jspωiki
RecentChanges

These are the changes made to these pages during the last 30 days. Check the FullRecentChanges for a complete list of all changed pages.

This server lives on Coordinated Universal Time and the time that I use is 20:31 on 2018-10-17.

Category#

JSPWiki-2.10.3

17.10.2018
Multiple-Input and Multiple-Output 13:41:49 jim
MIMO 13:41:25 jim
3rd Generation Partnership Project 13:40:35 jim
Web Blog_blogentry_161018_1 08:30:00 jim
16.10.2018
DID Service Endpoint 17:21:43 jim
DID Document 17:15:33 jim
DID path 17:12:41 jim
DID Fragment 17:11:07 jim
DID reference 17:07:27 jim
DID method specification 17:02:20 jim
DID Operations 17:00:57 jim
Decentralized Identifier 16:58:15 jim
Sovrin Connector 16:39:43 jim
Key pair 16:13:13 jim
Hyperledger Indy 15:36:04 jim
DIGIT 15:18:53 jim
ALPHA 15:16:20 jim
National Motor Vehicle Title Information System 14:16:38 jim
VIN 14:15:46 jim
NMVTIS 14:15:19 jim
AAMVA 14:09:49 jim
American Association of Motor Vehicle Administrators 13:58:58 jim
State Pointer Exchange Services 13:50:19 jim
SPEXS 13:34:44 jim
Mobile Device 10:55:38 jim
Subscriber Identification Module 10:54:34 jim
BCCH 10:50:31 jim
ARFCN 10:50:00 jim
Absolute Radio-Frequency Channel Numbers 10:49:31 jim
Broadcast Control CHannel 10:47:34 jim
LAI 10:24:32 jim
Location Area Identity 10:24:09 jim
Mobile subscriber 10:22:04 jim
Integrated Circuit Card Identifier 10:06:45 jim
International Mobile Subscriber Identity 09:50:10 jim
Temporary Mobile Subscriber Identity 09:40:53 jim
Mobile Subscriber Identification Number 08:57:37 jim
International Mobile Equipment Identity 08:40:41 jim
15.10.2018
Threat Model 18:09:37 jim
Threat landscape 18:07:29 jim
The Seven Laws Of Identity 17:53:32 jim
ISO 29100 17:50:21 jim
Principle of least privilege 17:37:22 jim
OAuth 2.0 NOT an Authentication protocol 17:25:24 jim
UF_ACCOUNTDISABLE 17:15:24 jim
USER_ACCOUNT_DISABLED 17:11:12 jim
Common Active Directory Bind Errors 16:45:34 jim
Microsoft Active Directory Extensible Match Rules 15:46:48 jim
Holder 08:53:31 jim
Law of agency 08:50:16 jim
Possession Factor 08:34:24 jim
W3C Decentralized Identifiers 08:32:54 jim
14.10.2018
RFC 8485 17:25:36 jim
Vectors of Trust 17:25:04 jim
Create Read Update Delete 13:18:50 jim
Decentralized Identity 12:47:56 jim
Know Your Customer 12:46:01 jim
Verifiable Claims 12:11:11 jim
Data Provenance 12:07:52 jim
Verifiable Claims/vc-ecosystem-overview.png 11:57:44 jim
Entity 11:43:06 jim
Subject 11:39:03 jim
Claim 11:37:59 jim
Inspector-verifier 11:34:51 jim
Issuer 11:32:35 jim
Key Rotation 11:18:26 jim
Key Management 11:10:18 jim
CKMS 11:08:35 jim
KMS 11:07:50 jim
Key Management Service 11:07:23 jim
DID record 10:55:43 jim
DID Context 10:40:07 jim
DID Subject 10:21:23 jim
13.10.2018
Attack Surface 18:33:28 jim
API Development 10:40:00 jim
Bad Actor 10:36:38 jim
Attack vectors 10:31:32 jim
12.10.2018
OpenID Connect Federation 08:18:16 jim
11.10.2018
Social Identity 17:27:13 jim
Identity Relationship Framework 17:24:26 jim
Government Identity 17:23:37 jim
Digital Identity 17:18:40 jim
User-centric Identity 17:01:33 jim
Responsive Organizations 11:41:15 jim
10.10.2018
Product 17:04:51 jim
Service 17:04:10 jim
