Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • sandboxing involves HTML rendering in a Web browser. Secure Computing Mode (seccomp) strict mode, seccomp only allows the write(), read(), exit(), and...
    10 KB (999 words) - 16:44, 26 May 2025
  • Thumbnail for Next-Generation Secure Computing Base
    The Next-Generation Secure Computing Base (NGSCB; codenamed Palladium and also known as Trusted Windows) is a software architecture designed by Microsoft...
    79 KB (7,349 words) - 10:48, 27 May 2025
  • (commonly AES-128) operated in counter mode for encryption, and uses arithmetic in the Galois field GF(2128) to compute the authentication tag; hence the name...
    23 KB (3,051 words) - 20:21, 24 March 2025
  • Galois Counter Mode for the Secure Shell Transport Layer Protocol (August 2009) RFC 5656 – Elliptic Curve Algorithm Integration in the Secure Shell Transport...
    41 KB (4,509 words) - 15:10, 30 May 2025
  • In computing, preemption is the act performed by an external scheduler — without assistance or cooperation from the task — of temporarily interrupting...
    12 KB (1,417 words) - 12:19, 30 April 2025
  • Thumbnail for UEFI
    UEFI (redirect from Windows 8 secure boot)
    as an acronym) is a specification for the firmware architecture of a computing platform. When a computer is powered on, the UEFI-implementation is typically...
    105 KB (10,687 words) - 17:07, 4 June 2025
  • This is a list of computing and IT acronyms, initialisms and abbreviations. 0–9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z See also References...
    92 KB (6,587 words) - 14:00, 24 May 2025
  • allowing secure upgrades of the trusted computing base poses bootstrap problems of its own. As stated above, trust in the trusted computing base is required...
    12 KB (1,629 words) - 23:23, 11 March 2025
  • Any change in a computing system, such as a new feature or new component, is transparent if the system after change adheres to previous external interface...
    6 KB (794 words) - 19:17, 7 March 2025
  • the study and practice of environmentally sustainable computing or IT. The goals of green computing include optimising energy efficiency during the product's...
    74 KB (7,569 words) - 00:49, 24 May 2025
  • Thumbnail for SD card
    SD card (redirect from Secure digital)
    Secure Digital (SD) is a proprietary, non-volatile, flash memory card format developed by the SD Association (SDA). Owing to their compact size, SD cards...
    159 KB (14,090 words) - 02:52, 6 June 2025
  • applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible. The TLS protocol aims primarily...
    178 KB (17,517 words) - 09:45, 16 May 2025
  • is based on an industry initiative by the Trusted Computing Group (TCG) to promote safer computing. It defends against software-based attacks aimed at...
    13 KB (1,583 words) - 11:59, 23 May 2025
  • for FTP data channels. Software packages that support this mode include: Tectia ConnectSecure (Win/Linux/Unix) of SSH Communications Security's software...
    34 KB (4,034 words) - 04:12, 4 June 2025
  • leak, analogous to a memory leak for previously allocated memory. In secure computing terms, because access to a resource via a handle is mediated by another...
    6 KB (830 words) - 04:11, 26 March 2025
  • In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted...
    44 KB (5,337 words) - 03:03, 15 May 2025
  • while the original OCB1 as well as OCB3 from 2011 are still considered secure. OCB mode was designed to provide both message authentication and privacy. It...
    8 KB (843 words) - 01:40, 25 May 2025
  • Thumbnail for ARM architecture family
    virtualization requirements for the non-secure operation of the CPU. Thread mode (ARMv6-M, ARMv7-M, ARMv8-M): A mode which can be specified as either privileged...
    142 KB (13,723 words) - 01:14, 6 June 2025
  • BitLocker (redirect from Secure Startup)
    sector. BitLocker originated as a part of Microsoft's Next-Generation Secure Computing Base architecture in 2004 as a feature tentatively codenamed "Cornerstone"...
    37 KB (3,534 words) - 03:51, 24 April 2025
  • Thumbnail for Fork bomb
    Fork bomb (redirect from Wabbit (computing))
    In computing, a fork bomb (also called rabbit virus) is a denial-of-service (DoS) attack wherein a process continually replicates itself to deplete available...
    8 KB (810 words) - 04:35, 11 May 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)