Search results

Jump to navigation Jump to search
  • ...cryption]] and [[decryption]] computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, e PGP and similar software follow the OpenPGP standard (RFC 4880) for encrypting and decrypting data.
    719 bytes (91 words) - 15:21, 3 May 2020
  • ...egtlin in 2013. Its mission is to develop, package and distribute Electrum software, and to provide services to Bitcoin users and businesses. * [[GNU Privacy Guard]] ([[GnuPG]] or [[GPG]])
    791 bytes (87 words) - 15:08, 3 May 2020
  • ...approach to instant messaging that doesn’t trust anyone in protecting your privacy. Ricochet Refresh uses the original Ricochet open-source software but has improved on it substantially, such as upgrading its security and ma
    926 bytes (129 words) - 21:33, 15 July 2021
  • ...ement |title=Microsoft Enterprise and Developer Privacy Statement |website=privacy.microsoft.com |publisher=Microsoft |access-date=4 November 2016 |archive-ur ''[[VSCodium]]'' is an alternative binary distribution of the software which uses only the open-source parts and omits Microsoft’s trademarks an
    4 KB (536 words) - 08:22, 18 April 2020
  • ...n Identification]] system.<ref name=Verge2014/> One of the creators of the software, Yaniv Taigman, came to Facebook via their 2007 acquisition of [[Face.com]] ...its users in early 2015, with the exception of users in the EU due to data privacy laws there.<ref name=DailyMail2015/>
    6 KB (751 words) - 03:05, 3 April 2019
  • *[[Pretty Good Privacy]] ([[PGP]]) [[Category:Privacy]]
    2 KB (294 words) - 15:24, 3 May 2020
  • '''Tribler''' is a traditonal [[BitTorrent]] compatible software. But you can use one to three [[hop]]s([[node]]s) to prevent to trace by th >This is not what i expect from a client claiming to protect my [[privacy]].
    1 KB (211 words) - 02:09, 24 October 2019
  • ...[[Tor hidden service]] and needed to have [[Tor (anonymity network)|Tor]] software installed on a computer to access Tor hidden services. Users were not requi ...ard drive]] of those servers was the [[Exim|Exim mail server]] and the Tor software. "No emails, logs or personal data were stored on those servers, thus it do
    5 KB (778 words) - 16:18, 12 March 2020
  • ...ting. Use Linux, BSD.|website=distrowatch.com}}</ref> It aims to provide [[privacy]], [[Computer Security|security]] and [[anonymity]] on the internet. The op * Whonix - Software That Can Anonymize Everything You Do Online
    6 KB (954 words) - 15:24, 30 June 2020
  • {{Primary sources|date=October 2018}}{{Infobox software | programming language = [[Electron (software framework)|Electron]] (back-end), [[CoffeeScript]] / [[JavaScript]] / [[Les
    11 KB (1,413 words) - 09:50, 2 July 2019
  • ...ll, ready-to-use and easy to use. The project goal is to combine security, privacy, stability, usability, openness, freedom and to be free of charge. ...2013]</ref> || November 7, 2013 || {{Dunno}} || {{Unbulleted list|[[MATE (software)|MATE]] 1.6|[[Xfce]] 4.10}} || [[LibreOffice]] exchanged for [[Apache OpenO
    6 KB (754 words) - 05:01, 16 July 2021
  • {{Infobox software ...d under the terms of the [[GNU General Public License]], so Phex is [[free software]]. Phex is based on [[Java SE]] 5.0 or later.
    8 KB (1,124 words) - 19:14, 9 September 2018
  • [[Category:2003 software]] [[Category:Cross-platform free software]]
    11 KB (1,743 words) - 17:12, 27 March 2019
  • *'''GNU Privacy Assistant'''&mdash;comes with the GPG binary package for almost every platf #**GNU Privacy Assistant:
    15 KB (2,409 words) - 14:40, 29 November 2017
  • *'''GNU Privacy Assistant'''&mdash;comes with the GPG binary package for almost every platf #**GNU Privacy Assistant:
    15 KB (2,409 words) - 12:24, 14 November 2019
  • ...an open-source [[cryptocurrency]] created in April 2014 that focuses on [[privacy]], decentralization, and [[scalability]] that runs on Windows, MacOS, Linux The focus on privacy has attracted illicit use by people interested in evading law enforcement.
