Search results

Results 1 – 20 of 91
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Thumbnail for Direct Rendering Infrastructure
    DRI3 gets rid of the old insecure GEM buffer sharing mechanism based on GEM names (global GEM handles) for passing buffer objects between a DRI client and...
    33 KB (3,526 words) - 15:19, 20 November 2023
  • Thumbnail for WikiLeaks
    Domscheit-Berg And WikiLeaks' Insecure Future". The Awl. Retrieved 26 July 2022. Nordstrom, Louise (10 December 2010). "Former WikiLeaks worker: Rival...
    364 KB (33,157 words) - 06:38, 16 April 2024
  • PHP Data Objects
    )
    2023-06-30. "PHP: rfc:object-typehint". wiki.php.net. "PHP: rfc:libsodium". wiki.php.net. "PHP: rfc:allow-abstract-function-override". wiki.php.net. "PHP:...
    135 KB (12,024 words) - 05:37, 18 April 2024
  • SIP communication will be insecure. In contrast, the HTTPS protocol provides end-to-end security as it is done with a direct connection and does not involve...
    29 KB (3,357 words) - 10:02, 13 April 2024
  • List of TCP and UDP port numbers (category Articles needing additional references from June 2023)
    "Manual:IP/Services - MikroTik Wiki". wiki.mikrotik.com. Retrieved 2024-02-22. "NCPA Configuration". "Hazelcast 3.9 Reference Manual". docs.hazelcast.org...
    313 KB (12,688 words) - 08:38, 15 April 2024
  • Thumbnail for Python (programming language)
    Python (programming language) (category Object-oriented programming languages)
    programming paradigms, including structured (particularly procedural), object-oriented and functional programming. It is often described as a "batteries...
    159 KB (13,251 words) - 15:45, 16 April 2024
  • List of scams (category Articles covered by WikiProject Wikify from August 2022)
    Particular scams are mainly directed toward elderly people, as they may be gullible and sometimes inexperienced or insecure, especially when the scam involves...
    102 KB (14,125 words) - 00:26, 10 April 2024
  • List of The Transformers (TV series) characters (category Articles lacking reliable references from February 2023)
    net/wiki/Rubbish https://tfwiki.net/wiki/HAZMAT "Ashtray - Transformers Wiki". "Greasestain - Transformers Wiki". "Wasteoid Gamma - Transformers Wiki"....
    349 KB (2,254 words) - 21:43, 15 April 2024
  • 2012-06-27. We looked very carefully at Delphi Object Pascal and built a working prototype of bound method references in order to understand their interaction...
    66 KB (8,089 words) - 05:33, 28 March 2024
  • Thumbnail for Java (software platform)
    optimization to allocate on the stack instead) and all variables of object types are references. Memory management is handled through integrated automatic garbage...
    77 KB (8,769 words) - 19:08, 16 April 2024
  • Thumbnail for Aadhaar
    app and validation software are insecure, the Aadhaar system itself is insecure, the network infrastructure is insecure, and the laws are inadequate,"...
    186 KB (16,590 words) - 14:18, 13 April 2024
  • Star Wars: Young Jedi Adventures (category Use list-defined references from May 2022)
    Deadline. Retrieved January 22, 2024. Official website Star Wars: Young Jedi Adventures at IMDb Young Jedi Adventures on Wookieepedia, a Star Wars wiki...
    66 KB (1,436 words) - 18:08, 24 March 2024
  • Environment variable (category Articles needing additional references from May 2023)
    Environments, Macros, Character Sets, and Miscellany Reference Manual "Environment Variables Wiki". Archived from the original on 2019-04-27. User Environment...
    101 KB (10,249 words) - 07:36, 25 February 2024
  • List of My Little Pony villains (category Articles covered by WikiProject Wikify from September 2014)
    force that convinced Luna to turn against her sister, feeding off of her insecurities to take control of her mind and body. She is also revealed to be capable...
    65 KB (17 words) - 13:30, 22 February 2024
  • sympathetic member of the Birling family over the course of the play, being insecure about her appearance, showing remorse for her part in Eva's downfall and...
    31 KB (3,836 words) - 10:34, 17 April 2024
  • Computer insecurity
    )
    holds. Default secure settings, and design to fail secure rather than fail insecure (see fail-safe for the equivalent in safety engineering). Ideally, a secure...
    217 KB (22,070 words) - 05:06, 17 April 2024
  • BitTorrent (category Pages with login required references or sources)
    swarm in one's own client or firewall program. This may expose users with insecure systems to attacks. In some countries, copyright organizations scrape lists...
    89 KB (9,169 words) - 16:43, 7 April 2024
  • it is still hers to treasure, giving him pause for thought. Meanwhile, insecure that Fry may only be attracted to her for her body, Leela switches bodies...
    21 KB (2,690 words) - 13:30, 5 April 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)