jspωiki
RecentChanges

These are the changes made to these pages during the last 30 days. Check the FullRecentChanges for a complete list of all changed pages.

This server lives on Coordinated Universal Time and the time that I use is 10:51 on 2018-08-20.

Category#

JSPWiki-2.10.3

20.08.2018
Distinguished Names 10:46:34 jim
Reliable protocol 09:37:19 jim
RFC 1213 09:35:39 jim
RFC 1155 09:34:18 jim
Structure of Management Information 09:33:08 jim
Management Information Base 09:32:38 jim
RFC 2578 09:31:49 jim
Simple Network Management Protocol 09:30:24 jim
RFC 1157 09:30:05 jim
SNMP 09:28:38 jim
X.25 09:23:07 jim
Network 09:18:38 jim
Link 09:15:42 jim
Network topology 09:11:52 jim
Graph 09:07:36 jim
Byzantine Fault Tolerance 08:59:05 jim
WS-ReliableMessaging 08:55:06 jim
WS-Specifications 08:48:17 jim
19.08.2018
Byzantine Generals Problem 08:38:22 jim
18.08.2018
Multi-Source Identity 09:57:28 jim
Web Blog_blogentry_180818_1 09:50:44 jim
Event eXchange Protocol 09:49:03 jim
XRI Data Interchange 09:42:00 jim
EXtensible Data Interchange 09:38:49 jim
JSON Web Tokens 09:21:55 jim
Vrdim 09:10:52 jim
17.08.2018
Web Blog_blogentry_170818_1 19:36:16 jim
Plenum Byzantine Fault Tolerant Protocol 11:29:36 jim
Sovrin 11:27:59 jim
Monero 11:20:16 jim
Blockchain 2.0 11:19:48 jim
OCSP Stapling 10:42:21 jim
RFC 6961 10:38:55 jim
TLS 1.3 10:37:02 jim
RFC 5489 10:23:15 jim
ECDHE_PSK 10:22:17 jim
TLS 1.3 Cipher Suites 10:10:26 jim
Key Performance Indicator 07:33:46 jim
13.08.2018
Language-Tag 11:19:43 jim
Social contract 09:55:46 jim
Rights 09:53:34 jim
Legal right 09:51:50 jim
Entitlement 09:49:17 jim
Natural rights 09:46:09 jim
Jurisdiction 09:38:32 jim
Legal 09:36:26 jim
Law 09:35:48 jim
12.08.2018
Office of Management and Budget 20:28:53 jim
OMB 20:27:18 jim
FedRAMP 20:25:10 jim
Federal Risk and Authorization Management Program 20:23:47 jim
Web Blog_blogentry_120818_1 20:20:45 jim
Regulation 20:00:35 jim
RFC 4880 08:37:04 jim
OpenPGP 08:36:09 jim
Pretty Good Privacy 08:35:26 jim
PGP 08:34:47 jim
Hybrid cryptosystem 08:30:53 jim
DataEncipherment 08:29:21 jim
Key Encapsulation Method 08:24:26 jim
KEM 08:23:59 jim
DEM 08:21:29 jim
Data Encapsulation Method 08:21:01 jim
Cryptography 07:50:38 jim
Symmetric Key Cryptography 07:43:19 jim
Asymmetric Key Cryptography 07:36:01 jim
11.08.2018
0-RTT Handshakes 16:47:36 jim
Quick UDP Internet Connections 16:44:02 jim
RFC 8446 16:34:47 jim
Human-Centered Design 09:37:04 jim
Donald A. Norman 09:32:23 jim
Web Blog_blogentry_110818_1 09:28:39 jim
Book 09:21:28 jim
Attack 09:01:27 jim
Homograph attack 09:01:09 jim
Punycode 08:57:43 jim
Phishing 08:47:40 jim
Identity questions 08:46:23 jim
Side-channel attacks 08:45:23 jim
SS7 hack 08:42:14 jim Social Engineering Attacker ==> Social Engineering Attack
Social Engineering Attack 08:42:13 jim Social Engineering Attacker ==> Social Engineering Attack
