Search results

Jump to: navigation, search
  • ...owth prospects. An internationally acclaimed expert will highlight the key security, trust and privacy challenges and perspectives for the Future Internet. ... engines that take into account media, location and context as well as new security and privacy paradigms. This session calls on renowned experts who will addr
    3 KB (493 words) - 09:33, 30 May 2010
  • ...r this website from its box, installed an operating system, patched it for security, made sure the power and air conditioning was working in the server room, m ...o guard against disaster both human and otherwise, holds the gates against security threats and crackers, and keeps the printers going no matter how many copie
    3 KB (536 words) - 10:01, 28 July 2010
  • |intro=Business Association Luxembourg-Russie A.S.B.L. and Security made in Lëtzebuerg (SMILE) of the Luxembourg Ministry of the Economy and F
    2 KB (258 words) - 10:08, 16 September 2010
  • ... is an open convention /conference where people can discuss about computer security, privacy, IT and its cultural/technical implication on society. ...the convention is to : make a bridge of the various actors in the computer security world. The conference takes place at Parc Hotel Alvisse in Luxembourg the 2
    893 B (126 words) - 01:09, 30 October 2010
  • File:QR-c788e251ca64f270e29b36eb71cac5cc.png
    ...2010 21:24:04 +0200 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].
    (132 × 132 (366 B)) - 19:24, 25 September 2010
  • File:QR-1a013e5e2f8a5de2cb122472d38b7201.png
    ...Sep 2010 22:42:04 +0200 by the QrCode Extension for page [[FT: Hacking vs. Security]].
    (132 × 132 (360 B)) - 20:42, 25 September 2010
  • * Maintain tight security with regular reviews
    2 KB (341 words) - 12:53, 11 July 2017
  • File:QR-f89134a3164f6e2ffaea6b525ef7f5d4.png
    ...Oct 2010 19:03:50 +0200 by the QrCode Extension for page [[FT: Hacking vs. Security]].
    (132 × 132 (368 B)) - 17:03, 14 October 2010
  • File:QR-fcc440f47e0b536bae750e093fdeaa6b.png
    ...2010 19:04:25 +0200 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].
    (132 × 132 (371 B)) - 17:04, 14 October 2010
  • File:QR-de1aab9a21fb1168f30655191477481e.png
    ...Oct 2010 12:25:48 +0200 by the QrCode Extension for page [[FT: Hacking vs. Security]].
    (132 × 132 (374 B)) - 10:25, 16 October 2010
  • File:QR-024065d0626c1e3948c5645849fd0399.png
    ...2010 10:31:33 +0200 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].
    (132 × 132 (362 B)) - 08:31, 18 October 2010
  • ...g the h4x0roam network profile. This should provide an acceptable level of security even on computers which do not have an encrypted hard drive (for example du SECURITY='wpa-config'
    4 KB (677 words) - 16:26, 20 May 2012
  • File:QR-6c888b6346fee81a2744c2fc3657206c.png
    ...2010 13:40:42 +0100 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].
    (132 × 132 (372 B)) - 12:40, 8 November 2010
  • File:QR-b177507e3837e237acf1fe86fe040988.png
    ...Dec 2010 01:54:38 +0100 by the QrCode Extension for page [[FT: Hacking vs. Security]].
    (132 × 132 (370 B)) - 00:54, 10 December 2010
  • File:QR-f873b50340c66348cd634380095746a9.png
    ...2011 02:24:20 +0100 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].
    (132 × 132 (360 B)) - 01:24, 4 January 2011
  • File:QR-b73a5bade55e5253c57a36cdd53bfe2a.png
    ...Jan 2011 03:03:18 +0100 by the QrCode Extension for page [[FT: Hacking vs. Security]].
    (132 × 132 (367 B)) - 02:03, 4 January 2011
  • File:QR-59063581d925e32e052c0ae472948ffe.png
    ...2011 20:53:24 +0100 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].
    (132 × 132 (368 B)) - 19:53, 11 January 2011
  • File:QR-c78cbce0fe05a10d740d3884c9b26e3d.png
    ...Jan 2011 21:00:29 +0100 by the QrCode Extension for page [[FT: Hacking vs. Security]].
    (132 × 132 (368 B)) - 20:00, 11 January 2011
  • |keywords=chaos, security
    263 B (35 words) - 08:04, 17 March 2017
  • ...ox Add-On for rating website of their trustworthy, reliability and general security.
    1 KB (156 words) - 16:17, 19 March 2012
  • ...st available revolutions will be unveiled: social networks, mobile trends, security, applications, data centers, e-commerce… And the upcoming ICT topics will
    2 KB (267 words) - 14:05, 6 April 2012
  • * '''Bluetooth''' is almost as bad as rfid in terms of security. (And how do you get the code onto your phone in the first place if it isn'
    780 B (147 words) - 19:24, 23 May 2011
  • * Discuss further handling of security@lists.hackerspace.lu and the mallory project. ==== security@lists.hackerspace.lu ====
    15 KB (2,187 words) - 13:48, 27 December 2011
  • File:QR-08d6b7c561e5eda37b59bff2d4788db7.png
