language:
Find link is a tool written by Edward Betts.searching for Passphrase 59 found (117 total)
alternate case: passphrase
Contents of the United States diplomatic cables leak (Australia)
(1,144 words)
[view diff]
exact match in snippet
view article
collection unredacted following the partially accidental publication of the passphrase to the symmetrically encrypted GPG file WikiLeaks had placed online andGeli (software) (259 words) [view diff] exact match in snippet view article
the key to consist of several information components (a user entered passphrase, random bits from a file, etc.), permits up to 2 keys (a user key andScrypt (1,542 words) [view diff] exact match in snippet view article find links to article
Function scrypt Inputs: This algorithm includes the following parameters: Passphrase: Bytes string of characters to be hashed Salt: Bytes string of randomSteganographic file system (630 words) [view diff] exact match in snippet view article find links to article
and the locations are hidden and available to only programs with the passphrase. This leads to the problem that very quickly files can overwrite eachMcrypt (232 words) [view diff] exact match in snippet view article find links to article
the Blowfish encryption algorithm. # You are prompted two times for a passphrase. mcrypt -d mytextfile.txt.nc # Decrypts mytextfile.txt.nc to mytextfileDooble (905 words) [view diff] exact match in snippet view article find links to article
Dooble also provides a session-based model using temporary keys. The passphrase may be modified without the loss of data. Included is a non-JavaScriptWhom Gods Destroy (Star Trek: The Original Series) (913 words) [view diff] exact match in snippet view article
However, Scott refuses when Garth fails to give the correct response to a passphrase challenge. Scott and the Enterprise crew recognize something is wrongHushmail (845 words) [view diff] exact match in snippet view article find links to article
with the passphrase being capturable at this point, facilitating the decryption of all stored messages and future messages using this passphrase. HushmailPoste restante (4,292 words) [view diff] exact match in snippet view article find links to article
Austria In Austria, poste restante can be used with a name or an agreed passphrase under which the envelope can be collected, followed by the indicationCrypt (C) (3,030 words) [view diff] exact match in snippet view article
First the passphrase and salt are hashed together, yielding an MD5 message digest. Then a new digest is constructed, hashing together the passphrase, the saltWi-Fi Protected Setup (2,647 words) [view diff] exact match in snippet view article find links to article
easy to add new devices to an existing network without entering long passphrases. It is used by devices made by HP, Brother and Canon for their printersReplay attack (1,864 words) [view diff] exact match in snippet view article find links to article
captain used the passphrase "Open, Sesame" to open the door to their loot depot. This was overheared by Ali Baba who later reused the passphrase to get accessGrady Ward (617 words) [view diff] exact match in snippet view article find links to article
article on US Government investigation of cryptography export". Wired. "Passphrase FAQ".— "'Shocking nonsense' means to make up a short phrase or sentenceSocialist millionaire problem (1,153 words) [view diff] exact match in snippet view article find links to article
fingerprints through an outside channel. In effect, a relatively weak password/passphrase in natural language can be used. Alice and Bob have secret values x {\displaystylePoint-to-Point Tunneling Protocol (847 words) [view diff] exact match in snippet view article find links to article
was also demonstrated which is capable of decrypting a MS-CHAP-v2 MD4 passphrase in 23 hours. MPPE uses the RC4 stream cipher for encryption. There isEncrypting File System (3,061 words) [view diff] exact match in snippet view article find links to article
not available to an offline attacker who does not possess the Syskey passphrase/floppy. In Windows 2000, the user's RSA private key is not only storedIEEE 1905 (2,184 words) [view diff] exact match in snippet view article find links to article
setup procedures are defined: 1905.1 Push Button 1905.1 User Configured Passphrase/Key (optional) 1905.1 Near Field Communication Network Key (optional)Pretty Good Privacy (5,716 words) [view diff] exact match in snippet view article find links to article
in November 2007 has stated that forcing the suspect to reveal his PGP passphrase would violate his Fifth Amendment rights i.e. a suspect's constitutionalComparison of disk encryption software (2,827 words) [view diff] exact match in snippet view article find links to article
keys: Whether an encrypted volume can have more than one active key. Passphrase strengthening: Whether key strengthening is used with plain text passwordsSherbet (powder) (1,049 words) [view diff] exact match in snippet view article
