Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Thumbnail for Communications security
    Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still...
    9 KB (1,011 words) - 18:23, 26 August 2024
  • Thumbnail for Fair use
    Company. The Statute of Anne did not provide for legal unauthorized use of material protected by copyright. In Gyles v Wilcox, the Court of Chancery established...
    77 KB (9,700 words) - 17:55, 2 September 2024
  • Thumbnail for Communication
    Communication (redirect from Communications)
    is not intercepted by an unauthorized third party. This can be achieved by using cryptography, which changes the format of the transmitted information...
    190 KB (18,449 words) - 07:49, 8 September 2024
  • Thumbnail for NTT Communications
    On 28 May 2020, the firm announced the possibility of information leakage because of unauthorized access, however, no information related to consumer...
    24 KB (2,456 words) - 19:43, 27 July 2024
  • Thumbnail for Axis Communications
    Axis Communications AB is a Swedish manufacturer of network cameras, access control, and network audio devices for the physical security and video surveillance...
    36 KB (3,239 words) - 01:16, 5 September 2024
  • Thumbnail for Computer network
    by many criteria, including the transmission medium used to carry signals, bandwidth, communications protocols to organize network traffic, the network...
    96 KB (11,350 words) - 14:35, 19 August 2024
  • Thumbnail for Baofeng UV-5R
    Retrieved 2022-07-21. "FCC Cites Baofeng Importer for Illegally Marketing Unauthorized RF Devices". www.arrl.org. Retrieved 2022-07-16. "10 Best Baofeng Radio...
    12 KB (984 words) - 03:31, 8 August 2024
  • security rather than secure communications. Encryption is a method in which data is rendered hard to read by an unauthorized party. Since encryption methods...
    18 KB (2,426 words) - 15:06, 17 June 2024
  • Digital Imaging and Communications in Medicine (DICOM) is a technical standard for the digital storage and transmission of medical images and related information...
    31 KB (3,866 words) - 00:49, 5 September 2024
  • Thumbnail for Kevin Mitnick
    Kevin Mitnick (category Use mdy dates from July 2023)
    of wire or electronic communications, unauthorized access to a federal computer, and causing damage to a computer. As part of a plea bargain, Mitnick...
    38 KB (3,178 words) - 23:32, 15 August 2024
  • Doxbin (clearnet) (category Use dmy dates from November 2023)
    with intent to impair the reliability of data; One count of fraud by false representation; One count of unauthorized access to a computer with intent to...
    7 KB (644 words) - 09:37, 17 July 2024
  • Thumbnail for Mobile phone
    populations, and exemptions. In the U.S., Federal Communications Commission (FCC) regulations prohibit the use of mobile phones aboard aircraft in flight. Contrary...
    80 KB (9,174 words) - 03:15, 9 September 2024
  • Thumbnail for Electronic Communications Privacy Act
    Title III of the Omnibus Crime Control and Safe Streets Act of 1968 (the Wiretap Statute), which was primarily designed to prevent unauthorized government...
    16 KB (1,741 words) - 20:16, 1 September 2024
  • whether they cause interference or unauthorized receipt of service (the only two factors which providers may use to restrict allowable modems under FCC...
    73 KB (6,360 words) - 10:26, 30 August 2024
  • Thumbnail for Citizens band radio
    Originally, CB (named Citizens Radio by the Federal Communications Commission as of 1972) required the use of a callsign in addition to a purchased license...
    79 KB (9,863 words) - 04:31, 10 August 2024
  • Threat (computer security) (category Use dmy dates from October 2019)
    assumes unauthorized logical or physical control of a system resource. "Theft of service" Unauthorized use of service by an entity. "Theft of functionality"...
    39 KB (4,698 words) - 19:45, 14 August 2024
  • Thumbnail for Family Radio Service
    Family Radio Service (category Use American English from December 2021)
    intentionally restricts the range of communications, allowing greatest use of the available channels by the community. The use of duplex radio repeaters and...
    14 KB (1,698 words) - 22:55, 1 April 2024
  • United States military nuclear incident terminology (category United States Department of Defense)
    include: Accidental, unauthorized, or unexplained nuclear detonation or possible detonation. Accidental or unauthorized launch of a nuclear-armed or nuclear-capable...
    10 KB (1,028 words) - 23:25, 22 August 2024
  • Tom Cruise: An Unauthorized Biography is an unauthorized biography of actor Tom Cruise, written by Andrew Morton. The book was published in the United...
    46 KB (4,829 words) - 21:08, 3 August 2024
  • the unauthorized insertion of content into an encrypted SSH stream due to insufficient data integrity protection from CRC-32 used in this version of the...
    38 KB (4,255 words) - 14:11, 9 September 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)