jspωiki
RecentChanges

These are the changes made to these pages during the last 30 days. Check the FullRecentChanges for a complete list of all changed pages.

This server lives on Coordinated Universal Time and the time that I use is 19:21 on 2018-12-17.

Category#

JSPWiki-2.10.3

17.12.2018
Cryptocurrency 14:40:56 jim
Independent United States Federal Agency 14:32:20 jim
Federal Trade Commission 14:28:25 jim
Fair Credit Reporting Act 14:24:25 jim
FCRA 14:23:32 jim
Money 14:20:08 jim
Commodity 14:17:28 jim
XRP 14:14:04 jim
Debtor 14:11:06 jim
Creditor 14:10:01 jim
Debt 14:07:42 jim
Interest 14:02:16 jim
Distributism 13:20:08 jim
Taiwan 12:24:22 jim
Web Blog_blogentry_171218_1 11:52:32 jim
N11 11:32:21 jim
Number Plan Area 11:31:00 jim
North American Numbering Plan 11:29:47 jim
NANP 11:28:05 jim
Central Office 11:21:25 jim
Telephone exchange 11:21:00 jim
Market 11:13:44 jim
Chartered company 11:10:30 jim
Centralized Exchange 11:03:55 jim
Decentralized Exchange 11:01:30 jim
Monopsony 10:59:35 jim
Market structure 10:58:14 jim
Monopoly 10:55:18 jim
Exchange 10:51:47 jim
Medium of exchange 10:41:37 jim
Oligopoly 10:36:37 jim
16.12.2018
20th Century 11:28:06 jim
21st Century 11:27:16 jim
Century 11:19:46 jim
19th Century 11:16:37 jim
Web Storage 09:01:22 jim
SessionStorage 08:59:43 jim
LocalStorage 08:59:20 jim
15.12.2018
1800s 13:45:30 jim
Year 1899 13:44:15 jim
Time And Epochs 13:43:28 jim
14.12.2018
HTML Colour Names 09:27:34 jim
Web Blog_blogentry_141218_1 09:20:09 jim
11.12.2018
ConfigFilesUnixinfo.log 11:31:36 jim
Jim 10:58:56 jim
MyStartPage 10:49:58 jim
1.3.6.1.4.1.8876.2.1 10:47:36 jim
1.3.6.1.4.1.8876.2.2 10:47:24 jim
1.3.6.1.4.1.8876.2 10:45:43 jim
1.3.6.1.4.1.8876.1 10:45:29 jim
Schema Extensions 10:43:24 jim
Sudo 10:39:23 jim
10.12.2018
LDAPWiki Images 09:46:20 jim
09.12.2018
User and Entity Behavior Analytics 11:12:18 jim
Behavioral Characteristics 11:08:50 jim
IMF 10:38:45 jim
International Monetary Fund 10:37:30 jim
Web Blog_blogentry_091218_1 10:34:16 jim
Penetration Test 10:19:37 jim
Vulnerability Assessment 10:13:48 jim
Vulnerability 10:13:00 jim
Red Green Refactor 10:07:12 jim
Decentralized system 09:51:27 jim
Common Criteria for Information Technology Security Evaluation 09:42:37 jim
07.12.2018
Sovrin Agent 12:51:16 jim
Sovrin 12:48:31 jim
Coherence 12:09:41 jim
Cloud computing 12:06:17 jim
Public Key 12:03:05 jim
CurveZMQ 11:44:54 jim
Plenum Byzantine Fault Tolerant Protocol 11:37:57 jim
06.12.2018
Organizational friction 16:43:05 jim
Mura 16:21:27 jim
Muda 16:20:10 jim
Muri 16:11:49 jim
Kanban 16:06:26 jim
Friction 15:48:32 jim
Byte 13:12:11 jim
Bit 13:07:32 jim
Megabyte 12:54:08 jim
MB 12:08:53 jim
N4u.server.thread-stack-size 12:08:18 jim
NDS Thread Pool 11:58:53 jim
NDS Threads 11:55:42 jim
Web Blog_blogentry_061218_1 10:46:18 jim
