Search results

Page title matches

  • ...nclueds pages and categories dealing with IT security. Se also the page IT security.
    9 members (2 subcategories, 0 files) - 14:46, 5 March 2010
  • '''Information security, sometimes shortened to InfoSec, is the practice of preventing unauthori ''(Wikipedia) [https://en.wikipedia.org/wiki/Information_security]''
    2 KB (304 words) - 10:45, 30 January 2019
  • There are recurring security problems with Java. It will thus be best to avoid using Java as much as ...sis! (Instructions on how to do this can be found for example [http://nakedsecurity.sophos.com/2012/08/30/how-turn-off-java-browser/ here].)
    1 KB (230 words) - 15:34, 9 March 2017
  • This category gives an overview of different kinds of security software in use at UiB.
    1 member (0 subcategories, 0 files) - 20:18, 5 January 2012
  • [[no:SSH_Secure_Shell]] SSH or Secure Shell is a network protocol for secure transfer of data between server and client.
    2 KB (242 words) - 15:34, 9 March 2017
  • 4 KB (648 words) - 08:32, 26 May 2020
  • A serious security loophole in Mac OS High Sierra (10.13.x) was announced on November 28., Apple has since released a security update fixing the loophole. This update is installed on Macs with versio
    541 bytes (83 words) - 15:39, 1 December 2017

Page text matches

  • This category contains pages about SSH. (Secure Shell).
    6 members (0 subcategories, 0 files) - 15:28, 23 April 2012
  • ...nclueds pages and categories dealing with IT security. Se also the page IT security.
    9 members (2 subcategories, 0 files) - 14:46, 5 March 2010
  • This category gives an overview of different kinds of security software in use at UiB.
    1 member (0 subcategories, 0 files) - 20:18, 5 January 2012
  • This category contains articles that the IT division's group for security and internal systems have editorial responsibility for.
    3 members (0 subcategories, 0 files) - 10:32, 30 July 2020
  • [[Category:IT security]]
    3 members (0 subcategories, 0 files) - 12:36, 6 August 2020
  • [[Category:IT security]]
    3 members (0 subcategories, 0 files) - 16:46, 5 March 2010
  • A serious security loophole in Mac OS High Sierra (10.13.x) was announced on November 28., Apple has since released a security update fixing the loophole. This update is installed on Macs with versio
    541 bytes (83 words) - 15:39, 1 December 2017
  • ...UiB servers. The home directory is a personal folder for saving data with security backup.
    7 members (0 subcategories, 0 files) - 16:11, 5 March 2010
  • ...f Conduct for Information Security in the Health Care Sector'' and ensures security of information with respect to confidentiality, integrity and availabili ...ess your data. Computing power and relevant software is available from the secure desktop. The project manager controls access to the data and has an overvi
    1 KB (180 words) - 10:54, 12 June 2019
  • '''Information security, sometimes shortened to InfoSec, is the practice of preventing unauthori ''(Wikipedia) [https://en.wikipedia.org/wiki/Information_security]''
    2 KB (304 words) - 10:45, 30 January 2019
  • [[no:SSH_Secure_Shell]] SSH or Secure Shell is a network protocol for secure transfer of data between server and client.
    2 KB (242 words) - 15:34, 9 March 2017
  • There are recurring security problems with Java. It will thus be best to avoid using Java as much as ...sis! (Instructions on how to do this can be found for example [http://nakedsecurity.sophos.com/2012/08/30/how-turn-off-java-browser/ here].)
    1 KB (230 words) - 15:34, 9 March 2017
  • * [[:Category:Security software|Security]]
    857 bytes (101 words) - 12:31, 24 March 2017
  • ...H Secure File Transfer Clien'''t is a part of the program package '''[[SSH Secure Shell]]'''. You may also use '''FileZilla'''. 1. Start the program '''SSH Secure File Transfer Client '''(can be downloaded from [https://tjinfo.uib.no/pro
    2 KB (312 words) - 15:33, 9 March 2017
  • ...ork which only should be used by guests who cannot use eduroam. Eduroam is secure, available many places all over the world and tailored for academic use. ...ts functions the share files and collaborate. Always store your files in a secure place. Your own PC may fail or get stolen. OneDrive enables you to manage
    1 KB (183 words) - 08:47, 31 July 2019
  • ...ected with malware rises when you are travelling to some areas with higher security risks. ...eneste, PST) has singled out some countries with the most vulnerable cyber security. These countries are often referred to as “high-risk countries”. Amo
    3 KB (454 words) - 10:54, 30 July 2020
  • [[Category:IT security]]
    538 bytes (86 words) - 20:17, 20 March 2013
  • == Setup of SSH Secure File Transfer Client == 1) Start the SSH Secure File Transfer Client (can be downloaded from https://tjinfo.uib.no/program
    2 KB (317 words) - 15:33, 9 March 2017
  • ...e the PIN-code you use for Studentweb, your studentnumber, and your social security number. There are no stupid, or silly questions when it comes to IT security. If you have a question, please contact us through [https://hjelp.uib.no
    2 KB (255 words) - 11:05, 30 July 2020
  • # Secure data stored on the machine. [[Category: IT security]]
    2 KB (258 words) - 14:33, 25 September 2019

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)