log-on password

  • 101Wake-on-LAN — (WOL) is an Ethernet computer networking standard that allows a computer to be turned on or woken up by a network message. The message is usually sent by a program executed on another computer on the same local area network. It is also possible… …

    Wikipedia

  • 102Expect — Infobox Software name = Expect author = Don Libes latest release version = 5.44.1 latest release date = January 31 2006 programming language = Tcl operating system = POSIX, Windows license = Public domain [cite web |… …

    Wikipedia

  • 103Computer Misuse Act 1990 — United Kingdom Parliament Long title An Act to make provision for securing computer material against unauthorised access or modification; and for connected purposes. Statute book …

    Wikipedia

  • 104Hacker (computer security) — This article is part of a series on …

    Wikipedia

  • 105Shibboleth (computer security) — Within the field of computer security, the word shibboleth is sometimes used fact|date=December 2007 with a different meaning than the usual meaning of verbal, linguistic differentiation. The general concept of shibboleth is to test something,… …

    Wikipedia

  • 106Features of the Opera web browser — This article is about the features of the Opera web browser. Contents 1 Usability and accessibility 1.1 Fit to Window 1.2 Page zooming 1.3 Voice control …

    Wikipedia

  • 107Porte dérobée — Dans un logiciel, une porte dérobée (de l anglais backdoor, littéralement porte de derrière) est une fonctionnalité inconnue de l utilisateur légitime, qui donne un accès secret au logiciel. L introduction d une porte dérobée dans un logiciel à l …

    Wikipédia en Français

  • 108Oracle Database — Developer(s) Oracle Corporation Development status Active Written in …

    Wikipedia

  • 109The Cuckoo's Egg (book) — For the science fiction novel by C. J. Cherryh, see Cuckoo s Egg (novel). For the number sequence, see Look and say sequence. The Cuckoo s Egg   …

    Wikipedia

  • 110Port knocking — In networking, port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports. Once a correct sequence of connection attempts is received, the firewall rules are… …

    Wikipedia