All public logs

Jump to navigation Jump to search

Combined display of all available logs of HORSE - Holistic Operational Readiness Security Evaluation.. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).

Logs
(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)
  • 12:33, 16 October 2014 Mdpeters talk contribs undeleted page 19 (5 revisions restored)
  • 12:33, 16 October 2014 Mdpeters talk contribs undeleted page 18 (3 revisions restored)
  • 12:33, 16 October 2014 Mdpeters talk contribs undeleted page 17 (5 revisions restored)
  • 12:25, 16 October 2014 Mdpeters talk contribs deleted page 17 (Vandalism: content was: "==Footnote 17== A nonrepudiation service provides only proof of facts to defend against an opponent's effort to avoid a transaction. See Baum, supra note 16, at 6 (1994). See Guideline 1.20 (nonrepudiation), particularly Commen...)
  • 12:25, 16 October 2014 Mdpeters talk contribs deleted page 18 (Vandalism: content was: "==Footnote 18== For a more thorough examination of properties desirable in a digital signature, see generally Bruce Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C §2.6, 33-40 (2d ed. 1996) (hereinaf...)
  • 12:23, 16 October 2014 Mdpeters talk contribs deleted page 19 (Vandalism: content was: "==Footnote 19== In contrast with public key cryptography, "conventional," "single key," or "symmetric cryptography" uses the same single key to "encrypt" "plaintext" into "ciphertext," and to "decrypt" it from ciphertext back t...)
  • 12:23, 16 October 2014 Mdpeters talk contribs deleted page 2 (Vandalism: content was: "==Footnote 2== See, e.g., U. C. C. § 1-201(39) (1992). == Staging the news and staging reality are the same thing == Jon Rappoport Prison Planet.com October 13, 2013 Hi! Were the newsmanufacturing witnesses, creating dupe...)
  • 12:23, 16 October 2014 Mdpeters talk contribs deleted page 20 (Vandalism: content was: "==Footnote 20== Of course, the holder of the private key may choose to divulge it, or may lose control of it (often called "compromise"), and thereby make forgery possible. The Guidelines seek to address this problem in two way...)
  • 12:22, 16 October 2014 Mdpeters talk contribs deleted page 21 (Vandalism: content was: "==Footnote 21== Many cryptographic systems will function securely only if the keys are lengthy and complex, too lengthy and complex for a person to easily remember or use. == Teen Facing 8 Years Prison After Violent Joke in On...)
  • 12:22, 16 October 2014 Mdpeters talk contribs deleted page 22 (Vandalism: content was: "==Footnote 22== See generally Ford, supra note 16, at 71-75; Charlie Kaufman, Radia Perlman & Mike Speciner, Network Security: Private Communication in a Public World 48-56 (1995) (hereinafter "Kaufman, et al., Network Security...)
  • 12:22, 16 October 2014 Mdpeters talk contribs deleted page 23 (Vandalism: content was: "==Footnote 23== "Computationally infeasible" is a relative concept based on the value of the data protected, the computing overhead required to protect it, the length of time it needs to be protected, and the cost and time requ...)
  • 12:21, 16 October 2014 Mdpeters talk contribs deleted page 12 (Vandalism: content was: "==Footnote 12== Cf. The U.S. Comptroller General's rationale for accepting digital signatures as sufficient for government contracts under 31 U.S.C. 1501(a)(1): "The electronic symbol proposed for use by certifying officers . ....)
  • 12:20, 16 October 2014 Mdpeters talk contribs deleted page 11 (Vandalism: content was: "==Footnote 11== Michael Braunstein, Remedy, Reason, and the Statute of Frauds: A Critical Economic Analysis, 1989 Utah L. Rev. 383, 423-26 (1989); Jhering, supra, note 5, at 474 (inattention to legally appropriate form for expr...)
  • 12:20, 16 October 2014 Mdpeters talk contribs deleted page 10 Benefits of Email Filing (Vandalism: content was: "==10 Benefits of Email Filing== For this article, we wanted to look at the ways in which a slick, well-oiled electronic email filing system could offer real benefits to you, your team and your organization. We thought of these...)
  • 12:19, 16 October 2014 Mdpeters talk contribs deleted page 10 (Vandalism: content was: "==Footnote 10== See Perillo supra note 3, at 41-42. In Anglo-American law, there are many examples of the trend away from formal requirements. For example, the common law seal has little remaining significance. See Restatement...)
  • 12:18, 16 October 2014 Mdpeters talk contribs deleted page 1 (Vandalism: content was: "==Footnote 1== For purposes of these Guidelines, authentication is generally the process used to confirm the identity of a person or to prove the integrity of specific information. More specifically, in the case of a message, a...)
  • 12:17, 16 October 2014 Mdpeters talk contribs blocked KarenSanders talk contribs with an expiration time of indefinite (account creation disabled, email disabled) (Inserting nonsense/gibberish into pages)
  • 12:15, 16 October 2014 Mdpeters talk contribs deleted page 24 (Vandalism: content was: "==Footnote 24== See generally Ford, supra note 16, at 75-84. Computer Communications Security 75-84 (1994); Kaufman, et al., Network Security, supra note 22, at 101-27; Nechvatal, Public Key Cryptography, in Comtemporary Crypt...)
  • 20:30, 12 October 2014 Mdpeters talk contribs uploaded File:MichaelPeters-Profile201204tn.jpg
  • 20:10, 12 October 2014 Mdpeters talk contribs uploaded File:AuditMachine-AD2014.gif
(newest | oldest) View ( | ) (20 | 50 | 100 | 250 | 500)