ServiceOutput 17:03:16 jim
Passport 17:01:00 jim
Profile 16:57:36 jim
PostalCode 16:55:32 jim
Phone Number 16:54:07 jim
Blinding Identity Taxonomy 16:53:33 jim
Address 16:52:32 jim
Schema.org 16:50:25 jim
Name 16:40:41 jim
Organization 12:42:17 jim
Place 12:38:00 jim
Thing 12:37:04 jim
Yandex 12:21:19 jim
Link Relation Types 12:16:09 jim
StreetAddress 12:07:03 jim
Street 12:05:23 jim
2.5.4.9 11:59:25 jim
Data Protection 11:37:14 jim
General Data Protection Regulation 11:28:52 jim
Personal data 11:26:58 jim
Taxonomy 11:12:58 jim
AtMention 11:11:09 jim
Folksonomy 11:09:57 jim
Hashtag 11:08:32 jim
User-generated content 11:03:48 jim
Bug 09:58:55 jim
Data loss 09:57:42 jim
Data Breach 09:54:51 jim
Vulnerability 09:52:52 jim
Implementation Vulnerability 09:44:24 jim
Breach 09:42:09 jim
09.10.2018
OAuth 2.0 Security Best Current Practice 17:12:02 jim
Jim Willeke Resume 16:14:54 jim
Cryptocurrency wallet 15:25:08 jim
Custodial Wallet 15:23:11 jim
RFC 8472 14:26:04 jim
RFC 8473 14:24:39 jim
RFC 8471 14:23:51 jim
Token Binding Protocol Negotiation 14:22:32 jim
Token Binding Protocol 14:21:40 jim
Token Binding over HTTP 14:21:09 jim
Bitcoin address 12:35:21 jim
Web Blog_blogentry_091018_1 12:29:52 jim
Data Privacy 12:29:00 jim
Privacy Paradox 12:28:36 jim
Right of access 11:49:14 jim
Acceptable Use 11:26:10 jim
Unexpected benefit 10:57:56 jim
Data portability 10:31:10 jim
Electronic Health 09:17:27 jim
EHealth 09:05:24 jim
08.10.2018
QUANTUM 11:24:36 jim
STRAITBIZARRE 11:21:01 jim
DROPOUTJEEP 11:18:37 jim
Web Blog_blogentry_081018_1 11:14:07 jim
Optic Nerve 11:13:33 jim
National Identification Number 11:03:10 jim
Integrated Automated Fingerprint Identification System 11:02:15 jim
Identity Verification Service 11:00:50 jim
United States Intelligence Community 11:00:22 jim
United States Census Bureau 10:59:56 jim
Traveler Verification Service 10:57:40 jim
CountryOfResidence 10:56:58 jim
1.3.6.1.4.1.8876.2.1.30 10:56:29 jim
Nonimmigrant Information System 10:50:40 jim
Combined DNA Index System 10:50:06 jim
State Identification Number 10:49:29 jim
REAL ID 10:48:13 jim
Group of 20 10:42:36 jim
Bank Secrecy Act 10:42:07 jim
Terrorist Screening Database 10:40:36 jim
Repository for Individuals of Special Concern 10:40:21 jim
OAKSTAR 10:39:30 jim
STORMBREW 10:39:15 jim
BLARNEY 10:38:56 jim
National Crime Information Center 10:37:43 jim
TOYGRIPPE 10:36:28 jim
Unified Passenger Module 10:35:18 jim
United States Visitor and Immigrant Status Indicator 10:35:04 jim
Intelligence Agencies 10:34:52 jim
Border Crossing Information 10:34:12 jim
Automated Targeting System 10:33:32 jim
Automated Biometric Identification System 10:33:10 jim
Advanced Fingerprint Identification Technology 10:30:24 jim
Advance Passenger Information System 10:30:07 jim
KEYCARD 10:29:45 jim
HAMMERSTEIN 10:28:48 jim
Government Data Store 10:28:31 jim
Bit 10:26:55 jim
APEX 10:12:30 jim
BOUNDLESSINFORMANT 10:12:13 jim
PRISM 10:12:00 jim
ECHELON 10:11:14 jim
XKEYSCORE 10:11:01 jim
TURMOIL 10:10:43 jim
TURBULENCE 10:10:21 jim
SIGINT 10:09:50 jim
Spying 10:05:57 jim
National Security Agency 10:05:34 jim
FAIRVIEW 10:04:59 jim
Surveillance 09:49:09 jim
Implied consent 09:41:55 jim