10.08.2018
Feedback 21:59:16 jim
Discoverability 21:53:06 jim
HCD 21:37:46 jim
Human Interconnection Model 21:37:19 jim
Web Blog_blogentry_100818_1 14:46:46 jim
RFC 2551 14:44:10 jim
IMPS 14:43:18 jim
The Infinite Monkey Protocol Suite 14:42:48 jim
RFC 2795 14:40:59 jim
RFC 1216 14:39:17 jim
RFC 1121 14:38:25 jim
RFC 1097 14:37:43 jim
RFC 968 14:37:03 jim
RFC 748 14:35:56 jim
RFC 527 14:35:08 jim
Internet Toaster 14:27:01 jim
INTEROP 14:18:02 jim
The Reliable Internetwork Troubleshooting Agent 13:54:49 jim
RFC 2321 13:54:30 jim
Hyper Text Coffee Pot Control Protocol 13:52:47 jim
Compliance Layer 13:44:01 jim
OSI-Model 13:42:59 jim
HIM 13:42:14 jim
Organization Layer 13:34:39 jim
2.5.6.4 13:32:29 jim
Organization 13:32:03 jim
User Layer 13:23:14 jim
RITA 13:13:03 jim
User error 11:41:23 jim
Human 09:15:48 jim
Hu 09:15:32 jim
Problem Exists Between Keyboard And Chair 09:05:53 jim
PEBKAC 08:59:54 jim
Strict-Transport-Security 08:29:41 jim
09.08.2018
DirXML-DriverStartOption 14:31:50 jim
08.08.2018
Code injection 11:37:25 jim
Arbitrary code execution 11:28:52 jim
Web Blog_blogentry_080818_1 11:19:25 jim
Commitment Scheme 11:01:20 jim
Second Preimage Resistance 10:49:04 jim
Preimage Resistance 10:45:21 jim
One-Way Hash Function 10:39:43 jim
Cryptographic Primitive 10:24:10 jim
Mix network 10:20:10 jim
Nonce 10:07:16 jim
Initialization Vector 10:03:33 jim
Block Cipher Mode 09:54:23 jim
NIST.SP.800-38 09:52:20 jim
OCB 09:47:39 jim
OFB 09:46:55 jim
CFB 09:46:35 jim
PCBC 09:46:05 jim
Offset Codebook Mode 09:26:30 jim
IAPM 09:19:33 jim
Integrity Aware Parallelizable Mode 09:17:02 jim
EAX 09:14:45 jim
CWC 09:06:48 jim
Authenticated Encryption with Associated Data 09:03:34 jim
CTR 08:43:30 jim
CCM 08:43:08 jim
AE 08:36:54 jim
Authenticated Encryption 08:36:20 jim
Output FeedBack 08:19:37 jim
Cipher FeedBack 08:18:54 jim
Propagating Cipher Block Chaining 08:17:50 jim
Counter mode 08:16:11 jim
XTS 08:14:18 jim
NIST Special Publication 08:03:11 jim
Cipher 07:53:10 jim
07.08.2018
Message Number 15:03:45 jim
Web Blog_blogentry_070818_1 14:59:03 jim
Cryptographic Hash Function 14:51:42 jim
Hash Function 14:48:54 jim
Hash Function Security Properties 14:48:06 jim Hash Function Security ==> Hash Function Security Properties
Key size 14:48:06 jim Hash Function Security ==> Hash Function Security Properties
Fingerprint 14:44:10 jim
Cryptographic Hash Function Comparison 14:38:05 jim Cryptographic Hash Function Comparrison ==> Cryptographic Hash Function Comparison
Block Cipher 14:17:01 jim Block cipher mode of operation ==> Block Cipher Mode
Meet-in-the-Middle Attack 14:08:34 jim
Birthday Attack 13:56:07 jim
Birthday Paradox 13:54:54 jim
Authentication 13:31:53 jim
Authentication/authentication.png 13:05:11 jim
Applied Cryptography 12:17:37 jim
