- insecure software
- незащищенное программное обеспечение
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Comparison of open source configuration management software — This is a comparison of free (libre) and open source configuration management software. Contents 1 Basic properties 2 Platform support 3 Short descriptions 4 Refere … Wikipedia
Trillian (software) — Infobox Software name = Trillian caption = Trillian main screen collapsible = yes developer = Cerulean Studios released = initial release|2000|7|1 frequently updated = yes programming language = C++ operating system = Microsoft Windows Mac OS X… … Wikipedia
COPS (software) — This article is about the software. For the governing body Conference of the Parties , see COP16. COPS was the first common Unix computer system security scanning tool, created by Dan Farmer; Gene Spafford helped him start it in 1989 while Dan… … Wikipedia
SANS Institute — The SANS Institute (SysAdmin, Audit, Networking, and Security) is a trade name owned by the for profit Escal Institute of Advanced Technologies. SANS provides computer security training, professional certification, and a research archive. It was… … Wikipedia
Tor (anonymity network) — Tor Developer(s) The Tor Project[1] Initial release 20 September 2002 (2002 09 20) … Wikipedia
Distributed Sender Blackhole List — The Distributed Sender Blackhole List is a DNSBL that lists IP addresses of insecure e mail hosts. DSBL can be used by server administrators to tag or block e mail messages that come from insecure servers, which is often spam. The DSBL publishes… … Wikipedia
Computer security — This article is about computer security through design and engineering. For computer security exploits and defenses, see computer insecurity. Computer security Secure operating systems Security architecture Security by design Secure coding … Wikipedia
One-time pad — Excerpt from a one time pad In cryptography, the one time pad (OTP) is a type of encryption, which has been proven to be impossible to crack if used correctly. Each bit or character from the plaintext is encrypted by a modular addition with a bit … Wikipedia
Nmap — Security Scanner results of an Nmap scan Original author(s) Gordon Lyon (Fyodor) Initial release September, 1997 … Wikipedia
Comparison of TLS Implementations — The Transport Layer Security (TLS) protocol provide the ability to secure communications across networks. There are several TLS implementations which are free and open source software and sometimes choosing between the available implementations… … Wikipedia
Linux adoption — This article covers adoption of the Linux operating system by homes, organizations, companies, and governments. Linux migration is the change from using other operating systems to using Linux. HistoryLinux powered personal computers account for… … Wikipedia