Consent 09:38:25 jim
Express Consent 09:35:42 jim
Explicit consent 09:35:19 jim Express consent ==> Explicit consent
Informed Consent 09:35:19 jim Express consent ==> Explicit consent
Government Surveillance 09:18:33 jim
Upstream Surveillance 09:11:32 jim
LPR 08:52:17 jim
ALPR 08:51:52 jim
Automated License Plate Reader 08:51:25 jim
License Plate 08:49:12 jim
CarLicense 08:45:15 jim
07.10.2018
Web Blog_blogentry_071018_1 11:50:51 jim
UPort 11:18:39 jim
ERC1056 11:12:07 jim
Lightweight Ethereum Identity 11:11:45 jim
Issued_token_type 10:43:20 jim
Want_composite 10:40:30 jim
Subject_token_type 10:38:18 jim
Actor_token_type 10:37:36 jim
Actor_token 10:36:24 jim
Subject_token 10:34:00 jim
Requested_token_type 10:32:50 jim
Token Type Identifiers 10:30:40 jim
OAuth 2.0 Token Exchange 10:21:29 jim
OAuth 2.0 Token Exchange Request 10:20:42 jim
Token-exchange 10:14:01 jim
Cool Identity Token Uses 10:08:37 jim
Delegation vs Impersonation 10:03:14 jim
Impersonation 09:41:05 jim
May_act (May Act For) Claim 09:33:00 jim
Act (Actor) Claim 09:17:31 jim
06.10.2018
Multi-Source Identity 10:48:35 jim
Self-Sovereign Identity 10:47:11 jim
NIS 10:11:51 jim
Discovery Mechanism 10:06:40 jim
NetBIOS Name Service 10:01:16 jim
Domain Name System 09:58:46 jim
Windows Internet Name Service 09:54:40 jim
Name Service 09:51:59 jim
Namespace 09:51:09 jim
RFC 1002 09:49:54 jim
RFC 1001 09:48:23 jim
DIF 09:24:10 jim
Decentralized Identity Foundation 09:23:51 jim
Domain of OneS Own 09:06:17 jim
Sovereign-source Identity 08:58:44 jim
Independent Identity 08:54:36 jim
05.10.2018
ADSTYPE_DN_STRING 11:08:34 jim
DN String 11:06:23 jim
Microsoft Active Directory Syntax 11:05:50 jim
Object(DS-DN) 10:57:22 jim
2.5.5.1 10:55:46 jim
Access Point 10:51:29 jim
1.3.6.1.4.1.1466.115.121.1.2 10:51:02 jim
Object(Access-Point) 10:42:47 jim
2.5.5.14 10:39:59 jim
ADSTYPE_DN_WITH_STRING 10:33:04 jim
DNWithString 10:32:21 jim
DN-String 10:32:03 jim
ADSTYPE_DN_WITH_BINARY 10:26:12 jim
DNWithOctetString 10:25:11 jim
DNWithBinary 10:24:11 jim
DN-Binary 10:24:04 jim
DN Syntax 10:14:03 jim
Draft-armijo-ldap-syntax-00 09:53:41 jim
LDAP_SERVER_EXTENDED_DN_OID 09:31:20 jim
1.2.840.113556.1.4.529 09:26:06 jim
Security Descriptor Description Language 09:24:12 jim
2.5.5.16 09:11:44 jim
2.5.5.9 09:10:28 jim
LDAPSyntaxes 09:05:58 jim
AttributeSchema 09:04:54 jim
MapiID 08:56:55 jim
IsEphemeral 08:44:10 jim
ClassDisplayName 08:35:27 jim
IsDefunct 08:31:37 jim
AttributeSecurityGUID 08:24:48 jim
ExtendedCharsAllowed 08:16:47 jim
04.10.2018
Microsoft Active Directory Attributes 21:08:14 jim
1.2.840.113556.1.4.914 21:02:52 jim
AllowedAttributesEffective 21:02:21 jim
FLAG_DOMAIN_DISALLOW_RENAME 20:58:34 jim
LegacyExchangeDN 20:52:16 jim
Assistant 20:51:05 jim
DirectReports 20:49:52 jim
Access Control Entry Type 20:36:05 jim
Discretionary Access Control List 20:34:07 jim
Access Control List 20:31:42 jim
Access Control Entry 20:24:53 jim
RSVP 20:15:11 jim Resource Reservation Protocol ==> Resource ReSerVation Protocol
Resource ReSerVation Protocol 20:15:11 jim Resource Reservation Protocol ==> Resource ReSerVation Protocol
RFC 2205 20:14:59 jim
QoS 20:13:42 jim
Quality of Service 20:13:27 jim