Dumbledore has a particular fondness for sherbet lemons; their name is the passphrase for access to his office. A similar candy, made in Italy and popular inFileVault (1,537 words) [view diff] exact match in snippet view article find links to article
the owner. Early versions of FileVault automatically stored the user's passphrase in the system keychain, requiring the user to notice and manually disableLinux Unified Key Setup (1,169 words) [view diff] exact match in snippet view article find links to article
between LUKS and dm-crypt, since the header allows multiple different passphrases to be used, with the ability to change and remove them. If the headerWikiLeaks: Inside Julian Assange's War on Secrecy (1,080 words) [view diff] exact match in snippet view article find links to article
publication. This very sensitive information was protected by a large passphrase to ensure its secrecy. However, Leigh's book then published this passwordPassword Safe (806 words) [view diff] exact match in snippet view article find links to article
update] Password Safe can encrypt any file using a key derived from a passphrase provided by the user through the command-line interface. The softwareVault 7 (7,568 words) [view diff] exact match in snippet view article find links to article
in a locked archive earlier that week, and revealing the passphrase on the 7th. The passphrase referred to a President Kennedy quote that he wanted “toTextSecure (3,426 words) [view diff] exact match in snippet view article find links to article
messages were denoted by a lock icon. TextSecure allowed the user to set a passphrase that encrypted the local message database and the user's encryption keysNonsense (2,482 words) [view diff] exact match in snippet view article find links to article
“Colorless green ideas sleep furiously” could be meaningfully used as a passphrase to decrypt a digital file. This one counterfactual suggests that bothInitial ramdisk (1,975 words) [view diff] exact match in snippet view article find links to article
software needs to invoke a helper script to prompt the user to type in a passphrase and/or insert a hardware token (such as a smart card or a USB securityHoneypot (computing) (3,201 words) [view diff] exact match in snippet view article
ISBN 978-0-07-177249-5. The Ultimate Fake Access Point - AP less clear-text WPA2 passphrase hacking Distributed Open Proxy Honeypots Project: WASC SANS Institute:Backblaze (1,318 words) [view diff] exact match in snippet view article find links to article
privacy can use the optional private encryption key (PEK), but the PEK passphrase is sent to the server when it is initially set, and must be sent againSecure Shell (4,271 words) [view diff] exact match in snippet view article find links to article
for additional security the private key itself can be locked with a passphrase. The private key can also be looked for in standard places, and its fullGeorge B. Purdy (744 words) [view diff] exact match in snippet view article find links to article
442–445. doi:10.1145/361082.361089. S2CID 17599139. "Authen::Passphrase::VMSPurdy – passphrases with the VMS Purdy polynomial system". CPAN. Retrieved 2009-09-18Shibboleth (software) (1,313 words) [view diff] exact match in snippet view article
are implementations of SAML. The project was named after an identifying passphrase used in the Bible (Judges 12:4–6) because Ephraimites were not able toLetterboxing (hobby) (2,291 words) [view diff] exact match in snippet view article
usually only attainable if the other letterboxer knows the password or passphrase which is sometimes cryptic, straightforward, almost non-existent, or sillySignal (messaging app) (11,631 words) [view diff] exact match in snippet view article
concerns, and was removed in 2023. TextSecure allowed the user to set a passphrase that encrypted the local message database and the user's encryption keysKolab Now (1,318 words) [view diff] exact match in snippet view article find links to article
encryption. With server-side encryption, the encrypted data, the key, and the passphrase would need to pass through the web interface and be available on the serverCipherSaber (1,204 words) [view diff] exact match in snippet view article find links to article
dictionary attack if the chosen key (which would normally be a password or passphrase) does not have sufficient entropy. Symmetric-key cryptography implementationsComparison of online backup services (3,361 words) [view diff] exact match in snippet view article find links to article
OpenSaaS Backblaze Yes B2 only Yes Yes Yes Yes No Company must be given passphrase (to private key) to restore any data. No No Yes No No Backblaze Yes YesQR code (9,096 words) [view diff] exact match in snippet view article find links to article
staff and customers. By specifying the SSID, encryption type, password/passphrase, and if the SSID is hidden or not, mobile device users can quickly scanTrusted Platform Module (6,450 words) [view diff] exact match in snippet view article find links to article
