jspωiki
RecentChanges

These are the changes made to these pages during the last 30 days. Check the FullRecentChanges for a complete list of all changed pages.

This server lives on Coordinated Universal Time and the time that I use is 08:04 on 2018-07-21.

Category#

JSPWiki-2.10.3

20.07.2018
LDAP Modify-Increment Extension 22:04:41 jim
Point-to-Point Protocol over Ethernet 11:01:31 jim
Point-to-Point Protocol 10:35:34 jim
Message Passing Interface 10:34:36 jim
Ontology 10:24:06 jim
Schema 10:23:25 jim
Web Ontology Language 10:14:08 jim
Semantic WEB 10:08:44 jim
Linked Data 10:01:36 jim
Link Relation Types 09:50:26 jim
RFC 5988 09:42:57 jim
Web Linking 09:41:51 jim
The Atom Syndication Format 09:35:02 jim
Atom 09:33:02 jim
RFC 4287 09:28:54 jim
RFC 8288 09:26:58 jim
18.07.2018
NDSTRACE Examples 13:26:41 jim
17.07.2018
OAuth Scope Example 13:40:27 jim
Access Control 11:02:23 jim
External Security Managers (ESM) 10:50:55 jim
Mainframe 10:48:58 jim
XACML 10:44:44 jim
Trust Tier 10:33:45 jim
NGAC 09:16:02 jim
16.07.2018
Next Generation Access Control 18:55:19 jim
NIST.SP.1800-3 18:47:20 jim
NIST Special Publication 18:44:40 jim
Attribute Based Access Control 18:39:42 jim
NIST.SP.800-162 18:38:13 jim
CISCO Commands 16:33:17 jim
OpenSSL Commands 16:30:47 jim
PAM module-arguments 16:29:54 jim
NAM Troubleshooting 16:28:34 jim
Syslog Facility 16:27:00 jim
Ndstrace 16:21:50 jim
Fanout Core Driver Debugging 16:20:52 jim
Fanout Platform Debugging 16:20:09 jim
Debugging Fanout Driver 16:18:06 jim
DirXML-JavaDebugPort 16:16:45 jim
2.16.840.1.113719.1.14.4.1.27 16:15:16 jim
Debug 16:14:21 jim
NAV 16:12:52 jim
Network Analysis 16:12:21 jim
Web Blog_blogentry_160718_1 14:45:30 jim
Web Blog_blogentry_280717_1 13:47:05 jim
Disruptive technology 13:38:42 jim
Nordic APIs 13:35:20 jim
Book I read 13:32:30 jim
Thriving on Chaos 13:02:11 jim
Data and Goliath 12:59:18 jim
Applied Cryptography 12:57:49 jim
Alice And Bob 12:53:35 jim
Marc Andreessen 12:06:14 jim
Lean Enterprise 11:59:29 jim
DevOps 11:37:27 jim
CI 11:35:28 jim
XP 11:34:57 jim
Extreme Programming 11:34:10 jim
Continuous integration 11:30:24 jim
Dev 11:15:41 jim
Ops 11:15:06 jim
Operations Team 11:14:31 jim
Continuous testing 11:12:01 jim
Velocity 10:58:44 jim
SDLC 10:48:03 jim
Software Development Life Cycle 10:47:31 jim
BDUF 10:34:36 jim
Big Design Up Front 10:34:19 jim
Waterfall model 10:33:29 jim
Conways law 09:53:15 jim
API Economy 09:48:56 jim
Responsive Organizations 09:43:35 jim
15.07.2018
Service 17:42:14 jim
Software design 17:33:39 jim
Software design pattern 17:29:02 jim
Facade pattern 16:58:03 jim
API-Gateway 16:55:24 jim
Web Blog_blogentry_150718_1 09:10:07 jim
14.07.2018
Bounded Context 09:07:40 jim
Monolithic Architecture 08:57:28 jim
Identity Relationship Management 08:53:05 jim
Holacracy 08:40:22 jim
13.07.2018
Cloud Access Security Broker 08:09:43 jim
12.07.2018
Red Green Refactor 16:26:11 jim
Emergent Design 16:22:06 jim
Web Blog_blogentry_120718_1 16:17:44 jim
LRM 10:43:48 jim
Last Responsible Moment 10:43:32 jim
Alibaba 09:48:15 jim
Uber 09:47:24 jim
Airbnb 09:46:55 jim
Microservice 09:44:26 jim
Load Balancing 09:02:39 jim
11.07.2018
Web Blog_blogentry_110718_1 15:11:04 jim
Data-centric 14:47:45 jim
Test Page 10:59:29 jim
MyStartPage 10:58:49 jim
LDAP Result Codes 10:56:11 jim
Error 10:54:52 jim
Cheat Sheets 10:44:17 jim
SQL Quick Help 10:43:25 jim
Cable Connections 10:41:19 jim
Jim 10:40:18 jim