AccountExpires 20:02:01 jim
AttributeSyntax 19:55:38 jim
Access Token 12:31:37 jim
Access Token Validation 11:42:33 jim
Data Processor 10:09:55 jim
Data Controller 10:02:29 jim
Data curation 09:56:37 jim
Data Ownership 09:48:00 jim
Copyright 09:15:14 jim
Open data 09:09:44 jim
Linked Data 09:06:43 jim
Inrupt, Inc 08:59:04 jim
Solid 08:57:06 jim
WebID 08:39:25 jim SOLID ==> Solid
GS1 Country Code 08:12:48 jim
Iran 08:10:19 jim
03.10.2018
Country Code 21:27:43 jim
FOXACID 16:47:15 jim
TURBINE 16:11:21 jim QUANTUMTHEORY ==> QUANTUM
RAMPART-A 16:05:47 jim
Year 1971 15:58:47 jim
PRESSUREWAVE 15:57:56 jim
NZL 15:55:20 jim
NZ 15:55:04 jim
New Zealand 15:53:22 jim
Australia 15:51:45 jim
NSA Suite A Cryptography 15:46:57 jim
Menezes-Qu-Vanstone 15:32:45 jim
RFC 6379 15:32:02 jim
RFC 6239 15:31:31 jim
RFC 6460 15:31:11 jim
RFC 5759 15:31:07 jim
NSA Suite B Cryptography 15:24:23 jim
FIPS Based Cipher Suites 15:15:44 jim
N4u.server.fips_tls 15:09:01 jim
EDirectory TLS 15:06:15 jim
EDirectory 14:41:12 jim
NumericStringMatch 11:55:32 jim
KeywordMatch 11:48:05 jim
MatchingRule 11:37:13 jim
RFC 3641 11:29:49 jim
GSER 11:29:15 jim
Generic String Encoding Rules 11:28:55 jim
RdnMatch 11:27:03 jim
Component Matching Rules 11:10:52 jim
IntegerFirstComponentMatch 10:44:42 jim
DirectoryStringFirstComponentMatch 10:33:15 jim
CaseIgnoreOrderingMatch 10:26:49 jim
CaseIgnoreListSubstringsMatch 10:20:18 jim
EQUALITY 10:15:07 jim
MatchingRuleUse 10:10:36 jim
Greater-Or-Equal SearchFilter 10:03:32 jim
AND SearchFilter 10:02:02 jim
EqualityMatch 09:59:13 jim
Substrings 09:55:07 jim
Schema Partition 09:42:41 jim
LDAP Filter Choices 09:37:57 jim
LDAP Three-valued logic 09:32:52 jim
SearchResultEntry 09:28:12 jim
Search Responses 09:26:08 jim
Web Blog_blogentry_031018_1 09:10:37 jim
Ambiguous Name Resolution 09:05:21 jim
ANR attribute set 08:49:22 jim
02.10.2018
ANR 21:18:16 jim
UsnChanged 18:28:14 jim
1.2.840.113556.1.2.120 18:25:10 jim
FLAG_ATTR_IS_OPERATIONAL 18:22:24 jim
X-SYSTEMFLAGS 18:21:22 jim
UTCTime 18:11:18 jim
USN 18:11:07 jim
Update Sequence Number 18:10:49 jim
Web Blog_blogentry_021018_1 18:04:47 jim
Microsoft TIME 17:51:23 jim
X-NDS_SYNTAX 17:29:49 jim
IA5String 17:25:46 jim
LDAP Schema 17:06:54 jim
Schema Extensions 14:26:01 jim
EDirectory Schema Reference 14:10:34 jim
LDAP Schema Element Type 14:01:51 jim
Write-managed 13:53:19 jim Novell Schema Documentation ==> EDirectory Schema Reference
Novell Developer Kit 13:52:01 jim
NDK 13:46:41 jim
Resource 13:46:03 jim
2.16.840.1.113719.1.1.6.1.21 13:42:48 jim
HostResourceName 13:41:58 jim
Smssmdrclass 13:36:11 jim
Status 13:31:15 jim status ==> Status
CertificateRevocationList 13:30:43 jim certificateRevocationList ==> CertificateRevocationList
CertificateRevocation 13:29:42 jim certificateRevocation ==> CertificateRevocation
MailHost 13:24:26 jim mailHost ==> MailHost
MailAlternateAddress 13:23:49 jim mailAlternateAddress ==> MailAlternateAddress
MailForwardingAddress 13:23:05 jim mailForwardingAddress ==> MailForwardingAddress
LDAPSchemasForNISInLDAP 13:22:31 jim
NSCP 13:20:53 jim
2.16.840.1.113730.3.1.3 13:16:27 jim
EmployeeNumber 13:16:06 jim
LDAP Schema for NDS 13:04:06 jim
1.3.6.1.1.1.2.4 13:01:55 jim