Encryption 12:14:35 jim
Encryption/encryption.png 12:03:29 jim
Kerckhoffs principle 11:56:37 jim
Encryption Scheme 11:55:20 jim
Data and Goliath 11:26:05 jim Book I read ==> Book
Lean Enterprise 11:26:05 jim Book I read ==> Book
Thriving on Chaos 11:26:05 jim Book I read ==> Book
Perfect Security 11:16:12 jim
OAuth 2.0 Vulnerabilities 10:09:48 jim
Bad Actor 10:09:10 jim
Cryptographic Collision 10:07:55 jim
Kerberos Pre-Authentication 10:07:33 jim
Redundant Byzantine Fault Tolerance 10:06:09 jim
DNS cache poisoning 10:05:00 jim
Internationalized Resource Identifiers 10:04:01 jim
IDN homograph attack 10:03:36 jim
Mallory 10:01:40 jim
Malicious Software 10:00:24 jim
Malicious Endpoint 09:58:41 jim
Malicious PAC 09:57:21 jim
Malicious 09:56:36 jim
Security 09:36:33 jim
Online Certificate Status Protocol 09:33:30 jim
CAP theorem 09:32:09 jim
Device Inventory Service 09:30:46 jim
Asynchronous Transfer Mode 09:30:18 jim
Join AD Domain 09:29:30 jim
Token Revocation 09:28:21 jim
Transmission Control Protocol 09:27:49 jim
Practical Byzantine Fault Tolerance 09:27:17 jim
GCP Cloud CDN 09:26:51 jim
TLS Abbreviated Handshake 09:26:25 jim
Latency 09:25:39 jim
A Standard for the Transmission of IP Datagrams on Avian Carriers 09:22:58 jim
Token68 09:18:17 jim
Ciphertext stealing 09:17:13 jim
Base64 09:16:28 jim
Certificate Algorithm ID 09:14:41 jim
Padded 09:12:34 jim
LM hash 09:09:18 jim
Lucky 13 09:07:10 jim
PKCS 1 09:06:18 jim
Poodle 08:52:41 jim
Verifying Certificate Signatures 08:51:34 jim
Padding bit 08:50:38 jim
Packed Encoding Rules 08:48:07 jim
Certificate Pinning 08:39:07 jim
CacheCtl 08:35:27 jim
CacheCtl/Screen Shot 2018-08-07 at 04.30.46.png 08:32:50 jim dbCacheStats
Science Applications International Corporation 08:26:28 jim
SAIC 08:25:01 jim
VeriSign 08:23:55 jim
MasterCard 08:22:29 jim
VISA 08:21:45 jim
Secure Electronic Transaction 08:21:18 jim
3D Secure 08:19:02 jim
Exploitability Metrics 08:08:05 jim
Threat Model 08:04:59 jim
06.08.2018
Frame 21:26:57 jim
Packet 21:26:13 jim
Sex 17:50:45 jim
EDirectory 9.1.1.0 (40102.29) 15:59:29 jim
EDirectory Version 15:56:41 jim
Component Syntax 12:58:01 jim
VolumeName Field 12:57:36 jim
Xdasauditds 12:57:10 jim
X-NDS_READ_FILTERED 12:57:01 jim
X-NDS_PUBLIC_READ 12:56:50 jim
X-NDS_NONREMOVABLE 12:56:38 jim
X-NDS_NAME 12:56:26 jim
X-NDS_BOTH_MANAGED 12:52:13 jim
EDirectory 12:51:36 jim
NspmPasswordPolicy 12:48:10 jim
NspmConfigurationOptions 12:47:57 jim
Novell Secure Password Manager 12:47:44 jim
Novell Modular Authentication Service 12:47:34 jim
Novell Directory Services 12:47:01 jim
Novell Certificate Server 12:44:08 jim
Nldap 12:43:46 jim
NetWare Core Protocol 12:42:19 jim
NetWare 12:41:50 jim
Ndsmodules.conf 12:41:39 jim
Ndsconfig Parameters 12:41:26 jim
Nds.conf 12:41:15 jim
Ncpengine 12:41:02 jim
NMAS_LOGIN 12:40:33 jim