05.12.2018
Ndsconfig Parameters 15:10:14 jim
N4u.server.listen-on-loopback 15:07:18 jim
04.12.2018
MS Access Mask 12:40:12 jim
MS Access Mask/ms-accctrl4.png 12:37:51 jim MS Access Mask Format
Image Styles 12:32:05 jim
Access Control Entry 12:20:56 jim
Access Control Entry Type 12:15:22 jim
Rights 12:03:35 jim
Discretionary Access Control List 11:37:34 jim
Securable object 11:17:45 jim
Access Control Model-Microsoft Windows 11:15:58 jim
MSFT Access Token 10:34:55 jim
Security Descriptor 10:32:31 jim
Access Control Models 10:17:49 jim
Access Control List 10:14:27 jim
System Access Control List 10:12:27 jim
SID identifier authority 09:55:50 jim
Well-known Security Identifiers 09:55:18 jim
SECURITY_NT_AUTHORITY 09:36:17 jim
Security Identifier 09:29:45 jim
03.12.2018
Mimikatz 17:24:55 jim
Golden Ticket 17:16:31 jim
Health Dataset 13:44:11 jim
MLLP 13:44:01 jim
Minimal Lower Layer Protocol 13:42:01 jim
Health Level Seven 13:39:15 jim
Book 13:32:48 jim
Web Blog_blogentry_111017_1 13:32:24 jim Health Care ==> HealthCare
Web Blog_blogentry_200918_1 13:32:24 jim Health Care ==> HealthCare
Web Blog_blogentry_281018_1 13:32:24 jim Health Care ==> HealthCare
Medical ID Card 13:32:23 jim Health Care ==> HealthCare
Personal Health Record 13:32:23 jim Health Care ==> HealthCare
Regulatory Risk 13:32:23 jim Health Care ==> HealthCare
United States Office of Personnel Management 13:32:23 jim Health Care ==> HealthCare
Web Blog_blogentry_030618_1 13:32:23 jim Health Care ==> HealthCare
Informed Consent 13:32:22 jim Health Care ==> HealthCare
Integrating the Healthcare Enterprise 13:32:22 jim Health Care ==> HealthCare
Meaningful Use 13:32:22 jim Health Care ==> HealthCare
Health Care Provider 13:32:21 jim Health Care ==> HealthCare
Health Information Technology for Economic and Clinical Health 13:32:21 jim Health Care ==> HealthCare
Health information 13:32:21 jim Health Care ==> HealthCare
Identity Proofing 13:32:21 jim Health Care ==> HealthCare
Industry Specific 13:32:21 jim Health Care ==> HealthCare
Electronic Medical Record 13:32:20 jim Health Care ==> HealthCare
Federal Health Care Law 13:32:20 jim Health Care ==> HealthCare
HIPAA Covered Entity 13:32:20 jim Health Care ==> HealthCare
HIPAA Privacy Rule 13:32:20 jim Health Care ==> HealthCare
Health Care Organization 13:32:20 jim Health Care ==> HealthCare
Digital Imaging and Communications in Medicine 13:32:19 jim Health Care ==> HealthCare
Electronic Fitness Device 13:32:19 jim Health Care ==> HealthCare
HealthCare 13:32:19 jim Health Care ==> HealthCare
Data anonymization 13:30:21 jim
Clinical Data 13:30:05 jim
Cloud Data Store 13:24:24 jim
Relational Database Management System 13:23:18 jim
Dataset 13:20:17 jim
Windows registry 13:19:18 jim Data Store ==> DataStore