IpProtocol 13:01:31 jim
IpProtocolNumber 12:57:00 jim ipProtocolNumber ==> IpProtocolNumber
AutomountMapName 12:56:16 jim automountMapName ==> AutomountMapName
Extended Flags 12:55:26 jim
LDAP Schema Element Extensions 12:52:49 jim
DS_NONREMOVABLE_ATTR 12:41:29 jim
X-NDS_NON_REMOVABLE 12:40:44 jim
X-NDS_NONREMOVABLE 12:40:30 jim
X-NDS_NOT_CONTAINER 12:37:57 jim
X-NDS_NAME 12:36:49 jim
X-NDS_CONTAINMENT 12:35:47 jim
X-NDS_NAMING 12:34:31 jim
Draft-sermersheim-nds-ldap-schema 12:07:47 jim
GS1 Company Prefix 10:00:23 jim
Global Trade Item Number 09:50:45 jim
GS1 Product Code 09:47:58 jim
GS1 Manufacturer Code 09:45:01 jim Manufacturer Code ==> GS1 Manufacturer Code
GTIN 09:30:14 jim
United Nations Standard Products and Services Code 09:28:13 jim
UNSPSC 09:10:06 jim
GS1 09:02:13 jim
Industry 08:59:58 jim
SWIFT code 08:58:27 jim
Common Vulnerability Scoring System 08:54:14 jim
ISO 10646 08:53:30 jim
Car Connectivity Consortium 08:52:53 jim
PCI Data Security Standard v3.1 08:51:48 jim
DSL 08:50:23 jim
Export Control Classification Number 08:48:19 jim
Commerce Control list 08:46:50 jim
NASD 08:42:37 jim
Financial Industry Regulatory Authority Inc 08:41:56 jim
Industry Classification 08:37:26 jim
Major Industry Identifier 08:29:02 jim
Payment Card Industry 08:27:17 jim
LOB 08:22:23 jim
Line Of Business 08:21:56 jim
Merchant Category Code 08:18:13 jim
Merchant 07:47:05 jim
01.10.2018
AVS 18:31:29 jim
Address Verification System 18:30:28 jim
Card Verification Method 18:27:59 jim
Merchant Service Provider 18:24:40 jim
Card Issuer 18:23:08 jim
Interchange Fee 18:21:22 jim
Card Processor 18:12:30 jim
Payment Network 18:03:26 jim
MSP 18:00:17 jim
OAuth Parameters Registry 09:23:44 jim
Vector of Trust Request 09:23:16 jim
Vtr 09:12:46 jim
Upgraded 09:08:53 jim
Permission ticket 09:03:12 jim
Ticket 09:01:09 jim
Claim_token 08:56:39 jim
Persisted Claims Token 08:53:17 jim
PCT 08:50:33 jim
User-Managed Access Work Group 08:38:31 jim
UMA 2.0 Grant for OAuth 2.0 08:35:29 jim
Claims_locales 08:21:47 jim
Ui_locales 08:14:53 jim
Language-Tag 08:12:44 jim
BCP 47 08:07:47 jim
Tel 08:03:56 jim
RFC 3966 08:02:55 jim
RFC 5341 08:02:24 jim
OpenID Connect Standard Claims 07:57:53 jim
30.09.2018
Web Blog_blogentry_300918_1 11:38:57 jim
Tink 11:31:27 jim
BoringSSL 11:25:19 jim
The Onion Router 11:09:35 jim
Quick UDP Internet Connections 10:58:13 jim
CurveCP 10:55:29 jim
CurveZMQ 10:55:10 jim
DNSCurve 10:49:21 jim
Perfect Forward Secrecy 10:45:25 jim
Forward Secrecy 10:43:18 jim
X25519 10:07:11 jim
Plenum Byzantine Fault Tolerant Protocol 09:25:08 jim
29.09.2018
Modernity 12:21:22 jim
SRI 12:18:53 jim
SRI International 12:18:34 jim
ARPANET 12:17:48 jim
NPL Data Communications Network 12:16:13 jim
Metrology 12:13:55 jim
National Physical Laboratory 12:13:02 jim
Packet switching 12:11:04 jim
Year 1964 11:59:34 jim
Defense Advanced Research Projects Agency 11:53:08 jim
ARPA 11:51:21 jim
Advanced Research Projects Agency 11:50:27 jim
RAND Corporation 11:30:48 jim
Web Blog_blogentry_290918_1 11:18:55 jim
DunbarS Numbers 11:10:28 jim
John Doerr 10:03:19 jim
Web Blog_blogentry_030618_1 10:00:47 jim
Objectives and Key Results 09:59:46 jim
Book 09:58:39 jim