AdminsPage 10:24:26 jim
Allowed Inlined Images 10:18:03 jim
Costs of Wiki 10:15:24 jim
Modify-password 10:11:44 jim
Modify-association 10:09:52 jim
LDAPWiki Images 10:08:27 jim
Combined DNA Index System 09:38:04 jim
DNA 09:31:49 jim
CODIS 09:29:39 jim
Token 09:24:36 jim
Facial recognition 09:20:10 jim
Something You Are 09:12:40 jim
Deoxyribonucleic Acid 09:10:42 jim
Genome 09:08:32 jim
10.07.2018
DomainFunctionality 13:30:55 jim
ForestFunctionality 13:30:40 jim
DomainControllerFunctionality 13:30:28 jim
Active Directory Functional Levels 13:22:42 jim
AES-256 13:21:47 jim
AES-192 13:21:31 jim
AES-128 13:21:18 jim
AES 13:19:24 jim
PDC Emulator FSMO Role 13:08:09 jim
Infrastructure Master FSMO Role 13:04:53 jim
Domain Naming Master FSMO Role 13:03:42 jim
RID Master FSMO Role 13:02:53 jim
Schema Master FSMO Role 13:00:14 jim
Flexible Single Master Operation 12:26:35 jim
Single-master 12:24:03 jim
Multi-master 12:22:22 jim
FSMO 12:08:18 jim
Photo 10:18:38 jim
0.9.2342.19200300.100.1.60 10:14:40 jim
JpegPhoto 10:14:03 jim
Image 10:07:16 jim
Audio 10:04:18 jim
Application 10:03:41 jim
Video 10:02:50 jim
Font 10:01:08 jim
Multipart 09:58:48 jim
Media-type 09:54:04 jim
IANA.MediaTypes 09:27:32 jim
Structured Syntax Suffix 09:15:39 jim
Security Event Token 08:57:05 jim
RFC 6838 08:55:13 jim
RFC 8417 08:14:43 jim
09.07.2018
RFC 1149 13:51:41 jim
A Standard for the Transmission of IP Datagrams on Avian Carriers 13:51:15 jim
Web Blog_blogentry_090718_1 13:47:21 jim
ISO 8601 13:43:53 jim
Timestamp 13:37:51 jim
LDAP Filter Choices 13:27:27 jim
Sid 09:47:08 jim
07.07.2018
RCS Universal Profile 20:57:03 jim
Organizational Identity 20:50:26 jim
Third-party Identity Provider 20:48:06 jim
Identity Relationship Framework 20:45:35 jim
Sovereign-source Identity 20:41:09 jim
Self-Sovereign Identity 20:40:02 jim
Electronic IDentification Authentication and trust Services 20:29:09 jim
05.07.2018
CIA 17:30:57 jim
Central Intelligence Agency 17:27:55 jim
United States Social Security Administration 17:21:13 jim
Independent United States Federal Agency 17:17:31 jim
Federal Communications Commission 16:57:23 jim
FCC 16:51:34 jim
Global Positioning System 16:51:12 jim
National Vulnerability Database 10:56:49 jim
Security Content Automation Protocol 10:54:39 jim
CVSS 10:48:42 jim
Common Vulnerability Scoring System 10:48:07 jim
Attack Effort 10:21:07 jim
Exploitability Metrics 10:17:29 jim
Acceptable risk 10:00:15 jim
Tomcat And LDAP 09:55:32 jim
PreInstall Check List 09:53:46 jim
Imanager Roles And Tasks 09:51:41 jim
B003281 09:48:16 jim
Risk Assessment 09:39:38 jim
Threat 09:38:22 jim
Internet Threat Model 09:31:50 jim
Probability of Loss 09:30:15 jim
Authenticator Assurance Levels 09:23:46 jim
Data Security Impact 09:20:38 jim
Access Control Models 09:14:16 jim
04.07.2018
Open Banking 11:34:46 jim
OBIE 11:33:43 jim
Open Banking Implementation Entity 11:33:26 jim
Web Blog_blogentry_040718_1 09:58:09 jim
Cloud Data Store 09:50:44 jim
Google Cloud Storage 09:49:57 jim
RFC 8414 08:53:29 jim
OAuth 2.0 Authorization Server Metadata 08:52:03 jim
United States Territories 08:40:00 jim
District of Columbia 08:38:41 jim
US States 08:36:35 jim
United States federal government 08:34:57 jim
United States Cabinet Department 08:23:58 jim
United States 08:21:55 jim
United States Constitution 08:15:45 jim
Vice President of the United States 08:14:31 jim
President of the United States of America 08:06:41 jim