    14 KB (2,081 words) - 02:25, 3 February 2021
  • ...as a [[web application]] running on a [[web server]]. Examples of webmail software are [[Roundcube]] and [[SquirrelMail]]. Examples of [[Comparison of webmail ...eed to be connected to the internet while using it. There exist also other software tools to integrate parts of the webmail functionality into the OS (e.g. cre
    13 KB (1,982 words) - 02:13, 24 October 2016
  • {{Infobox software | programming language = [[Python language]] (server tools), [[Jekyll (software)]] (site), [[Java language]] (client)
    15 KB (1,929 words) - 18:02, 27 March 2019
  • [[gpg4usb]] is an encryption software using [[GPG]] ([[PGP]]). It is for [[Linux]] and [[Windows]]. * [[GNU Privacy Guard]] ([[GnuPG]] or [[GPG]])
    9 KB (1,429 words) - 08:04, 14 June 2021
  • | industry = [[Software]] '''Wickr''' is an American software company based in San Francisco.<ref name=WSJ2014>{{cite news |title=A start
    21 KB (2,715 words) - 15:00, 27 March 2019
  • ...]] that is a [[Linux]] version of [[eMule]]. [[eMule]] is an [[open source software]] version of [[eDonkey]]. ...nk is for download but it will work in [[I2P]] network only. An encryption software [[TrueCrypt]] make secure your data from police. Current supported systems
    20 KB (3,310 words) - 01:48, 23 April 2021
  • {{Infobox software ...nse>{{Cite web |url=https://code.visualstudio.com/license |title=Microsoft Software License Terms |website=code.visualstudio.com |publisher=[[Microsoft]] |acce
    27 KB (3,641 words) - 17:31, 12 May 2019
  • {{hatnote|This article is about the organization. For the organization's software, see [[Tor (anonymity network)]]}} ...rights and freedoms by creating and deploying free and open anonymity and privacy technologies, supporting their unrestricted availability and use, and furth
    24 KB (3,070 words) - 05:26, 6 April 2019
  • {{hatnote|This article is about the organization. For the organization's software, see [[Tor (anonymity network)]]}} ...rights and freedoms by creating and deploying free and open anonymity and privacy technologies, supporting their unrestricted availability and use, and furth
    24 KB (3,065 words) - 15:23, 30 June 2020
  • The importance of decentralization in terms of freedom of expression, privacy and anonymity cannot be emphasized. Because without a central power to cont ...tory is different. This is because the company does not'operate' messenger software.
    8 KB (1,241 words) - 19:21, 8 December 2020
  • ...ng]], [[internet chat|chatting]], [[blogging]] and [[file transfer]]s. The software that [[Implementation|implements]] this layer is called an ''I2P [[Router ( ...Free software|free]] and [[open source]] and is published under multiple [[software license|licenses]]. The name ''I2P'' is derived from ''Invisible Internet P
    29 KB (4,622 words) - 01:48, 23 April 2021
  • {{Infobox software | operating system = [[Windows]], [[Linux]], [[OS X]], [[Android (software)|Android]], [[iOS]], [[FreeBSD]], [[OpenIndiana]], [[Sailfish OS]]
    16 KB (2,294 words) - 07:25, 10 April 2020
  • ...n nations in a coordinated effort to crack down on the [[Tor|Tor anonymity software]] and capitalize on the inherent weaknesses of [[Tor]] to attack and pinpoi ...tp://nomadcapitalist.com/2013/12/15/top-5-best-countries-host-website-data-privacy/</ref>
    16 KB (2,447 words) - 02:14, 24 October 2016
  • {{Infobox software ...ox/addon/noscript/developers|archivedate=2011-10-09|df=}}</ref> an Italian software developer and member of the Mozilla Security Group.<ref name="mozilla-sec-g
    22 KB (3,055 words) - 19:44, 6 September 2019
  • Unlike [[computer virus]]es, [[Computer worm|worms]], and [[rogue security software]]s, trojans generally do not attempt to inject themselves into other files ...an horses? Perhaps it is more important to trust the people who wrote the software.'' He mentioned that he knew about the possible existence of trojans from a
    16 KB (2,048 words) - 14:11, 10 May 2020
