Search results

Results 1 – 20 of 126
Advanced search

Search in namespaces:

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Thumbnail for Multi-factor authentication
    Multi-factor authentication (MFA; two-factor authentication, or 2FA, along with similar terms) is an electronic authentication method in which a user...
    36 KB (4,253 words) - 08:47, 13 September 2023
  • Thumbnail for Wiki
    Internet access, a web browser, and a basic understanding of a simple markup language (e.g. MediaWiki markup language). A single page in a wiki website...
    58 KB (6,454 words) - 08:41, 25 September 2023
  • Thumbnail for Wireless LAN
    one access point (AP) to another AP within a home network if the signal strength is too weak. An authentication server performs the re-authentication of...
    14 KB (1,926 words) - 17:23, 14 May 2023
  • C. (January 1985). Authentication Server. IETF. p. 1. doi:10.17487/RFC0931. RFC 931. Retrieved 2016-10-17. ... The Authentication Server Protocol provides...
    306 KB (12,378 words) - 19:48, 24 September 2023
  • Wideband Code Division Multiple Access)
    radio access network (UMTS Terrestrial Radio Access Network, or UTRAN), the core network (Mobile Application Part, or MAP) and the authentication of users...
    69 KB (8,809 words) - 19:57, 19 September 2023
  • Thumbnail for X display manager
    is authenticated. Producing the correct response might require the display manager to have access to a secret key, for example. If authentication succeeds...
    11 KB (1,234 words) - 21:06, 30 March 2023
  • Thumbnail for Information security)
    (eye) scans Strong authentication requires providing more than one type of authentication information (two-factor authentication). The username is the...
    189 KB (22,078 words) - 22:16, 3 September 2023
  • Comparison of privilege authorization features (category Computer access control)
    For example, the authentication dialog for a system equipped with a fingerprint reader might look different from an authentication dialog for a system...
    24 KB (2,341 words) - 00:57, 24 September 2023
  • Thumbnail for PostgreSQL
    that authentication system are allowed to connect as a specific database user. These methods are specified in the cluster's host-based authentication configuration...
    90 KB (7,775 words) - 10:13, 18 September 2023
  • Google Wave (category Wikis)
    participants have no access or knowledge of them. Security for the communications is provided via Transport Layer Security authentication, and encrypted connections...
    30 KB (3,206 words) - 21:49, 14 August 2023
  • Thumbnail for Operating system
    be a process of authentication. Often a username must be quoted, and each username may have a password. Other methods of authentication, such as magnetic...
    103 KB (12,209 words) - 00:36, 16 September 2023
  • Comparison of open-source configuration management software (category Articles covered by WikiProject Wikify from November 2013)
    PIKT uses shared secret keys for mutual authentication. "As an option, you can use secret key authentication to prove the master's identity to the slave...
    46 KB (3,433 words) - 17:17, 14 August 2023
  • Thumbnail for Proxy server
    problems for HTTP authentication, especially connection-oriented authentication such as NTLM, as the client browser believes it is talking to a server rather...
    46 KB (5,412 words) - 05:19, 16 September 2023
  • Thumbnail for PHP
    same type have access to each other's private and protected members even though they are not the same instance. The following is a basic example of object-oriented...
    132 KB (12,735 words) - 12:00, 26 September 2023
  • Thumbnail for Aadhaar
    India (UIDAI) introduces Face Authentication to further strengthen Aadhaar security. It decided to enable 'Face Authentication' in fusion mode on registered...
    183 KB (16,250 words) - 09:45, 24 September 2023
  • MultiUser Talk)
    ZDaemon have included IRC. Ustream's chat interface is IRC with custom authentication as well as Twitch's (formerly Justin.tv). A typical use of bots in IRC...
    73 KB (8,496 words) - 03:02, 10 September 2023
  • Thumbnail for Microsoft Data Access Components
    integrated logon authentication mechanism via the use of Windows Authentication. Windows Authentication is not supported on Windows 98 or Windows Me. OLE DB (also...
    58 KB (6,845 words) - 16:14, 2 February 2023
  • Thumbnail for List of HTTP header fields
    Amos Jeffries (July 2, 2010). "SquidFaq/ConfiguringSquid - Squid Web Proxy Wiki". Retrieved September 10, 2009. The Apache Software Foundation. "mod_proxy...
    52 KB (2,447 words) - 16:57, 17 September 2023
  • is the management of legal access to digital content. Various tools or technological protection measures (TPM) like access control technologies, can restrict...
    114 KB (11,073 words) - 22:01, 21 September 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)