Password policy

Results: 1593



#Item
81Computer access control / Obfuscation / Computer security / Cryptography / Password / Security / Brute-force attack / Password policy / Password psychology

Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

Add to Reading List

Source URL: www.guanotronic.com

Language: English - Date: 2011-01-14 11:12:10
82Computing / Internet privacy / Economy / World Wide Web / Privacy / Identity documents / HTTP cookie / Information privacy / Personally identifiable information / Google Analytics / Password / PayPal

Made In Love Privacy Policy by SEQ Legal Privacy Policy We are committed to safeguarding the privacy of our website visitors; this policy sets out

Add to Reading List

Source URL: madeinlove.co.uk

Language: English - Date: 2014-05-27 16:28:45
83Obfuscation / Cryptography / Computer security / Prevention / Password / Security / Password policy / Password cracking

Poster: You Can Do Better – Motivational Statements in Password-Meter Feedback David Eargle*, John Godfrey†, Hsin Miao†, Scott Stevenson†, Rich Shay†, Blase Ur†, Lorrie Cranor† *University of Pittsburgh †

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-07-03 02:38:42
84Computer access control / Computer security / Cryptography / Access control / Password / Authentication / Challengeresponse authentication / Security question / Self-service password reset / Password policy

Central Authentication Service Level 2 Security Instructions KFS will be implementing an additional layer of security to address an audit finding regarding our system access. Similar to other systems, KFS will ask users

Add to Reading List

Source URL: www.fmo.hawaii.edu

Language: English - Date: 2014-07-21 21:53:18
85

Policy and Practices for a Baseline Password Standard for UW-MadisonPolicy Rationale The University of Wisconsin-Madison ’s network and information systems provide the technical foundation for conduct of its

Add to Reading List

Source URL: www.cio.wisc.edu

Language: English
    86Internet privacy / Digital rights / Human rights / Identity management / Law / Privacy / HTTP cookie / Password / Prevention / Computer access control / Lamar University / Lamar

    LAMAR UNIVERSITY COLLEGE OF EDUCATION AND HUMAN DEVELOPMENT TK20 PRIVACY POLICY PLEASE READ THE FOLLOWING PRIVACY POLICY CAREFULLY. WHEN YOU USE OUR WEBSITES, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO

    Add to Reading List

    Source URL: education.lamar.edu

    Language: English - Date: 2015-03-10 15:15:15
    87Internet privacy / Computing / Software / Technology / HTTP cookie / Google Analytics / Password / Local shared object / Privacy policy / Privacy / Online advertising / Facebook Beacon

    PDF Document

    Add to Reading List

    Source URL: www.dialogtech.com

    Language: English - Date: 2015-02-27 16:19:04
    88Transport Layer Security / Internet / Privileged password management / Security and safety features new to Windows Vista / Security / Password / Computing

    Security Policy Security Policy www.clickmeeting.com

    Add to Reading List

    Source URL: www.cm-cdn.com

    Language: English - Date: 2014-12-30 07:37:05
    89Software / Time of check to time of use / User identifier / Capability-based security / Setuid / Filesystem permissions / Group identifier / Shadow password / Ptrace / Unix / System software / Computing

    View access control as a matrix Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:

    Add to Reading List

    Source URL: www.scs.stanford.edu

    Language: English - Date: 2010-03-04 18:26:58
    90Computer-mediated communication / Spamming / Cybercrime / Spam / Usenet / Acceptable use policy / Password / Anti-spam techniques / Internet / Computing / Email

    Acceptable Use Policy This Acceptable Use Policy specifies the actions prohibited by Unilynx, to users of the Unilynx Network. Unilynx reserves the right to modify the Policy at any time. ILLEGAL USE. The Unilynx Netwo

    Add to Reading List

    Source URL: www.unilynx.co.za

    Language: English - Date: 2009-10-15 06:21:28
    UPDATE