  • A '''virtual assistant''' or '''intelligent personal assistant''' is a [[software agent]] that can perform tasks or services for an individual. Sometimes the ...on software were [[automated attendant]] and medical [[digital dictation]] software.<ref>{{cite web|last=Zwass |first=Vladimir |url=https://www.britannica.com/
    27 KB (3,675 words) - 20:50, 20 November 2018
  • {{Infobox software | discontinued = <!-- Set to yes if software is discontinued, otherwise omit -->
    11 KB (1,482 words) - 14:46, 8 August 2020
  • ...ered easily by unauthorized people. Disk encryption uses [[disk encryption software]] or [[disk encryption hardware|hardware]] to [[encryption|encrypt]] every ...fly encryption''' ('''OTFE'''), is a method used by some [[disk encryption software]]. "Transparent" refers to the fact that data is automatically encrypted or
    16 KB (2,315 words) - 11:24, 18 May 2020
  • http://shadowlife.i2p/ focuses on Privacy · how to protect it and why it matters | Blog and Forum{{verified link|dat ...://freedomforum.i2p/ Privacy Forum - surveillance, censorship, encryption, software &amp; more{{verified link|date=November 2013}}
    11 KB (1,640 words) - 13:31, 25 December 2019
  • * [[Tribler]]: It's a traditonal [[BitTorrent]] compatible software. But you can use one to three [[hop]]s([[node]]s) to prevent to trace by th * [[Tor]]: It is a [[dark web]] software. You can download [[Tor Browser]] from Google [[Play Store]]. https://www.t
    17 KB (2,596 words) - 17:55, 14 June 2021
  • ...deal with a new bloated, unaudited, closed-source, and different piece of software for each device and protocol. [[Pidgin (software)]]
    20 KB (2,715 words) - 07:25, 10 April 2020
  • A '''web browser''' (commonly referred to as a '''browser''') is a [[software application]] for accessing information on the [[World Wide Web]]. Each ind ...e [[Mozilla Foundation]] to create a new browser using the [[open source]] software model. This work evolved into [[Firefox]], first released by Mozilla in 200
    11 KB (1,600 words) - 04:15, 17 November 2018
  • = Software installation methods = ...an compile a [[software]] using this version ports, but I couldn't run the software. Maybe there are some problems.
    17 KB (2,650 words) - 22:25, 20 February 2020
  • ...ty-focused]] [[Debian]]-based [[Linux distribution]] aimed at preserving [[privacy]] and [[anonymity]].<ref name="lwn" /> All its incoming and outgoing connec ...]]. Because sometimes you need [[root]]'s [[permission]] to install some [[software]]. Normally, the administration password is disabled for better [[security]
    36 KB (5,168 words) - 15:22, 30 June 2020
  • ...o public website traffic and can be better understood by using web metrics software to track overall activity. User surveys also improve intranet website effec ...y controlled or devolve. These decisions sit alongside to the hardware and software considerations (like [[content management systems]]), participation issues
    18 KB (2,562 words) - 04:29, 6 May 2020
  • ...9 |title=Metasploit 3.0 day |publisher=SecurityFocus.com}}</ref> and often software intended for legitimate security auditing.<ref name="Rodriguez">{{Cite web ...title=Error Reporting Oops: Microsoft, Meter Maids and Malicious Code|work=Privacy and Security Fanatic|publisher=[[Network World]]}}</ref>
    6 KB (829 words) - 03:58, 15 March 2019
  • ...], [[ColdFusion]], [[Java Platform, Enterprise Edition|Java EE]], [[Plack (software)|Perl/Plack]], [[PHP]] or [[Ruby on Rails]]). These facilities allow custom ...with this type of service can be quite basic and not flexible in terms of software and updates. Resellers often sell shared web hosting and web companies oft
    19 KB (2,825 words) - 20:17, 12 September 2018
  • ==Privacy concerns and ethics== ...n the [[Total Information Awareness]] Program or in [[ADVISE]], has raised privacy concerns.<ref>{{cite journal |author=Taipale, Kim A. |title=Data Mining and
    43 KB (5,879 words) - 11:26, 10 May 2020