System Authorization Facility 13:19:17 jim Data Store ==> DataStore
Tracking 13:19:17 jim Data Store ==> DataStore
Update 13:19:17 jim Data Store ==> DataStore
Web Blog_blogentry_090418_1 13:19:17 jim Data Store ==> DataStore
Web Blog_blogentry_211217_1 13:19:17 jim Data Store ==> DataStore
Password Policy 13:19:16 jim Data Store ==> DataStore
Protocol Buffers 13:19:16 jim Data Store ==> DataStore
Queue 13:19:16 jim Data Store ==> DataStore
Read 13:19:16 jim Data Store ==> DataStore
Replication 13:19:16 jim Data Store ==> DataStore
Repository 13:19:16 jim Data Store ==> DataStore
Stateless 13:19:16 jim Data Store ==> DataStore
NICI 13:19:15 jim Data Store ==> DataStore
NoSQL 13:19:15 jim Data Store ==> DataStore
OAuth Scope Example 13:19:15 jim Data Store ==> DataStore
Object storage 13:19:15 jim Data Store ==> DataStore
Oracle Unified Directory 13:19:15 jim Data Store ==> DataStore
LDAP Overview 13:19:14 jim Data Store ==> DataStore
Legal Entity Identifier 13:19:14 jim Data Store ==> DataStore
Microservice 13:19:14 jim Data Store ==> DataStore
General Data Protection Regulation 13:19:13 jim Data Store ==> DataStore
Government Data Store 13:19:13 jim Data Store ==> DataStore
HBase 13:19:13 jim Data Store ==> DataStore
Keystore 13:19:13 jim Data Store ==> DataStore
FLAIM Cache 13:19:12 jim Data Store ==> DataStore
FLAIM checkpoint 13:19:12 jim Data Store ==> DataStore
Facial recognition 13:19:12 jim Data Store ==> DataStore
Faythe 13:19:12 jim Data Store ==> DataStore
GCP Storage Products 13:19:12 jim Data Store ==> DataStore
Delegation vs Impersonation 13:19:11 jim Data Store ==> DataStore
Delete 13:19:11 jim Data Store ==> DataStore
Delete Request 13:19:11 jim Data Store ==> DataStore
Digital Identity 13:19:11 jim Data Store ==> DataStore
Distributed Data Store 13:19:11 jim Data Store ==> DataStore
FLAIM 13:19:11 jim Data Store ==> DataStore
Data Metadata 13:19:10 jim Data Store ==> DataStore
Data Processor 13:19:10 jim Data Store ==> DataStore
Data warehouse 13:19:10 jim Data Store ==> DataStore
Data-lake 13:19:10 jim Data Store ==> DataStore
Database 13:19:10 jim Data Store ==> DataStore
Decentralized Identity Foundation 13:19:10 jim Data Store ==> DataStore
Codebase 13:19:09 jim Data Store ==> DataStore
Create 13:19:09 jim Data Store ==> DataStore
Credential Repository 13:19:09 jim Data Store ==> DataStore
Credential Vault 13:19:09 jim Data Store ==> DataStore
Cryptocurrency wallet 13:19:09 jim Data Store ==> DataStore
Biometric Identification 13:19:08 jim Data Store ==> DataStore
Blinding Identity Taxonomy 13:19:08 jim Data Store ==> DataStore
Brocade Communications Systems 13:19:08 jim Data Store ==> DataStore
By-reference 13:19:08 jim Data Store ==> DataStore
American Association of Motor Vehicle Administrators 13:19:07 jim Data Store ==> DataStore