Single Sign-On 09:32:31 jim
WEB Single Sign-On 09:27:19 jim
GCP Virtual Private Cloud 09:25:26 jim
Local device 09:24:00 jim
On-premise 09:23:34 jim
Cloud Access Security Broker 09:21:40 jim
Identity Broker 09:19:33 jim
28.09.2018
Client Login Extension 13:16:01 jim
NMAS Result Codes 13:14:49 jim
SASDFM 13:12:27 jim
SASLoginSequence 11:35:43 jim sASLoginSequence ==> SASLoginSequence
NMAS_E_INVALID_SPM_REQUEST 11:27:53 jim
Dump Password Information Tool-Trouble Shooting 11:27:19 jim
NMAS_E_ACCESS_NOT_ALLOWED 11:22:55 jim
DSE_NMAS_LOG_FINISH_LOGIN_STATUS 11:19:50 jim
NMAS_E_LOGIN_FAILED 11:17:43 jim NMAS -1642 ==> NMAS_E_LOGIN_FAILED
NMAS 11:16:32 jim
SSSD 10:27:16 jim
Cryptographically secure pseudorandom number generator 10:24:03 jim
GCP Zonal 10:22:14 jim
Server_error 10:21:03 jim
Action 10:18:41 jim
XDAS Action 10:14:53 jim
Unfortunate event 10:11:43 jim
Unintended consequence 10:08:49 jim
Perverse result 10:01:37 jim
SSL-TLS Interception 09:57:11 jim
CTAP2 09:48:40 jim
Client To Authenticator Protocol 09:39:36 jim
U2F 09:33:27 jim
27.09.2018
LDAP_MATCHING_RULE_IN_CHAIN 18:15:20 jim
1.2.840.113556.1.4.1941 18:06:31 jim
Filtering for Bit Fields 18:00:40 jim
LDAP_MATCHING_RULE_BIT_AND 17:56:58 jim
1.2.840.113556.1.4.803 17:56:44 jim
LDAP_MATCHING_RULE_BIT_OR 17:55:57 jim
1.2.840.113556.1.4.804 17:55:40 jim
Bitmask 17:42:13 jim
Filtered Attribute Set 17:12:29 jim
Application Directory Partitions 16:39:25 jim
Directory Partition Hierarchy 16:25:00 jim
Domain Directory Partition 16:20:17 jim
Schema Directory Partition 16:16:50 jim
Configuration Directory Partition 16:15:27 jim
Directory Partition Subtrees 16:11:02 jim
NamingContext 15:44:21 jim
Schema Master FSMO Role 15:26:15 jim
PDC 15:16:07 jim
PDC Emulator FSMO Role 15:14:58 jim
Security Identifier 15:11:17 jim
ObjectSID 15:07:41 jim
RID Master FSMO Role 15:04:54 jim
Domain Naming Master FSMO Role 14:59:05 jim
Infrastructure Master FSMO Role 14:49:21 jim
BackLink 14:32:53 jim
Forward link 14:30:47 jim
Linked Attribute 14:28:10 jim
2.5.5.7 14:23:55 jim
ISIN 14:17:55 jim
ISO 6166 14:17:20 jim
International Securities Identifying Number 14:15:14 jim
ISO 3901 14:11:27 jim
International Standard Recording Code 14:10:20 jim
ISRC 14:08:31 jim
US 13:45:15 jim
UM 13:42:54 jim
Co 13:41:16 jim
0.9.2342.19200300.100.1.48 13:37:06 jim
BuildingName 13:36:50 jim
0.9.2342.19200300.100.1.38 13:31:27 jim
AssociatedName 13:27:57 jim
PlaceOfBirth 13:22:04 jim
1.2.840.113556.1.2.50 13:14:10 jim
LinkID 13:13:51 jim
MsDS-User-Account-Control-Computed 12:52:01 jim
Constructed Attribute 12:51:22 jim
User-Account-Control Attribute Values 12:19:43 jim
ACCOUNTDISABLE 12:16:08 jim
SCRIPT 12:13:48 jim
USER_USE_AES_KEYS 12:08:19 jim
Cipher Suite 11:46:45 jim
MsDS-SupportedEncryptionTypes 11:45:27 jim
NO-USER-MODIFICATION 11:19:53 jim
Messaging Application Programming Interface 11:18:32 jim
MAPI 11:10:00 jim
2.5.5.10 11:02:43 jim
1.2.840.113556.1.2.218 10:59:21 jim
OMObjectClass 10:58:52 jim
RFC 1278 10:49:33 jim
Presentation Address 10:48:34 jim
1.2.840.113556.1.1.1.12 10:46:48 jim
Replica Link 10:13:50 jim
PresentationAddress 09:25:21 jim
1.3.6.1.4.1.1466.115.121.1.38 09:16:05 jim
1.2.840.113556.1.2.49 08:35:31 jim