  • They have also become a source of security and privacy issues, as some built-in webcams can be remotely activated by [[spyware]]. ...ed by webcams can be used for a number of purposes, each using appropriate software:
    31 KB (4,443 words) - 11:14, 4 February 2019
  • ...rested in mitigating the vulnerability (including the vendor of the target software). Until the vulnerability is mitigated, [[Hacker|hackers]] can [[Exploit (c | quote= A zero day vulnerability refers to an exploitable bug in software that is unknown to the vendor. This security hole may be exploited by crack
    22 KB (3,197 words) - 09:20, 17 December 2018
  • | source_model = [[Open-source software|Open source]] ([[GPLv2]]), double license<ref>{{cite web |url=https://www.q | ui = [[KDE Software Compilation|KDE]], [[Xfce]]
    17 KB (2,474 words) - 09:33, 17 January 2021
  • ...net/pricing/?p=aws openvpn.net: Pricing], retrieved 12 December 2018</ref> software that implements [[virtual private network]] (VPN) techniques to create secu ...ew Lockhart|title=Network Security Hacks: Tips & Tools for Protecting Your Privacy|url=https://books.google.com/books?id=6weH75ATpbUC&pg=PA339|year=2006|publi
    18 KB (2,436 words) - 12:32, 12 May 2020
  • ...ormation is going, which is the reason that proxies can be used to protect privacy.]] ...ity of the request, or provide additional benefits such as load balancing, privacy, or security. Proxies were devised to add structure and [[Encapsulation (ne
    41 KB (6,149 words) - 21:25, 22 June 2021
  • {{short description|software released under a license restricting intellectual property rights}} ...ce software" is non-[[Free software|free]] computer software for which the software's publisher or another person retains [[intellectual property]] rights—us
    39 KB (5,441 words) - 15:36, 27 January 2019
  • ! Software facility for webmail | {{Yes}}{{efn|Also can be used on non-mobile devices via third-party software.<ref>[http://www.bravurasoftware.com/yahoo-imap/ Yahoo IMAP Connector]</ref
    35 KB (4,406 words) - 02:06, 24 October 2016
  • ...es the extent of the summary. This allows a third party to verify that the software has not been changed. ...ng the security down to the hardware level provides more protection than a software-only solution.<ref>{{cite web | url = http://www-01.ibm.com/support/docview
    39 KB (5,437 words) - 03:09, 3 December 2018
  • {{Infobox software ...grams.<ref name="UbuntuSplits">{{cite web |last=Jackson |first=Joab |title=Software / Services Oct 25, 2010 1:20 pm Canonical Ubuntu Splits From GNOME Over Des
    63 KB (8,726 words) - 18:56, 19 November 2018
  • ...erprint''' or '''machine fingerprint''' is information collected about the software and hardware of a remote computing device for the purpose of identification ...ous web browsing|avoid tracking]] – raising a major concern for [[internet privacy]] advocates.{{r|eff12ways}}
    36 KB (4,827 words) - 01:46, 4 February 2021
  • ...]] of the accessed [[website]] and protection of the [[Information privacy|privacy]] and [[Data integrity|integrity]] of the exchanged data while in transit. ...icate authority|certificate authorities]] that come pre-installed in their software. Certificate authorities (such as [[Let's Encrypt]], [[Digicert]], [[Comodo
    30 KB (4,396 words) - 15:52, 27 December 2018
  • [[File:Pidgin 2.0 contact window.png|thumb|A [[buddy list]] in [[Pidgin (software)|Pidgin]] 2.0]] ...Facebook]] and [[Twitter]]. The most popular IM platforms, such as [[AIM (software)|AIM]], closed in 2017,<ref>{{cite web|url=https://help.aol.com/articles/ai
    42 KB (5,801 words) - 11:15, 4 February 2019
  • {{short description|software whose source code is available and which is permissively licensed}} [[File:Desktop-Linux-Mint.png|thumb|A screenshot of Free and Open-source software (FOSS): [[Linux Mint]] running the [[Xfce]] [[desktop environment]], [[Fire
    71 KB (9,948 words) - 15:57, 2 June 2020
