Hackers

Results: 356



#Item
191Surveillance / Computer keyboard / Microsoft Windows / Operating system / Electronic engineering / Security / Windows Vista / Features new to Windows XP / Comparison of privilege authorization features / Espionage / Keystroke logging / Spyware

WINNING AT THE HACKERS’ GAME: Practical Security that Works H-Login Overview The first step common to all modules of the H-Apps suite is the user authentication procedure required to gain access to any application res

Add to Reading List

Source URL: www.eisst.com

Language: English
192Macintosh / Windows Vista / Mac OS X Snow Leopard / Malware / Man-in-the-browser / Google Chrome / Security and safety features new to Windows Vista / Computing / Software / System software

WINNING AT THE HACKERS’ GAME: Practical Security that Works H-Browser Overview The H-Browser is a hardened Web browser specifically designed at the architectural level for securing Internet transactions and intended t

Add to Reading List

Source URL: www.eisst.com

Language: English
193Adobe software / ISO standards / Computer file formats / Technical communication tools / Portable Document Format / Adobe Acrobat / Windows Vista / XFA / Software / Computing / Adobe LiveCycle

WINNING AT THE HACKERS’ GAME: Practical Security that Works H-PDF Overview The H-PDF is a hardened PDF file management and viewing application. It allows working with PDF files and forms, which can be securely filled

Add to Reading List

Source URL: www.eisst.com

Language: English
194Cryptographic software / Encrypting File System / Windows / Portable Document Format / Windows Vista / Computer file / Features new to Windows XP / Features new to Windows Vista / Microsoft Windows / Computing / Electronic documents

WINNING AT THE HACKERS’ GAME: Practical Security that Works H-Files Overview The H-Files is a comprehensive and portable information management system, designed to keep sensitive data confidential and always protected

Add to Reading List

Source URL: www.eisst.com

Language: English
195Computer architecture / CPU cache / MESI protocol / Cache / Central processing unit / MSI protocol / Write-once / Computing / Cache coherency / Computer hardware

Memory Barriers: a Hardware View for Software Hackers Paul E. McKenney Linux Technology Center IBM Beaverton [removed] April 5, 2009

Add to Reading List

Source URL: www.rdrop.com

Language: English - Date: 2009-04-06 00:30:49
196

Resumo executivo Hackers contra o sistema operacional humano Raj Samani, CTO (EMEA) Charles McFarland, engenheiro sênior de pesquisa do MTIS

Add to Reading List

Source URL: www.mcafee.com

Language: Portuguese - Date: 2015-02-25 13:07:03
    197Security / Cyberwarfare / Computer crimes / Electronic warfare / National security / Cyber spying / Hacker / Computer security / Cyberwarfare in the United States / Cybercrime / Hacking / Computing

    [removed]Chinese hackers attack blue-chip groups via Forbes website - FT.com Home Africa

    Add to Reading List

    Source URL: www.veracode.com

    Language: English - Date: 2015-02-10 14:55:33
    198Identity management / Password / Roboform / Password policy / Password strength / Security / Access control / Computer security

    US and UK Password Practices Leave Users Vulnerable, According to Survey Sponsored by Siber Systems uSamp Poll of 1,000 Consumers Shows Widespread Need for Better Security to Combat Hackers Fairfax, VA – March 3, 2015

    Add to Reading List

    Source URL: www.roboform.com

    Language: English
    199Identity management / Roboform / Password / Random password generator / Hacker / Password cracking / Password policy / Security / Computer security / Cryptography

    Siber Systems, Inc. Adds Three Security Tools to RoboForm Site Password Generator, Strength Assessment Tool and Hacking Detector Help Users Fight Back Against Hackers, Keep Data Safe Online Fairfax, VA – October 16, 20

    Add to Reading List

    Source URL: www.roboform.com

    Language: English
    200PGP / Cryptographic software / Privacy software / Pretty Good Privacy / Secure communication / Phil Zimmermann / Key management / Encryption / Email client / Cryptography / Internet privacy / Public-key cryptography

    How to keep hackers, worms and other germs out of your PC This complimentary chapter from The Hackers Nightmare is bought to you by

    Add to Reading List

    Source URL: www.articsoft.com

    Language: English - Date: 2013-12-10 13:50:07
    UPDATE