OMSyntax 08:24:26 jim
LDAPDisplayName 08:21:17 jim
26.09.2018
IsMemberOfPartialAttributeSet 19:18:06 jim
SchemaIDGUID 19:12:25 jim
AttributeID 19:10:31 jim
IsSingleValued 19:09:43 jim
RangeUpper 19:08:35 jim
RangeLower 19:07:37 jim
LOWERBOUND 19:07:00 jim
SchemaFlagsEx 19:00:30 jim
SystemOnly 18:55:58 jim
MsDS-PhoneticDepartment 18:50:08 jim
FRODCFilteredAttribute 18:49:48 jim
Active Directory Schema Attributes 18:27:51 jim
MsDS-PhoneticCompanyName 18:25:28 jim
25.09.2018
Integrated Digital Enhanced Network 14:45:37 jim
IDEN 14:43:53 jim
MEID 14:32:22 jim
SNR 14:31:28 jim
SVN 14:29:09 jim
Software Version Number 14:28:52 jim
IMEI Software Version 14:22:20 jim
Type Allocation Code 14:20:12 jim
Digit 14:19:16 jim
Final Assembly Code 14:17:25 jim
FAC 14:10:34 jim
Reporting Body Identifier 14:03:42 jim
British Approvals Board for Telecommunications 13:52:52 jim
BABT 13:52:29 jim
SerialNumber 13:44:33 jim
Wiki Link Syntax 13:31:18 jim
L10n 13:29:01 jim
I18n 13:28:35 jim
Internationalization and Localization 11:24:26 jim
Preparation, Enforcement, and Comparison of Internationalized Strings 11:19:15 jim
RFC 3454 11:17:20 jim Internationalization ==> Internationalization and Localization
RFC 7564 11:04:28 jim
RFC 8264 11:04:01 jim
PRECIS 11:00:33 jim
RFC 2377 10:49:26 jim
24.09.2018
Netflix 18:36:31 jim
Join AD Domain 18:34:34 jim
Global Catalog 18:31:19 jim
AD DOMAIN 18:29:34 jim
Bounded Context 18:27:10 jim
Domain 18:25:51 jim
Policy Core Information Model 18:16:55 jim
Common Open Policy Service 18:15:21 jim
RFC 3060 18:06:15 jim
RFC 3460 18:05:01 jim
PCIM 18:03:05 jim
Policy Core Extension LDAP Schema 17:56:24 jim
PCELS 17:53:58 jim
HomePhone 17:49:52 jim
1.3.6.1.4.1.453.7.2.8 17:42:32 jim
AssociatedInternetGateway 17:42:14 jim
0.9.2342.19200300.100.1.37 17:32:21 jim
Name Registration Scheme 17:31:38 jim
NRS 17:28:46 jim
AssociatedDomain 17:26:11 jim
0.9.2342.19200300.100.1.26 17:21:01 jim
ARecord 17:20:19 jim
AliasedEntryName 17:13:58 jim
LDAP Object Identifier Descriptors 17:12:50 jim
Draft-wahl-ldap-adminaddr-05 17:08:23 jim
2.5.13.21 17:02:14 jim
TelephoneNumberSubstringsMatch 17:00:30 jim
LDAP Overview 16:45:48 jim
Access Log 16:41:59 jim
LDAP Protocol Exchanges 16:40:32 jim
LDAP Message 16:37:33 jim
PUM 16:32:34 jim
Glossary Of LDAP And Directory Terminology 16:31:56 jim
Matched DN 16:31:12 jim DefinitionMatchedDN ==> Matched DN
LDAP Result 16:30:49 jim
DcObject 09:24:38 jim
Dc 09:20:05 jim
2.16.840.1.113719.1.48.4.1.18 09:13:51 jim
NdspkiIssueTime 09:13:29 jim
2.5.5.11 09:09:15 jim
1.3.6.1.4.1.1466.115.121.1.53 09:08:44 jim
ADSTYPE_UTC_TIME 09:04:45 jim
GeneralizedTime 08:50:39 jim
DefinitionGeneralizedTime 08:45:03 jim
Time synchronization 08:36:22 jim
Windows Time service 08:35:54 jim
Time sync 08:33:45 jim
Synchronization 08:29:55 jim
W32Time 08:24:40 jim
RFC 5905 08:11:32 jim
Network Time Protocol 08:10:41 jim
Simple Network Time Protocol 08:09:44 jim
SNTP 08:09:06 jim
Why is Time Important 08:02:38 jim
Verify Time is Synchronized 07:59:21 jim
23.09.2018
Cluster Orchestration System 20:33:26 jim
State of the Internet-Security Report 19:50:28 jim
Credential Leaked Databases 09:07:05 jim