  • ...herment,<ref name="FAQ" /> but the reCAPTCHA software is not [[open-source software|open-source]].<ref name="google">{{cite web|url=http://www.google.com/recap ...friction presented when a reCAPTCHA prompt is used. Google stated in its [[privacy policy]] that user data collected in this manner is not used for personaliz
    19 KB (2,673 words) - 13:54, 26 April 2020
  • ...verflow Launches |author=Spolsky, Joel |date=2008-09-15 |publisher=Joel on Software }}</ref> | title = Spolsky's Software Q-and-A Site
    20 KB (2,756 words) - 09:51, 3 October 2019
  • ...ree software for enabling online anonymity and censorship resistance. This software directs Internet traffic through a free, worldwide, volunteer network consi ...unication forms", back to the user and is intended to protect the personal privacy of users, as well as their freedom and ability to conduct confidential busi
    23 KB (3,609 words) - 19:21, 15 July 2021
  • {{Infobox software ...on the [[iOS]] operating system in May. Alongside the announcement of a [[software development kit]] in April 2017, the Assistant has been, and is being, furt
    40 KB (5,073 words) - 20:49, 20 November 2018
  • {{Infobox software <!-- Non-existent Infobox software parameter: | voices = [[Susan Bennett]], [[John Briggs]], [[Karen Jacobsen]
    44 KB (5,897 words) - 20:48, 20 November 2018
  • ..., 2010. {{ISBN|978-1-4398-0150-5}}</ref> This practice generally refers to software vulnerabilities in computing systems. ...from when the '''security hole''' was introduced or manifested in deployed software, to when access was removed, a security fix was available/deployed, or the
    28 KB (4,009 words) - 18:17, 3 July 2021
  • ...] on to hide your real [[IP address]]. It's good for your [[anonymity]], [[privacy]], and [[security]]. == Privacy vs. Anonymity ==
    46 KB (6,872 words) - 19:09, 15 July 2021
  • ...ef name="PT67">H.E. Petersen, R. Turn. "System Implications of Information Privacy". ''Proceedings of the AFIPS Spring Joint Computer Conference'', vol. 30, p Although the number of backdoors in systems using [[proprietary software]] (software whose [[source code]] is not publicly available) is not widely credited, th
    29 KB (4,153 words) - 05:37, 21 February 2020
  • ...en abbreviated as '''[[distro]]''') is an [[operating system]] made from a software collection, which is based upon the [[Linux kernel]] and, often, a [[packag ...tware. Usually, Linux distributions optionally include some [[proprietary software]] that may not be available in source code form, such as [[binary blob]]s r
    39 KB (5,467 words) - 10:30, 24 November 2020
  • ...If you do something stupid with this, it's your fault. This, like the Tor software, is a tool and how you use it is up to you. ...n administrator controls the computer. They can do system updates, install software,
    67 KB (11,646 words) - 02:07, 24 October 2016
  • ...ndamentally a [[computer hardware|hardware]] (insecure memory) and not a [[software]] issue. However, malicious access can be prevented by limiting physical ac ...rs and motherboard properties, and may be more difficult to carry out than software-based methods or a [[DMA attack]].<ref name="carbone2011">{{cite journal|ur
    34 KB (4,927 words) - 07:30, 10 April 2020
  • ...to Jolla. Jolla's Sailfish OS, which used middleware core stack of [[Mer (software distribution)|Mer]], is a direct successor to MeeGo and the [[Jolla (mobile ...perating system that can be adapted to different mobile devices. Also, the software can be tailored to best fit the consumer needs, from companies to mass cons
    17 KB (2,435 words) - 21:25, 12 June 2019
  • :: Note: (1) is usually due to benign software issues. (2) and (3) are usually due to the provider automating their countr * [http://a5ec6f6zcxtudtch.onion/mm-anon-email.htm German Privacy Foundation] - email, usenet
    25 KB (3,639 words) - 18:01, 14 July 2021
  • ...}</ref> [[operating system]]s, composed entirely of [[free and open-source software]]. ...or [[internationalization and localization]] and [[accessibility]] of that software.
