1.1466.101.120.5 14:24:24 jim
DSA-Specific Entry 14:23:32 jim
Certificate Algorithm ID 14:23:17 jim
Abstract Syntax Notation One 14:22:41 jim
2,147,483,647 14:22:15 jim
Acknowledgement 14:19:58 jim
FHIR Resource 13:52:14 jim
Cisco Cables 13:45:09 jim
NACK 13:37:04 jim
Negative-Acknowledge 13:36:45 jim
FF 13:05:41 jim
Form Feed 13:05:25 jim
EOL 13:01:14 jim
End Of Line 13:00:31 jim
LF 13:00:07 jim
Line Feed 12:59:47 jim
DEL 12:35:09 jim
Carriage Return 12:29:32 jim
Character 12:26:41 jim
Escape character 12:23:39 jim
SPACE 12:15:55 jim
CR 12:10:12 jim
RS 11:24:02 jim
Z-Wave 11:03:44 jim
Round-Trip Time 11:00:36 jim
TTL 10:47:59 jim
DNS Resource Records 10:47:23 jim
NSCD 10:45:48 jim
Microsoft Active Directory Anomalies 10:38:15 jim
Payment Token 10:35:23 jim
Morse Code 10:23:14 jim
Braille 10:22:49 jim
XML 10:22:23 jim
Extensible Markup Language 10:22:07 jim
JavaScript Object Notation 10:21:43 jim
JSON 10:21:07 jim
Decimal 10:20:07 jim
Base-10 10:19:38 jim
Hexadecimal 10:19:11 jim
Base-16 10:17:59 jim
Binary 10:17:45 jim
Data representation 10:15:31 jim
WILL_NOT_PERFORM 10:13:15 jim
Verifying Certificate Signatures 10:13:01 jim
TLS 1.3 Cipher Suites 10:12:39 jim
LocalEntryID 10:11:41 jim
Ldapsearch Networkaddress 10:10:39 jim
LDIF eDirectory Indexes 10:09:57 jim
ERROR_PASSWORD_RESTRICTION 10:09:05 jim
ERROR_PASSWORD_MUST_CHANGE 10:08:38 jim
Common Edirectory Bind Errors 10:07:11 jim
ATTRIBUTE ALREADY EXISTS (-615) 10:05:55 jim
2.16.840.1.113719.1.203.4.33 10:04:40 jim
DhcpRelayAgentInfo 10:04:21 jim
Hex 09:57:32 jim
Token68 09:56:37 jim
Base64 09:54:04 jim
Positional notation 09:49:25 jim
Base-2 09:45:25 jim
Bitmap 09:28:03 jim
16.09.2018
MITRE Corporation 20:44:30 jim
EVM 20:22:40 jim
Ethereum Virtual Machine 20:22:13 jim
15.09.2018
DNSCrypt 09:41:27 jim
DNS resolvers 09:40:13 jim
Recursive name server 09:31:01 jim
DoT 09:14:21 jim
DNS over TLS 09:13:58 jim
RFC 7858 09:09:30 jim
RFC 7626 08:46:08 jim
14.09.2018
Ground truth 08:04:57 jim
13.09.2018
OS2 15:34:15 jim
LAN Manager 15:28:43 jim
MS-CHAP 15:24:36 jim
LANMAN 15:23:29 jim
Indy 15:14:14 jim
NFC 15:11:26 jim
Peer 15:04:54 jim
Peer-to-peer 15:02:41 jim
Trustless 15:01:18 jim
JLINC 14:57:56 jim
Trusted Service Manager 14:52:05 jim
Juridical Person 14:40:47 jim
Society 14:38:07 jim
Community 14:37:25 jim
Community of Interest 14:37:04 jim
Canonical truth 14:31:56 jim
Truth 14:29:32 jim
Web Blog_blogentry_130918_1 14:27:21 jim
Distributed Consensus 13:42:25 jim
Gossip protocol 13:07:35 jim
Password Manager 12:49:51 jim
Web Blog_blogentry_180317_1 12:43:32 jim Password Vault ==> Credential Vault
BigQuery 12:30:25 jim
Geocast 12:28:27 jim
Ad Hoc network 12:26:20 jim
Cum hoc ergo propter hoc 12:19:56 jim
Ad Hoc 12:18:13 jim
Authoritative Entity 12:15:18 jim
UNIX History and More 11:57:36 jim
XEN 11:49:05 jim
Direct Anonymous Attestation 11:48:34 jim
Intel 11:47:44 jim
Intel Corporation 11:47:21 jim
Santa Cruz Operation 11:47:02 jim
EPID 11:41:38 jim
DAA 11:41:06 jim
RAND-Z 11:16:34 jim
BYOI 11:12:00 jim
Bring Your Own Identity 11:11:43 jim
Enhanced Privacy ID 11:05:25 jim
Attestation 10:58:04 jim
Credential Holder 10:08:32 jim
Web of Trust 09:30:05 jim
Decentralized Autonomous Corporation 09:15:56 jim
12.09.2018
Microsoft Active Directory Group Synchronization 08:52:30 jim
09.09.2018
SamAccountName 12:15:48 jim
08.09.2018
ISO 3166-2.US 12:00:35 jim
Geographic Names Information System Identifier 11:58:21 jim
Geographic Names Information System 11:57:44 jim
GNISID 11:51:52 jim
FIPS Numeric Code 11:50:36 jim
Arkansas 11:36:01 jim
Arizona 11:35:36 jim
Alaska 11:35:19 jim
Alabama 11:34:55 jim
US-VI 11:33:05 jim
US-PR 11:32:47 jim
US-MP 11:32:31 jim
US-GU 11:32:11 jim
US-AS 11:31:54 jim
US-WY 11:31:29 jim
US-WI 11:31:10 jim
US-WV 11:30:53 jim
US-WA 11:30:37 jim
US-VA 11:30:21 jim
US-VT 11:30:07 jim
US-UT 11:29:53 jim
US-TX 11:29:35 jim
US-TN 11:29:12 jim
US-SD 11:28:56 jim
US-SC 11:28:40 jim
US-RI 11:10:07 jim
US-PA 11:09:49 jim
US-OR 11:09:35 jim
US-OK 11:09:22 jim
US-ND 11:08:04 jim
US-NC 11:07:46 jim
US-NY 11:07:28 jim
US-NM 11:07:04 jim
US-NJ 11:06:48 jim
US-NH 11:06:32 jim
US-NV 11:06:14 jim
US-NE 11:05:50 jim
US-MT 11:05:32 jim
US-MO 11:02:34 jim
US-MS 11:02:19 jim
US-MN 11:02:00 jim
US-MI 11:01:28 jim
US-MA 11:01:09 jim
US-MD 11:00:47 jim
US-ME 11:00:33 jim
US-LA 10:59:55 jim
US-AR 10:59:36 jim
Open Banking OBIE 10:58:41 jim
Open Banking 10:55:42 jim
US-KY 10:38:16 jim
US-KS 10:37:52 jim
US-IA 10:37:32 jim
US-IN 10:37:11 jim
US-IL 10:36:43 jim
US-ID 10:36:29 jim
US-HI