CAN 08:00:00 jim
CA 07:59:31 jim
Canada 07:58:27 jim
Country Code 07:57:13 jim
Cryptographic Module Validation Program 07:55:11 jim
03.07.2018
Digital Signature 15:13:11 jim
Signature Verification 15:06:54 jim
Signature Generation 15:05:34 jim
Message Authentication Code 14:19:54 jim
Digital Signature Algorithm 14:18:37 jim
Cryptographic Primitive 14:18:01 jim
Probabilistic Signature Scheme 13:57:07 jim
TLS 1.3 13:50:03 jim
How SSL-TLS Works 13:29:06 jim
Wi-Fi Alliance 10:36:02 jim
Wi-Fi 10:35:21 jim
Trademark 10:33:42 jim
Intellectual Property Rights 10:31:37 jim
USPTO 10:31:09 jim
United States Patent and Trademark Office 10:30:40 jim
Open Protocol for Access Control, Identification, and Ticketing with privacY 10:27:51 jim
Main 10:19:02 jim
02.07.2018
ACE 16:26:04 jim
1.2.840.113556.1.4.1669 16:25:33 jim
ACE-OAuth 16:08:30 jim
Authentication and Authorization for Constrained Environments 16:05:46 jim
Web Blog_blogentry_020718_1 15:47:06 jim
01.07.2018
Photography 10:01:52 jim
Surveillance 09:57:01 jim
Video Surveillance 09:55:37 jim
One-party consent 09:55:00 jim
Two-party consent 09:54:47 jim
Wiretapping 09:54:29 jim
Recording 09:53:31 jim
Legal Consideration 09:48:05 jim
Audio Surveillance 09:46:15 jim
Photographs 09:39:24 jim
Signals Intelligence 09:24:59 jim
SIGINT 09:23:20 jim
Communication Surveillance 09:18:46 jim Surveillance of Communications ==> Communication Surveillance
Logging 09:11:00 jim
Data Protection 09:07:22 jim
CFAA 08:50:31 jim
Computer Fraud and Abuse Act 08:49:53 jim 18 U.S.C. ==> U.S. Code Title 18
U.S. Code Title 18 08:49:53 jim 18 U.S.C. ==> U.S. Code Title 18
U.S. Code 08:46:56 jim
United States Code 08:46:28 jim
18 U.S. Code 2511 08:41:50 jim 18 U.S.C. 2511 (d) ==> 18 U.S. Code 2511
Web Blog_blogentry_010718_1 08:35:10 jim
28.06.2018
Bandit-project.org 20:02:16 jim
Higgins Project 19:58:57 jim
CardSpace 19:51:15 jim
Information Cards 19:50:08 jim
ICards 19:48:32 jim
IDMRelatedOrganizationsAndStandards 19:28:45 jim
Blockchain 10:16:10 jim
Birthday Paradox 09:59:13 jim
Preimage Resistance 09:56:11 jim
27.06.2018
PosixGroup 11:07:58 Martin
26.06.2018
LEC 18:11:20 jim
Local Exchange Carrier 18:10:59 jim
Local Access and Transport Area 18:09:35 jim
Local Exchange 18:08:37 jim
IXC 18:01:59 jim
Point-of-Presence 18:01:19 jim
Interexchange Carrier 17:59:26 jim
Year 1985 17:53:04 jim
FAIRVIEW 17:49:57 jim
Schema MAD 13:36:01 jim
2.5.5.9 13:33:28 jim
OR-Name 13:26:47 jim
DN Syntax 13:24:38 jim
2.5.5.1 13:21:13 jim
Assistant 13:20:50 jim
2.16.840.1.113719.1.8.4.2 13:17:49 jim
25.06.2018
United States Department of Homeland Security 13:54:15 jim
United States Department of Homeland Security/homeland-logo.png 13:53:46 jim homeland-logo.png
24.06.2018
PasswordsUsed 11:30:37 jim
LoginAllowedTimeMap 11:25:49 jim
DIT Content Rule 10:21:50 jim
Name Form Description 10:13:50 jim
Name Form 10:13:27 jim
Extended Flags 10:04:57 jim
X-MIN-VALUE-LENGTH 10:04:36 jim
X-MIN-VALUE-COUNT 10:03:44 jim
X-MIN-INT-VALUE 10:03:21 jim
X-MAX-VALUE-LENGTH 10:02:57 jim
X-MAX-VALUE-COUNT 10:02:30 jim
X-MAX-INT-VALUE 10:01:18 jim
X-ALLOWED-VALUE 10:00:41 jim
EDirectory Extended LDAP Flags 09:53:41 jim
X-NOT-HUMAN-READABLE 09:51:42 jim
X-SCHEMAFLAGSEx 09:48:04 jim
23.06.2018
CCC 08:22:24 jim
Key 08:19:07 jim
Digital Key 08:15:00 jim
Lock 08:14:18 jim
MirrorLink 07:49:29 jim
Car Connectivity Consortium 07:47:52 jim
Web Blog_blogentry_230618_1 07:41:46 jim