    57 KB (7,698 words) - 19:04, 19 November 2018
  • .../evans-goldberg.html Prison Industrial Complex], the [http://www.aclu.org//privacy/spying/15740prs20040809.html Surveillance Industrial Complex], the [http:// ...s on a global scale: independent media, self-publishing, Free Open Source Software, computer music, computer art and graphics, and so on. Computers also enabl
    50 KB (8,221 words) - 09:07, 23 April 2014
  • '''[[프라이버시]]'''([[privacy]])는 개인이나 집단에 관한 정보를 다른 사람들에게 선택 www.reddit.com/r/privacy/
    17 KB (559 words) - 00:22, 16 March 2021
  • {{about|the blogging software WordPress (WordPress.org)|the blog host|WordPress.com}} {{Infobox software
    70 KB (8,903 words) - 09:16, 9 November 2019
  • | programmed in = [[Qt (software)|Qt/QML]], [[C++]] ...a and friends, 8.9.2012 - Tampere.JPG|thumb|Hackday with [[Jolla]], [[Mer (software distribution)|Mer]] and [[Nemo Mobile]] in September 2012]]
    59 KB (7,608 words) - 21:23, 12 June 2019
  • ...n a ''static'' (fixed or permanent) or ''dynamic'' basis, depending on its software and practices. ...in a limited scope as the default configuration parameters of some network software and hardware components (e.g. netmask), and in the technical jargon used in
    31 KB (4,424 words) - 17:28, 16 June 2021
  • ...rocessing]], [[electronic data interchange]] (EDI), [[Inventory management software|inventory management systems]], and automated [[data collection]] systems. * 1994: [[Ipswitch IMail Server]] becomes the first software available online for sale and immediate download via a partnership between
    57 KB (7,780 words) - 22:22, 27 September 2019
  • {{Infobox software Telegram's client-side code is [[open-source software]] but the source code for recent versions is not always immediately publish
    83 KB (11,164 words) - 06:12, 26 May 2019
  • [[File:FUDforum.jpg|thumb|right|300px|[[FUDforum]], another Internet forum software package.]] ...orum Software Timeline 1994 - 2010 |accessdate=2010-12-24 |publisher=Forum Software Reviews}}</ref> A sense of [[virtual community]] often develops around foru
    46 KB (7,365 words) - 19:24, 27 January 2019
  • * For the first web software, see [[WorldWideWeb]]. ...=dmy-all}}</ref> The resources of the WWW may be accessed by users via a [[software application]] called a ''[[web browser]].''
    90 KB (13,321 words) - 05:12, 16 March 2019
  • ...thods]]. Protocols may be implemented by [[Computer hardware|hardware]], [[software]], or a combination of both.<ref>Licesio J. Rodríguez-Aragón: ''[http://w ...esigned to work together is known as a protocol suite; when implemented in software they are a [[protocol stack]].
    50 KB (7,254 words) - 10:15, 24 November 2020
  • '''Ethereum''' is an [[open-source software|open source]], [[Types of blockchain|public]], [[blockchain (database)|bloc ...a flaw in [[The DAO (organization)|The DAO]] project's [[smart contract]] software, and subsequent theft of $50 million worth of ether,<ref>{{cite web |last1=
    48 KB (6,158 words) - 04:59, 12 June 2021
  • ...[Cyber-arms industry|cyber-arms market]] for [[Exploit (computer security)|software exploits]] as well as drugs, launched to the interest of computer security ...2015|date=26 April 2015}}</ref> for added [[anonymity]] and [[Pretty Good Privacy|PGP]] to secure communications between buyers and vendors from being stored
    66 KB (8,841 words) - 02:13, 12 November 2018
  • ...n (BitTorrent client)|Transmission]], [[qBittorrent]], [[Vuze]], [[Deluge (software)|Deluge]], [[BitComet]] and [[Tixati]]. [[BitTorrent tracker]]s provide a l ...m/intl/es/company/about/ces_2012_150m_users |title=BitTorrent and µTorrent Software Surpass 150 Million User Milestone |publisher=Bittorrent.com |date=9 Januar
    85 KB (11,674 words) - 06:37, 6 September 2018
  • ...ly open to XSS attacks.<ref>{{cite news |last=Berinato |first=Scott |title=Software Vulnerability Disclosure: The Chilling Effect |url=http://www.csoonline.com ...s scan the profiles of other members to see if they look interesting. For privacy reasons, this site hides everybody's real name and email. These are kept s
    38 KB (5,697 words) - 20:21, 14 March 2019
  • ...ls to solving simple problems that prove to be extremely hard for computer software. Such skills include, but are not limited to processing of sensory informat ...ased non-continuous audio captchas|journal= IEEE Symposium on Security and Privacy (S&P), 2011|year=2011|url=https://www.elie.net/publication/the-failure-of-n
    32 KB (4,749 words) - 08:46, 17 December 2018
  • [[Comparison of Internet Relay Chat clients|Client software]] is available for every major operating system that supports Internet acce ...tment of Information Processing Science. Jarkko intended to extend the BBS software he administered, to allow news in the [[Usenet]] style, real time discussio
    70 KB (10,129 words) - 11:16, 4 February 2019
  • ...rer |author3=Joss Wright |title=Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society - WPES'16 |chapter=Poisoning the Well |year=2016 ...circumvention software turned on, yet not proxy unblocked content, and the software itself never directly connect to a central server.