NMAS 12:40:05 jim
NICI Version 12:39:50 jim
NICI 12:39:35 jim
NDSD Loadable Module 12:39:09 jim
NDSD 12:38:52 jim
NDSBACKUP 12:38:36 jim
LDAP Metrics 12:37:06 jim
DirectoryTreeName 12:35:30 jim
NDS Unknow Entries 12:33:32 jim
NDS Tree-name 12:29:53 jim
Ndstrace Log Searches 12:21:14 jim
NDS Threads 12:20:25 jim
NDS Result Code 12:19:50 jim
NDS Partition 12:19:40 jim
NDS Obituary State 12:19:29 jim
NDS Obituaries Type 12:18:42 jim
NDS Obituaries 12:18:16 jim
NDS Login Methods 12:18:04 jim
NDS Informational Obituaries 12:17:24 jim
NDS External References 12:02:53 jim
NDAP 12:02:37 jim
N4u.server.listen-on-loopback 12:02:21 jim
N4u.server.interfaces 12:02:08 jim
N4u.server.idle-threads 12:01:11 jim
N4u.server.configdir 12:01:01 jim
N4u.nds.server-name 12:00:47 jim
N4u.nds.dofsync 12:00:36 jim
N4u.nds.backlink-interval 12:00:24 jim
Importing Certificates In Imanager 11:59:17 jim
Import Conversion Export 11:57:28 jim
Imanager Roles And Tasks 11:56:44 jim
Imon 11:56:33 jim
Imonitor 11:56:22 jim
Static Cache Mode 11:55:37 jim
Hard cache limit 11:53:26 jim
Groups Edirectory 11:53:08 jim
GetEffectivePrivilegesRequest 11:52:51 jim
Gams 11:52:30 jim
Files In Dib Directory 11:52:06 jim
Roll-Forward Log 11:49:07 jim
Maxdirtycache 11:48:44 jim
Lowdirtycache 11:48:29 jim
Cpinterval 11:48:12 jim
FLAIM checkpoint 11:47:56 jim
FLAIM Cache 11:37:56 jim
FLAIM Attribute Containerization 11:37:42 jim
FLexible Adaptable Information Management 11:36:56 jim
FLAIM 11:36:36 jim
EdirectoyFHSAndLSBCompliance 11:34:29 jim
EdirectoryPasswords 11:34:17 jim
EdirectoryMonitoringMIB 11:34:04 jim
EdirectoryLoginUpdate 11:29:47 jim
Edirectory Usefull Linux Commands 11:29:15 jim
Edirectory Replicas 11:28:49 jim
Edirectory Performance Counters 11:28:34 jim
Edirectory Password Policy 11:28:18 jim
Edirectory Indexes 11:27:48 jim
Edirectory Extensible Match Rules 11:27:19 jim
Edirectory Anomalies 11:26:54 jim
Edirectory Administrative Password Changes 11:26:13 jim
EDirectory and NDS Client Error Codes 11:25:53 jim
EDirectory Synchronization 11:25:15 jim
EDirectory Multiple Instance 11:24:54 jim
EDirectory Performance Tuning 11:24:26 jim
EDirectory Password Expiration 11:24:11 jim
EDirectory LDAP Transaction 11:23:45 jim
EDirectory Extended LDAP Flags 11:23:30 jim
EDirectory DIB 11:23:12 jim
LDAP Indexes 11:22:19 jim
Glossary Of LDAP And Directory Terminology 11:21:27 jim
Presence Index 11:20:19 jim
DefinitionSubstringIndex 11:18:14 jim
DefinitionIDList 11:16:13 jim
DefinitionEntryID 11:14:50 jim
DSE_LOGIN_EX 11:13:01 jim
DSE_AUTHENTICATE 11:12:43 jim
Common Edirectory Bind Errors 11:11:54 jim
Creating KMO Signed By An External Certificate Authority 11:11:29 jim
DHost 11:10:15 jim
DIB 11:09:56 jim
BACKLINK Obituary 11:07:35 jim
NDS Authentication 11:06:37 jim
EDirectory Privileges 11:06:22 jim