Automated License Plate Reader 13:19:07 jim Data Store ==> DataStore
Biometric Enrollment 13:19:07 jim Data Store ==> DataStore
DataStore 13:19:07 jim Data Store ==> DataStore
AD Password Filters 13:18:52 jim
OpenID Connect Federation 12:19:17 jim
Personal Information Protection and Electronic Documents Act 10:00:12 jim
02.12.2018
Node 10:42:10 jim
Matrix 10:38:36 jim
Graph 10:32:15 jim
Binary Tree 10:28:27 jim
Stack 10:25:23 jim
JSONArray 10:22:47 jim
Array 10:21:28 jim
Linked List 10:20:13 jim
Data Structure 10:13:45 jim
Software design 10:06:23 jim
Software library 10:02:37 jim
OPAL Project 09:52:37 jim
Delivery Team 09:41:58 jim
Software 09:38:09 jim
Agile Principles 09:37:34 jim
Perl 09:33:29 jim
DevOps 09:32:01 jim
Debug 09:31:28 jim
Firebase 09:29:54 jim
Application 09:29:24 jim
Waterfall model 09:28:11 jim
Continuous Development 09:27:12 jim
Software Development Kit 09:24:33 jim
Lean Product Development 09:24:02 jim
Development Team 09:21:49 jim
01.12.2018
Refactoring 13:39:48 jim
Remote Procedure Call 11:16:03 jim
Idempotent 11:15:23 jim
Function 11:13:54 jim
Class 11:10:54 jim
Method 11:09:43 jim
Object 11:08:57 jim
SNMP 11:06:09 jim
Session Management 11:04:55 jim
SAML Web Browser Profiles 11:04:19 jim
Certification Authority Rating And Trust 11:02:48 jim
Binding_message 11:01:51 jim
The Twelve-Factor App 10:59:46 jim
Commitment Scheme 10:58:55 jim
FAL 2 10:57:33 jim
GS2 Mechanism Family 10:56:35 jim
SAML Bindings 10:54:46 jim
Binding 10:48:50 jim
Subroutine 10:26:54 jim
Backus Normal Form 10:00:52 jim
Polyglot 09:59:20 jim
Inheritance 09:58:05 jim
Python 09:56:53 jim
Property 09:56:35 jim
Application Programing Interface 09:55:12 jim
Object-oriented Programming 09:53:25 jim
Extreme Programming 09:52:32 jim
Software development 09:51:22 jim
Programming 09:49:43 jim
Functional Programming 09:47:19 jim
Protocol 09:23:52 jim
Protocol Stack 09:22:25 jim
DIAMETER 09:20:21 jim
30.11.2018
Ecash 11:04:38 jim
Store of value 10:48:11 jim
Unit of measurement 10:46:01 jim
Store 10:23:18 jim
Identity Data Store 10:21:37 jim
International System of Units 10:14:10 jim
Fiat Currency 09:36:35 jim
29.11.2018
Fractional Reserve 17:52:34 jim
OpenLedger 17:48:05 jim
Pwd-Last-Set attribute 14:55:16 jim
PwdLastSet 14:46:06 jim
DID Context 14:14:24 jim
DID path 14:13:56 jim
DID record 14:13:38 jim
DID Operations 14:13:23 jim
DID Authentication 14:12:58 jim
DID reference 14:12:09 jim
DID Fragment 14:11:36 jim
Decentralized Identifier 14:10:20 jim
DID Subject 14:09:54 jim
DID Service Endpoint 13:58:02 jim
DID Document 13:55:32 jim
Trust Anchor 13:23:52 jim
27.11.2018
OBIT_COUNT_FROM_DATABASE_INDEX 13:01:45 jim
Cn=Partition, cn=Agent, cn=monitor 13:00:31 jim
ChangeCacheCount 12:59:30 jim
UserAttribute 12:58:06 jim
ExtensibleObject 12:55:32 jim
NDS Obituaries 12:49:40 jim