cold boot attacks as long as the system is on or can be booted without a passphrase from shutdown or hibernation, which is the default setup for Windows computersS/KEY (1,301 words) [view diff] exact match in snippet view article find links to article
computing device capable of regenerating any needed password given the secret passphrase, the salt, and the number of iterations of the hash required, the latterDigital gold currency (3,114 words) [view diff] exact match in snippet view article find links to article
offers account holders a "Cryptocard" security token that changes the passphrase with each logon, but charges the account holder US$99.50 for the tokenMailfence (1,533 words) [view diff] exact match in snippet view article find links to article
is generated in client-browser, encrypted (via AES256) with the user's passphrase, and then stored on Mailfence server. Since December 2018, the serviceGoogle Chrome (17,443 words) [view diff] exact match in snippet view article find links to article
This can be authenticated either through Google credentials, or a sync passphrase. For web developers, Chrome features an element inspector which allowsPKWare (1,125 words) [view diff] exact match in snippet view article find links to article
as an extension of PKZIP. SecureZIP contained the same compression and passphrase protection as PKZIP but also introduced digital signature authenticationRegulation of Investigatory Powers Act 2000 (3,515 words) [view diff] exact match in snippet view article find links to article
determined that a criminal defendant cannot be forced to reveal his encryption passphrase but can be forced to provide a plaintext (decrypted) copy of their encryptedOpenID (6,029 words) [view diff] exact match in snippet view article find links to article
which corresponds to a one-way hash of a secret the user knows (e.g. passphrase) for challenge–response using the application's public key. The user passesArya Stark (5,847 words) [view diff] exact match in snippet view article find links to article
induction into his guild, the Faceless Men, and tells her to remember the passphrase "Valar Morghulis" ("All men must die" in High Valyrian) before leavingTransport Layer Security (17,117 words) [view diff] exact match in snippet view article find links to article
the keys could easily be accessed using the company name, Komodia, as a passphrase. The Komodia library was designed to intercept client-side TLS/SSL trafficKey disclosure law (3,947 words) [view diff] exact match in snippet view article find links to article
(December 14, 2007). "Judge: Man can't be forced to divulge encryption passphrase". CNET. Retrieved October 19, 2014. Kravets, David (January 23, 2012)Shamir's secret sharing (4,333 words) [view diff] exact match in snippet view article find links to article
manager, recover a user key for encrypted email access and share the passphrase used to recreate a master secret, which is in turn used to access a cryptocurrencyThe Amazing Race Vietnam 2014 (6,200 words) [view diff] exact match in snippet view article find links to article
In Lịch Sử, teams had to use a series of numerical codes to reveal a passphrase. The numbers would reference specific pages, lines and words in VietnameseEncounter (game) (4,855 words) [view diff] exact match in snippet view article
information from agent(s). For example a player has to address an agent with a passphrase. Or the information is given in exchange to a particular item. An agentArabian Nights: Sinbad's Adventures (1,236 words) [view diff] exact match in snippet view article find links to article
end at the foot of a cliff; and just then the robbers arrive and use a passphrase to open a secret gate into the rock. But because they couldn't hear itFeatures new to Windows 7 (12,636 words) [view diff] exact match in snippet view article find links to article
removable disks such as USB drives. Such devices can be protected by a passphrase, a recovery key, or be automatically unlocked on a computer. AccordingWindows 11 version history (9,908 words) [view diff] exact match in snippet view article find links to article
account management policy settings New PasswordComplexity feature New passphrase feature for password parameters policy settings New image rollback detectionPinoy Big Brother: Otso (9,278 words) [view diff] exact match in snippet view article find links to article
Unscramble 8 Participants must arrange a set of letters and come up with the passphrase "PANGARAP LAGING ILABAN." The housemates who successfully unscrambledData sanitization (5,292 words) [view diff] exact match in snippet view article find links to article
Cryptographic erasure involves the destruction of the secure key or passphrase, that is used to protect stored information. Data encryption involvesONTAP (11,085 words) [view diff] exact match in snippet view article find links to article
increase security on the storage system like Onboard Key Manager, the passphrase for controller boot with NSE & NVE encryption and USB key manager (available