ACL (eDirectory Attribute) 11:05:07 jim
Installing And Configuring Edirectory 11:04:39 jim
NDSTRACE Examples 11:03:55 jim
Edirectory Instance Management 11:01:40 jim
2.5.4.43 08:01:16 jim
Initials 07:56:34 jim
DirXML Code Snippets 07:51:31 jim
Ndsrepair 07:50:41 jim
03.08.2018
APEX 23:23:36 jim
RFC 3550 23:22:49 jim
Real-time Transport Protocol 23:21:43 jim
RTP 23:21:02 jim
Encapsulating Security Payload 23:18:44 jim
ESP 23:15:29 jim
PRESSUREWAVE 23:12:01 jim
ECHELON 23:09:04 jim
HAMMERCHANT 23:07:36 jim
TURBINE 22:56:38 jim
KEYCARD 22:54:15 jim
HAMMERSTEIN 22:52:29 jim
TOYGRIPPE 22:51:01 jim
H.323 22:47:28 jim
FASCIA 22:44:07 jim
Cell ID 22:42:58 jim
LAC 22:41:39 jim
Location Area Code 22:08:02 jim
CELLID 22:04:07 jim
Universal Terrestrial Radio Access Network 22:03:01 jim
UTRAN 22:01:35 jim
SIGDEV 21:45:20 jim
Voice over IP 21:39:31 jim
VoIP 21:39:12 jim
Internet Key Exchange 21:28:44 jim
IKE 21:25:13 jim
SIGINT 21:11:25 jim
National Security Agency 21:07:05 jim
TURMOIL 21:05:02 jim
TURBULENCE 21:00:01 jim
FAIRVIEW 20:59:15 jim
Five Eyes Intelligence Alliance 20:54:08 jim
Edward Snowden 20:52:19 jim
Public Key Infrastructure Weaknesses 20:49:37 jim
Signalling System No. 7 20:48:25 jim
BOUNDLESSINFORMANT 20:47:05 jim
PRISM 20:43:28 jim
Office of Tailored Access Operations 20:35:00 jim
XKEYSCORE 20:29:41 jim
Communication Surveillance 20:26:00 jim
02.08.2018
HTTP Header Field 13:49:20 jim
HTTP Header Directive 13:48:07 jim
01.08.2018
HTTP Request 20:12:44 jim
HTTP Conditional Request 20:09:28 jim
Etag 20:07:52 jim
Entity-tag 20:04:25 jim
31.07.2018
LDAP 11:23:01 jim
Data Store 11:13:05 jim
NoSQL 11:11:53 jim
Key-value 11:09:34 jim
Redis 10:37:11 jim
GCP Storage Products 10:33:33 jim
RFC 6797 10:06:41 jim
HSTS 10:04:12 jim
HTTP 301 09:55:21 jim
HTTP 302 09:53:26 jim
Found 09:53:04 jim
Moved Permanently 09:52:45 jim
Permanent Redirect 09:52:18 jim
HTTP Status Code 09:51:06 jim
HTTP 308 09:48:06 jim
RFC 7538 09:44:23 jim
30.07.2018
Intermediary 12:09:47 jim
Reverse Proxy 12:07:23 jim
End-to-end Encryption 12:05:41 jim
Netstat 11:52:16 jim
29.07.2018
The LDAP Controller 09:06:09 jim
LDAP Java Code 09:04:29 jim
Version Control System 09:01:46 jim
Microsoft Windows 09:00:12 jim
Pic 08:57:51 jim
Linux 08:52:44 jim
Kernel 08:50:34 jim
Linus Torvalds 08:46:25 jim
Git 08:46:06 jim
Codebase 08:37:10 jim Version Control Systems ==> Version Control System
VCS 08:37:10 jim Version Control Systems ==> Version Control System
Revision 08:30:55 jim
Open Software Foundation 08:27:10 jim
Software Architecture Model 08:26:18 jim
Software design pattern 08:24:42 jim
Software design 08:23:54 jim
Open Source 08:20:51 jim
Source code 08:13:36 jim
The Twelve-Factor App 08:08:08 jim
Web Blog_blogentry_290718_1 08:03:22 jim
28.07.2018
1900s 09:57:56 jim
1910s 09:57:19 jim
1920s 09:56:51 jim
Decade 09:56:16 jim