    74 KB (10,005 words) - 01:28, 3 February 2021
  • [[Git]] is an indispensable part of modern software development. It is a version control system which can be thought of as an e ...ement |title=Microsoft Enterprise and Developer Privacy Statement |website=privacy.microsoft.com |publisher=Microsoft |access-date=4 November 2016 |archive-ur
    92 KB (14,582 words) - 15:59, 2 June 2020
  • Reinforcement learning is an area of machine learning concerned with how [[software agent]]s ought to take [[Action selection|actions]] in an environment so as ...arning models that decentralizes the training process, allowing for users' privacy to be maintained by not needing to send their data to a centralized server.
    71 KB (9,836 words) - 11:23, 10 May 2020
  • {{Main|AlphaGo|Master (software)|AlphaGo Zero|AlphaZero}} ...ind-nhs-health-data |title=Why Google consuming DeepMind Health is scaring privacy experts |work=Wired |date=14 November 2018 |accessdate=15 November 2018}}</
    44 KB (5,857 words) - 03:57, 3 April 2019
  • ...ing mechanism, if possible, so that the user may type in his password with privacy."<ref>CTSS Programmers Guide, 2nd Ed., MIT Press, 1965</ref> In the early ...ationally infeasible for the attacker. Some systems, such as [[Pretty Good Privacy|PGP]] and [[Wi-Fi Protected Access|Wi-Fi WPA]], apply a computation-intensi
    70 KB (10,133 words) - 11:07, 16 March 2019
  • {{short description|software development model encouraging open collaboration}} The '''open-source model''' is a decentralized [[software development]] model that encourages [[open collaboration]].<ref name="doi.o
    82 KB (11,522 words) - 14:06, 5 December 2018
  • ...h both moving images and sound, via [[Skype]], [[Google Chat]] and similar software. ...files (using a USB flash memory stick or CD-ROMs) or using synchronization software over the Internet, such as [[cloud computing]]. However, transporting a sin
    87 KB (12,877 words) - 16:50, 4 February 2019
  • ...to be a consensus forming around Bitcoin, capitalized, for the system, the software, and the network it runs on, and bitcoin, lowercase, for the currency itsel ...itcoins to payee Z'' are broadcast to this network using readily available software applications. Network nodes can validate transactions, add them to their co
    153 KB (20,547 words) - 12:54, 12 May 2020
  • Network hardware, software and specifications, as well as the expertise of network management personne ...net users traffic and has raised concerns about potential violation of the privacy protections in the [[Fourth Amendment to the United States Constitution]].<
    27 KB (3,734 words) - 02:27, 27 December 2018
  • ...uter sense of "not [[Reality|physically existing]] but made to appear by [[software]]" since 1959.<ref name="etymonline.com" /> ...ndings with digital content generated by computer software. The additional software-generated images with the virtual scene typically enhance how the real surr
    72 KB (10,177 words) - 10:02, 20 May 2020
  • ...tion|visualization]], [[Query language|querying,]] updating, [[information privacy]] and data source. Big data was originally associated with three key concep ...things]] devices such as [[mobile device]]s, aerial ([[remote sensing]]), software logs, [[Digital camera|cameras]], microphones, [[radio-frequency identifica
    112 KB (15,387 words) - 11:35, 2 July 2019
  • ...move back and forth between questions within each section, and the testing software allows the user to "mark" questions within each section for later review if ...ions, as well as further practice questions and review material. Since the software replicates both the test format and the questions used, it can be useful to
    46 KB (6,484 words) - 17:01, 7 April 2019
  • .../cmpsac.2000.884700|journal=Proceedings 24th Annual International Computer Software and Applications Conference. COMPSAC2000|year=2000|pages=116–121|publishe ...A). [[Information Systems]] are composed in three main portions, hardware, software and communications with the purpose to help identify and apply information
    185 KB (25,617 words) - 21:19, 3 July 2021
  • The Transport Layer Security protocol aims primarily to provide privacy and data integrity between two communicating computer applications.<ref nam ...the properties above, careful configuration of TLS can provide additional privacy-related properties such as [[forward secrecy]], ensuring that any future di
    139 KB (19,574 words) - 15:51, 27 December 2018

View (previous 100 | next 100) (20 | 50 | 100 | 250 | 500)