Change Cache 12:40:50 jim
PerishableData 12:23:25 jim
Glossary Of LDAP And Directory Terminology 12:11:32 jim ReplicaS Perishable Data Delta ==> PerishableData
MaxRingDelta 12:09:16 jim Maximum Ring Delta ==> MaxRingDelta
PurgeVector 11:59:22 jim
2.16.840.1.113719.1.1.4.1.500 11:34:55 jim
ObituaryNotify 11:34:32 jim
BirthDate 11:20:16 jim
PlaceOfBirth 11:13:05 jim
SapAddOnUM 11:11:47 jim
1.3.6.1.4.1.694.2.1.104 11:10:08 jim
BirthName 11:09:07 jim
DateOfBirth 11:04:52 jim
Date Of Birth 11:04:30 jim
Birth Certificate 11:03:21 jim
Birth Record 11:03:02 jim
Government Identity 11:01:58 jim
Metrics 10:46:57 jim
Monitor Entry 10:07:47 jim
Canada 10:02:13 jim
United States 10:00:11 jim
Earth 09:56:54 jim
Australia 09:56:00 jim
Antarctica 09:53:20 jim
South America 09:52:11 jim
North America 09:50:12 jim
Europe 09:47:43 jim
Africa 09:46:15 jim
Asia 09:44:07 jim
Continent 09:42:28 jim
Mobile Country Code 09:39:41 jim
Estonia 09:36:55 jim
DigiD 09:30:46 jim
Netherlands 09:28:01 jim
National Identification Number 09:23:49 jim
REAL ID 09:15:24 jim
National ID 09:13:16 jim
Xdas.properties 09:09:22 jim
XDAS 09:08:14 jim
XDAS for eDirectory 09:06:40 jim
26.11.2018
OBIT_MOVED_PURGEABLE 15:34:23 jim
OBIT_MOVED_OK_TO_PURGE 15:33:46 jim
OBIT_MOVED_NOTIFIED 15:33:29 jim
OBIT_MOVED_ISSUED 15:33:10 jim
OBIT_NEWRDN_PURGEABLE 15:32:43 jim
OBIT_DEAD_ISSUED 15:32:14 jim
OBIT_NEWRDN_NOTIFIED 15:32:07 jim
OBIT_NEWRDN_OK_TO_PURGE 15:31:37 jim
OBIT_NEWRDN_ISSUED 15:31:18 jim
OBIT_DEAD_PURGEABLE 15:30:55 jim
OBIT_DEAD_OK_TO_PURGE 15:30:29 jim
OBIT_DEAD_NOTIFIED 15:30:03 jim
NDS Obituary State 15:28:26 jim
OBIT_NOTIFIED 15:27:28 jim
OBIT_ISSUED 15:26:24 jim
OBIT_PURGEABLE 15:25:51 jim
OBIT_OK_TO_PURGE 15:24:04 jim
NDS Obituaries Type 15:11:54 jim
INHIBIT_MOVE Obituary 15:11:15 jim
OBIT_MOVED 15:10:35 jim MOVED Obituary ==> OBIT_MOVED
NDS Primary Obituaries 15:10:15 jim
OBIT_NEWRDN 15:09:35 jim NEW RDN Obituary ==> OBIT_NEWRDN
OBIT_DEAD 15:07:09 jim DEAD Obituary ==> OBIT_DEAD
NDS Obituaries Classification 14:21:19 jim
EDirectory Monitor Entry 13:09:32 jim
25.11.2018
XDAS Security Events 20:36:54 jim
Locked By Intruder 20:33:38 jim
Universal Password 12:42:38 jim
NMAS_LOGIN 12:35:53 jim
RFC 4301 12:31:58 jim
SASL EXTERNAL 12:29:51 jim
SASL 12:27:23 jim
22.11.2018
Encoding claims in the OAuth 2 state parameter using a JWT 16:16:31 jim
OAuth 2.0 Security Best Current Practice 16:14:30 jim
OAuth 2.0 Mix-Up Attack 16:01:07 jim
OAuth 2.0 Vulnerabilities 15:56:51 jim OAuth 2.0 Mix-Up Mitigation ==> OAuth 2.0 Mix-Up Attack
21.11.2018
Web Authentication API 10:27:10 jim
Credential Management API 10:26:36 jim
W3C WebAuthn 10:19:56 jim
U2F device 10:17:24 jim
WebAuthn Attestation 10:14:36 jim
Public Key Credential 10:12:38 jim
UAF 09:46:53 jim
20.11.2018
Policy 12:47:52 jim