1930s 09:55:32 jim
1940s 09:54:44 jim
1960s 09:51:58 jim
1950s 09:50:16 jim
Year 1958 09:48:07 jim
Responsive Organizations 09:47:16 jim
Continuous Delivery 09:43:35 jim
DevOps 09:36:05 jim
Continuous Development 09:30:35 jim
Continuous integration 09:28:02 jim
CD 09:25:05 jim
Ethernet 09:14:16 jim
History of LDAP 09:11:59 jim
Kubernetes 09:10:42 jim
26.07.2018
ISO 10646 09:07:26 jim
1. 08:58:05 jim
Roots of Trust 08:53:53 jim
RoT 08:51:59 jim
Trust Anchor 08:50:03 jim
Secure Enclave 08:49:22 jim
ISO Publicly Available Standards 08:36:11 jim
ISO 11889 08:34:27 jim
Cloud 08:28:11 jim
TCG 08:24:19 jim
Trusted Computing Group 08:24:00 jim
Trusted Platform Module 08:17:04 jim
Key Management Service 08:14:20 jim
Key Management 08:09:03 jim
Google Key Management Service 08:07:23 jim
Zero Trust 08:03:57 jim
25.07.2018
Web Blog_blogentry_140415_1 13:42:28 jim
Disablemovetoattrcontainer 13:41:41 jim
Preventing eDirectory from Auto Adding Indexes 13:39:20 jim
IndexDefinition 13:23:05 jim indexDefinition ==> IndexDefinition
24.07.2018
Google Cloud Functions 10:20:17 jim
Enterprise Integration Patterns 10:00:20 jim
Factory 09:59:10 jim
Request-Response 09:57:45 jim
Publish-Subscribe 09:57:10 jim
Messaging pattern 09:56:28 jim
Serverless 09:51:40 jim
SPML 09:50:14 jim
IDMDeveloperInfo 09:49:17 jim
IDM Tricks 09:49:04 jim
IDM Start-Stop 09:48:51 jim
Dxcmd 09:48:21 jim
Dirxml-uACHomedirRequired 09:47:52 jim
Dirxml-uACEncryptedTextPasswordAllowed 09:47:37 jim
Dirxml-uACDontExpirePassword 09:47:26 jim
DirXML-NTAccountName 09:47:13 jim
DirXML-JavaDebugPort 09:47:02 jim
DirXML-Association States 09:46:36 jim
DirXML and Oracle (OID) 09:46:19 jim
DirXML Trace File Searches 09:46:06 jim
DirXML Toolbox 09:45:55 jim
DirXML Required Reading 09:45:45 jim
DirXML PWFILTER.DLL 09:45:20 jim
DirXML Out-of-Band Requests 09:45:03 jim
DirXML Merge-Resync Process 09:44:44 jim
DirXML Examples 09:43:57 jim
DirXML Error 09:43:32 jim
DirXML Engine Version 09:42:53 jim
DirXML 4.0.2.0 09:42:30 jim
DirXML 09:40:38 jim
Transaction 09:36:41 jim
Event sourcing 09:33:07 jim
Event System 09:26:05 jim
Event Sequencer 09:18:38 jim
Event-Driven Architecture 09:13:01 jim
XDAS 09:05:44 jim
State 08:58:49 jim
Event 08:57:55 jim
Domain 08:48:04 jim
Domain-Driven Design 08:46:19 jim
22.07.2018
Automatic Certificate Management Environment 22:18:40 jim
Certbot 22:18:07 jim
Recursive name server 12:24:40 jim
8.8.8.8 12:20:28 jim
1.1.1.1 12:20:04 jim
Domain Name System 12:13:37 jim
DNS SRV Records 12:04:04 jim
DNS Resource Records 12:03:17 jim
Domain Name server 12:03:05 jim
CloudFlare 11:40:54 jim
Representational State Transfer 11:17:01 jim
GraphQL 11:15:35 jim
21.07.2018
GCP Compute Products 19:47:46 jim
Google Cloud Pub-Sub 19:47:32 jim
Firebase 19:47:05 jim
Web Blog_blogentry_210718_1 19:40:20 jim
Google Cloud SDK 19:28:23 jim