    ...6 Jun 2011 16:16:15 +0200 by the QrCode Extension for page [[Communication Security]].
    (132 × 132 (371 B)) - 14:16, 26 June 2011
  • File:QR-f14b3ee5001efaf414131ec7561defb6.png
    ...6 Jun 2011 16:19:11 +0200 by the QrCode Extension for page [[Communication Security]].
    (132 × 132 (356 B)) - 14:19, 26 June 2011
  • File:QR-5a8c58efeca16f20cc3f33a2ce8e4455.png
    ...9 Jun 2011 10:19:53 +0200 by the QrCode Extension for page [[Communication Security]].
    (132 × 132 (366 B)) - 08:19, 29 June 2011
  • ...open for all convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on |intro=Hack.lu is an open conference where people can discuss about computer security, privacy, IT and its impact on society.
    1 KB (189 words) - 16:05, 25 September 2011
  • |intro=Brussels, Belgium. BruCON is an annual security conference providing two days of an interesting atmosphere for open disc ...hallenges and interesting workshops. BruCON is a conference by and for the security and hacker(*) community.
    2 KB (252 words) - 20:08, 3 July 2011
  • File:QR-b9162a71eff4c8b6821af889c4268bca.png
    ...4 Jul 2011 08:12:05 +0200 by the QrCode Extension for page [[Communication Security]].
    (132 × 132 (363 B)) - 06:12, 4 July 2011
  • File:QR-75bb0c08f484ff583771df99cf4eb4c3.png
    ...2011 21:56:43 +0200 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].
    (132 × 132 (371 B)) - 19:56, 6 July 2011
  • ...ertificate, or you just click on "Get certificate" and confirm by "Confirm Security Exception", please ensure that the "Permanently store this exception" is en
    2 KB (257 words) - 14:46, 24 June 2012
  • |keywords=OpenVPN, VPN, Tunnel, OpenSSL, SSL, Networking, Security, Encryption
    2 KB (321 words) - 21:48, 26 February 2012
  • |keywords=ccc, camp, chaos, security ...nts.ccc.de/camp/2011/Fahrplan/events/4439.en.html Machine-to-machine (M2M) security] - 21h00
    2 KB (316 words) - 09:35, 13 August 2011
  • File:QR-e3f48ae7234513c58d698b3d658e1472.png
    ...3 Nov 2011 18:31:48 +0100 by the QrCode Extension for page [[Communication Security]].
    (132 × 132 (362 B)) - 17:31, 3 November 2011
  • File:QR-420c2773105dd98ad611ee1da7504c22.png
    ...Nov 2011 04:12:04 +0100 by the QrCode Extension for page [[FT: Hacking vs. Security]].
    (132 × 132 (371 B)) - 03:12, 4 November 2011
  • File:QR-a48c744d6ac1dc254c6ace5d39b74a00.png
    ...2011 12:55:53 +0100 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].
    (148 × 148 (429 B)) - 11:55, 5 November 2011
  • File:QR-ce31fd4b58aa4a02d9ec5cf3a6d4a8e7.png
    ...2011 17:06:13 +0100 by the QrCode Extension for page [[RomLux: Hacking vs. Security]].
    (132 × 132 (360 B)) - 16:06, 7 November 2011
  • File:QR-4368f413c3926f1dfa24efa0ea24389c.png
    ...8 Nov 2011 03:46:44 +0100 by the QrCode Extension for page [[Communication Security]].
    (132 × 132 (373 B)) - 02:46, 8 November 2011
  • File:QR-a977d30fad6e18a77effb696778e1817.png
    ...Nov 2011 08:05:21 +0100 by the QrCode Extension for page [[FT: Hacking vs. Security]].
    (132 × 132 (379 B)) - 07:05, 10 November 2011
  • File:QR-326f61487fe5afd6a872ca3bd4a60ad3.png
    ...Nov 2011 21:04:26 +0100 by the QrCode Extension for page [[FT: Hacking vs. Security]].
    (132 × 132 (366 B)) - 20:04, 11 November 2011
  • |type=security
    969 B (168 words) - 06:25, 24 August 2017
  • File:QR-a9738af0c66d50d9e0590d47e6a44145.png
    ...8 Nov 2011 19:20:25 +0100 by the QrCode Extension for page [[Communication Security]].
    (132 × 132 (366 B)) - 18:20, 28 November 2011
  • |keywords=ccc, c3l, Security, Berlin, Chaos, Communication, Congress
    2 KB (277 words) - 18:33, 10 March 2012
  • * Don't encrypt mails on a mailing lists. (What about security issues?)
    62 KB (9,953 words) - 13:47, 27 December 2011
  • * security: starttls * security: starttls
    1 KB (162 words) - 22:39, 18 March 2017
  • ...s and media, disruptive technologies, with a special highlight on trust in security."
    647 B (89 words) - 21:37, 8 March 2012
  • * at the cache people can put donation in box. For security, go back and recover the money from box.
    4 KB (642 words) - 15:03, 28 April 2012
  • File:LetzHack ep66 20120428 podcast.mp3
    [[Has Topic::IT Security]]
    (38.52 MB) - 21:00, 12 May 2012
  • File:LetzHack ep66 20120428 podcast.ogg
    [[Has Topic::IT Security]]
    (40.3 MB) - 21:00, 12 May 2012
  • |subtitle=IT Security Event |description=CONFidence is an annual IT security conference that will take place on 23-24th May, 2012 in Krakow, Poland for
    656 B (92 words) - 19:29, 20 May 2012

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)

Personal tools
Namespaces

Variants
Views
Actions
Navigation
syn2cat
Hackerspace
Activities
Initiatives
Community
Tools
Tools