log-on password

  • 81Соль (криптография) — У этого термина существуют и другие значения, см. Соль (значения). В этой статье не хватает ссылок на источники информации. Информация должна быть проверяема, иначе она может быть поставлена под сомнение и удалена. Вы можете …

    Википедия

  • 82Kerberos (protocol) — Kerberos is a computer network authentication protocol, which allows individuals communicating over a non secure network to prove their identity to one another in a secure manner. It is also a suite of free software published by Massachusetts… …

    Wikipedia

  • 83Diffie–Hellman key exchange — (D–H)[nb 1] is a specific method of exchanging keys. It is one of the earliest practical examples of key exchange implemented within the field of cryptography. The Diffie–Hellman key exchange method allows two parties that have no prior knowledge …

    Wikipedia

  • 84Concurrent Versions System — Developer(s) The CVS Team Initial release November 19, 1990; 21 years ago (1990 11 19) Stable release …

    Wikipedia

  • 85Terminal Services — Infobox Software name = Terminal Services developer = Microsoft operating system = Microsoft Windows, Mac OS X latest release version = 6.0.6001.18000 latest release date = February 4, 2008 use = Remote Desktop Access license = MS EULA website =… …

    Wikipedia

  • 86Remote Desktop Services — Developer(s) Microsoft Stable release 7.0 (6.1.7600) / October 27, 2009 …

    Wikipedia

  • 87sudo — El programa sudo (del inglés superuser do) es una utilidad de los sistemas operativos tipo Unix, como Linux, BSD, o Mac OS X, que permite a los usuarios ejecutar programas con los privilegios de seguridad de otro usuario (normalmente el usuario… …

    Wikipedia Español

  • 88Authentication — (from Greek αυθεντικός; real or genuine, from authentes; author) is the act of establishing or confirming something (or someone) as authentic , that is, that claims made by or about the thing are true. This might involve confirming the identity… …

    Wikipedia

  • 89IBM System/36 — The IBM System/36 was a minicomputer marketed by IBM from 1983 to 2000. It was a multi user, multi tasking successor to the System/34. Like the System/34 and the older System/32, the System/36 was primarily programmed in the RPG II language. One… …

    Wikipedia

  • 90Timing attack — In cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. The attack exploits the fact that every operation in a computer …

    Wikipedia