Credential stuffing 09:06:13 jim
Akamai 09:03:27 jim
VNM 09:01:33 jim
VN 09:01:13 jim
Vietnam 09:00:43 jim
RFC 1267 08:53:17 jim
Border Gateway Protocol 08:52:39 jim
BGP 08:51:37 jim
AS 08:51:03 jim
Autonomous System 08:49:54 jim Autonomous system ==> Autonomous System
Autonomous System Number 08:49:54 jim Autonomous system ==> Autonomous System
RFC 6793 08:49:33 jim
ASN 08:47:09 jim
Web Blog_blogentry_230918_1 08:44:07 jim
Bot 08:38:13 jim
Botnet 08:31:11 jim
22.09.2018
ERROR_DS_NON_BASE_SEARCH 22:03:18 jim
BaseObject 21:53:22 jim
X-SEARCH-FLAGS 10:52:37 jim
FAS 10:42:56 jim
Read-Only Domain Controller 10:30:35 jim
LDAP Extensions and Controls Listing 10:29:14 jim
Active Directory Functional Levels 10:28:10 jim
Forest functional levels 10:26:50 jim
RODC 10:26:00 jim
PARTIAL_SECRETS_ACCOUNT 10:25:04 jim
Windows Server 2003 R2 09:27:02 jim
Code 09:24:44 jim
FPARTITIONSECRET 09:20:33 jim
FBASEONLY 09:20:20 jim
FEXTENDEDLINKTRACKING 09:20:11 jim
FNEVERVALUEAUDIT 09:19:49 jim
FCONFIDENTIAL 09:19:42 jim
FSUBTREEATTINDEX 09:19:33 jim
FTUPLEINDEX 09:19:14 jim
FCOPY 09:19:04 jim
FPRESERVEONDELETE 09:18:56 jim
FPDNTATTINDEX 09:18:47 jim
FATTINDEX 09:18:25 jim
SystemFlags 09:17:26 jim
ProxyAddresses 09:14:15 jim
FANR 09:12:03 jim
LDAP Indexes 09:06:19 jim
Edirectory Indexes 09:05:32 jim
SubstringIndex 09:04:55 jim DefinitionSubstringIndex ==> SubstringIndex
PhysicalDeliveryOfficeName 08:42:40 jim
2.5.4.19 08:41:57 jim
MsDS-AdditionalSamAccountName 08:32:30 jim
SearchFlags 08:03:37 jim
Web Blog_blogentry_220918_1 07:55:14 jim
NAME 07:51:15 jim
1.2.840.113556.1.4.1 07:46:50 jim
20.09.2018
Web Blog_blogentry_200918_1 17:57:53 jim
Business to Business 17:54:52 jim
Financial-grade API 15:39:01 jim
Authorization Code 15:31:48 jim
Authorization Code Flow 15:29:47 jim
Refresh Token 15:27:53 jim
Sender Constrained Token 15:20:31 jim
Token 15:17:50 jim
Contractor 11:30:35 jim
Vender 11:29:46 jim
Dat Protocol 09:53:09 jim
Decentralized system 09:33:15 jim
Member 09:16:18 jim
Distributed Web 09:04:17 jim
EE 08:54:37 jim
Estonia 08:52:38 jim
Distributed Data Store 08:34:30 jim
19.09.2018
MGT 18:28:06 jim
E.214 18:25:50 jim
Signalling Connection Control Part 18:24:33 jim
Mobile Global Title 18:23:42 jim
Mobile Network Code 18:08:45 jim
National Destination Code 18:04:40 jim
Mobile Country Code 18:00:30 jim
Telephone Numbering Plan 17:45:42 jim
North American Numbering Plan 17:39:47 jim
Easily Recognizable Code 17:31:32 jim
ERC 17:31:05 jim
N11 17:27:45 jim
E.164 17:24:02 jim
Number Plan Area 17:21:52 jim
NPA 17:17:14 jim
9-1-1 16:59:03 jim
ELS 16:58:06 jim
Public Safety Answering Point 16:57:27 jim
PSAP 16:56:56 jim
Next Generation 9-1-1 16:56:34 jim
United States Department of Transportation 16:56:09 jim
USDOT 16:55:28 jim
Emergency Location Service 16:40:15 jim
Web Blog_blogentry_190918_1 16:15:29 jim
18.09.2018
Primitive data type 09:28:48 jim
Integer 09:25:33 jim
Number 09:24:39 jim
Mailbox 09:20:51 jim
DOLLAR 09:17:15 jim
Other Mailbox 09:13:43 jim
LDAP Syntax Description 09:08:35 jim
DESC 09:07:15 jim
Boolean 08:59:25 jim
1.3.6.1.4.1.1466.115.121.1.7 08:53:58 jim
Fixed-point 08:36:56 jim
NaN 08:19:22 jim
IEEE 754 08:18:15 jim
Floating-point 08:14:59 jim