Search results

Jump to navigation Jump to search
View ( | next 20) (20 | 50 | 100 | 250 | 500)
  • ...furtherance of the movant’s right of petition or free speech. Globetrotter Software, Inc. v. Elan Computer Group, Inc., 63 F. Supp. 2d 1127, 1129 (N.D. Cal. 19 ...
    17 KB (2,553 words) - 14:51, 10 April 2011
  • ...efault user having full access rights. Easily obtainable lists of popular software exist that identify the default users and passwords, enabling anyone with a Sometimes software installs with a default account that allows anonymous access. Anonymous acc ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...swers to the questions reveal risks. Taxonomy-based risk identification in software industry can be found in [http://www.sei.cmu.edu/publications/documents/93. ...or application to a particular situation. An example of known risks in the software industry is the Common Vulnerability and Exposures list found at http://cve ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...., prohibits an unauthorized person from knowingly installing or providing software that performs certain functions, such as taking control of the computer or ...m] prohibits an unauthorized person from knowingly installing or providing software that performs certain functions, such as taking control of the computer or ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...crutiny, found that the Loudoun County Library’s policy of using filtering software to block sexually explicit Internet sites violated the First Amendment. Whi ...ntiffs had argued that the library should be required to install filtering software on their computers to prevent children’s access to online pornography. ...
    32 KB (4,920 words) - 19:22, 10 April 2011
  • ...., prohibits an unauthorized person from knowingly installing or providing software that performs certain functions, such as taking control of the computer or ...2] prohibits an unauthorized person from knowingly installing or providing software that performs certain functions, such as taking control of the computer or ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...ion for the negligent design or manufacture of computer hardware, computer software, or firmware. ...ion for the negligent design or manufacture of computer hardware, computer software, or firmware.” ...
    85 KB (12,600 words) - 16:49, 1 March 2009
  • * Open applications: Consumers should be able to download and utilize any software applications, content, or services they desire; ...ri Vincenzo VITA (PD) e Luigi VIMERCATI (PD) "NEUTRALITA' DELLE RETI, FREE SOFTWARE E SOCIETA' DELL'INFORMAZIONE." Senator Vimercati in an interview said that ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...tempting to damage protected computers through the use of viruses or other software mechanism was set to imprisonment for up to 10 years, while the penalty for ...
    142 KB (21,198 words) - 10:23, 23 August 2011
View ( | next 20) (20 | 50 | 100 | 250 | 500)