log-on password
91Network security — In the field of networking, the area of network security[1] consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and… …
92Windows Live ID — An example of a Windows Live ID sign in page Type Single sign on …
93Hardware keylogger — Hardware Keyloggers are used for keystroke logging, a method of capturing and recording computer user keystrokes. They plug in between a computer keyboard and a computer and log all keyboard activity to an internal memory. They are typically… …
94Passwd (command) — passwd is a tool on most Unix and Unix like operating systems used to change a user s password. The passwd entered by the user is run through a key derivation function to create a hashed version of the new password, which is saved. Only the… …
95Yubikey — is a device that acts as a USB keyboard and provides secure authentification by a one time password algorithm. The Yubikey is what is known as a security token The device is created by a company called Yubico. The device creates a 128 bit string… …
96The Da Vinci Code — This article is about the novel. For other uses, see The Da Vinci Code (disambiguation). The Da Vinci Code …
97Windows Malicious Software Removal Tool — Malicious Software Removal Tool A screenshot of Malicious Software Removal Tool Developer(s) Mic …
98XMLHttpRequest — (XMLHTTP, XHR)  API, доступное в скриптовых языках браузеров, таких как JavaScript. Использует запросы HTTP или HTTPS напрямую к веб серверу и загружает данные ответа сервера напрямую в вызывающий скрипт.[1] Информация может передаваться в… …
99Data Protection API — DPAPI (Data Protection Application Programming Interface) is a simple cryptographic application programming interface available as a built in component in Windows 2000 and later versions of Microsoft Windows operating systems. In theory the Data… …
100OpenMediaVault — WebGUI OpenMediaVault Разработчик Volker Theile …