Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • A loophole is an ambiguity or inadequacy in a system, such as a law or security, which can be used to circumvent or otherwise avoid the purpose, implied...
    2 KB (264 words) - 23:26, 12 January 2024
  • Thumbnail for Ping (networking utility)
    ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It is available...
    19 KB (1,910 words) - 20:53, 8 April 2024
  • Cynet (company) (category Computer security organizations)
    Cynet is a cyber-security company. It converges essential cyber security technologies that help enterprises to identify security loopholes, and threat intelligence...
    7 KB (448 words) - 14:19, 17 August 2023
  • Thumbnail for Gun show loophole
    Gun show loophole is a political term in the United States referring to the sale of firearms by private sellers, including those done at gun shows, that...
    70 KB (7,325 words) - 10:05, 11 June 2024
  • Thumbnail for Safeguarding National Security Ordinance
    legislation under "the sooner, the better" principle to plug the national security loophole. He also said there had been sufficient public discussion on the legislation...
    65 KB (6,215 words) - 15:22, 15 June 2024
  • "Crypto-gram: August 15, 2003 - Schneier on Security". www.schneier.com. "A dangerous loophole in airport security. – By Andy Bowers – Slate Magazine". Archived...
    31 KB (3,224 words) - 02:38, 3 May 2024
  • To block the national security loophole in Hong Kong, in 2020, China's National People's Congress passed a National Security Law for Hong Kong which...
    26 KB (3,046 words) - 00:44, 13 June 2024
  • Thumbnail for Point of sale
    needing a password from an authorized superior also represents a security loophole. Even a function to issue a receipt with a negative amount which can...
    61 KB (8,142 words) - 12:43, 12 June 2024
  • Thumbnail for MI5
    MI5 (redirect from British Security Service)
    The Security Service, also known as MI5 (Military Intelligence, Section 5), is the United Kingdom's domestic counter-intelligence and security agency and...
    70 KB (7,657 words) - 12:04, 14 May 2024
  • Time-of-check to time-of-use (category Computer security exploits)
    Linux manual page. 2017-09-15. Shangde Zhou(周尚德) (1991-10-01). "A Security Loophole in Unix". Archived from the original on 2013-01-16. Acheson, Steve...
    13 KB (1,375 words) - 08:22, 13 October 2023
  • referred to as the "Day of the Jackal fraud" and remained a well known security loophole in the UK until 2007. The New Zealand Member of Parliament David Garrett...
    38 KB (4,828 words) - 09:50, 4 June 2024
  • February 26, 2022. Senior, Tom (October 16, 2012). "Steam browser security loophole spotted". PC Gamer. Archived from the original on August 12, 2013...
    291 KB (25,825 words) - 22:53, 16 June 2024
  • highlighting how the bombers exploited a security loophole after "having spotted a breach in the usually tight security around the City". There was also a message...
    29 KB (3,031 words) - 23:27, 24 April 2024
  • "Researchers' Typosquatting Stole 20 GB of E-Mail From Fortune 500". Wired. 8 Sep 2011. "Bad spelling opens up security loophole". BBC. 12 Sep 2011. v t e v t e...
    2 KB (205 words) - 16:51, 4 March 2024
  • The iOS operating system utilizes many security features in both hardware and software, from the boot process to biometrics. Before fully booting into...
    18 KB (1,921 words) - 17:52, 11 June 2024
  • "Enron loophole" exempts most over-the-counter energy trades and trading on electronic energy commodity markets from government regulation. The "loophole" was...
    3 KB (337 words) - 06:04, 26 September 2020
  • identified as Telesforo Aviles, used a security loophole to give himself permission to access customer accounts. The loophole was inadvertently discovered when...
    9 KB (820 words) - 14:38, 12 June 2024
  • Issue: 17". The Jamestown Foundation. Retrieved 28 November 2014. "Security 'loophole' admitted." Bangkok Post. 18 September 2006. Page 1. Hookway, James...
    4 KB (414 words) - 23:55, 9 March 2024
  • Loophole is a 1981 British heist crime film directed by John Quested and starring Albert Finney, Martin Sheen, Susannah York, Jonathan Pryce, Colin Blakely...
    7 KB (686 words) - 18:28, 2 December 2023
  • Thumbnail for Chaim Kanievsky
    (April 7, 2014). "Haredi users of "non-kosher" phones revealed through security loophole". Haaretz. Retrieved February 19, 2017. "Rabbi: Never Marry a Man...
    29 KB (2,498 words) - 11:34, 14 June 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)