All public logs
Jump to navigation
Jump to search
Combined display of all available logs of HORSE - Holistic Operational Readiness Security Evaluation.. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
- 11:21, 4 July 2015 Mdpeters talk contribs deleted page File:Bluelock.png (Deleted old revision 20150630035802!Bluelock.png)
- 11:21, 4 July 2015 Mdpeters talk contribs uploaded a new version of File:Bluelock.png
- 11:20, 4 July 2015 Mdpeters talk contribs deleted page File:Yellowlock.png (Deleted old revision 20150630035658!Yellowlock.png)
- 11:20, 4 July 2015 Mdpeters talk contribs uploaded a new version of File:Yellowlock.png
- 11:20, 4 July 2015 Mdpeters talk contribs uploaded a new version of File:Greenlock.png
- 11:19, 4 July 2015 Mdpeters talk contribs uploaded File:Blacklock.png
- 11:16, 4 July 2015 Mdpeters talk contribs deleted page File:Redlock.png (Deleted old revision 20150630035903!Redlock.png)
- 11:16, 4 July 2015 Mdpeters talk contribs uploaded a new version of File:Redlock.png
- 10:53, 4 July 2015 Mdpeters talk contribs deleted page File:Greenlock.png (Deleted old revision 20150630035309!Greenlock.png)
- 10:53, 4 July 2015 Mdpeters talk contribs deleted page File:Greenlock.png (Deleted old revision 20150630035945!Greenlock.png)
- 10:53, 4 July 2015 Mdpeters talk contribs uploaded a new version of File:Greenlock.png
- 03:59, 30 June 2015 Mdpeters talk contribs uploaded a new version of File:Greenlock.png
- 03:59, 30 June 2015 Mdpeters talk contribs uploaded a new version of File:Redlock.png
- 03:58, 30 June 2015 Mdpeters talk contribs uploaded a new version of File:Bluelock.png
- 03:56, 30 June 2015 Mdpeters talk contribs uploaded a new version of File:Yellowlock.png
- 03:53, 30 June 2015 Mdpeters talk contribs uploaded a new version of File:Greenlock.png
- 11:35, 30 May 2015 Mdpeters talk contribs uploaded File:Policymachine-170x170.png
- 12:23, 16 January 2015 Mdpeters talk contribs uploaded File:ITAM-Mechanized-HORSEPROJECT.png
- 04:18, 16 January 2015 Mdpeters talk contribs uploaded File:HORSE-MECH.png
- 04:17, 16 January 2015 Mdpeters talk contribs uploaded File:HORSE-ITAM01-464x600.png
- 12:38, 16 October 2014 Mdpeters talk contribs undeleted page 22 (3 revisions restored)
- 12:35, 16 October 2014 Mdpeters talk contribs undeleted page 24 (2 revisions restored)
- 12:35, 16 October 2014 Mdpeters talk contribs undeleted page 1 (3 revisions restored)
- 12:35, 16 October 2014 Mdpeters talk contribs undeleted page 10 (3 revisions restored)
- 12:35, 16 October 2014 Mdpeters talk contribs undeleted page 11 (3 revisions restored)
- 12:34, 16 October 2014 Mdpeters talk contribs undeleted page 12 (4 revisions restored)
- 12:34, 16 October 2014 Mdpeters talk contribs undeleted page 23 (3 revisions restored)
- 12:34, 16 October 2014 Mdpeters talk contribs undeleted page 21 (4 revisions restored)
- 12:34, 16 October 2014 Mdpeters talk contribs undeleted page 20 (4 revisions restored)
- 12:34, 16 October 2014 Mdpeters talk contribs undeleted page 2 (5 revisions restored)
- 12:33, 16 October 2014 Mdpeters talk contribs undeleted page 19 (5 revisions restored)
- 12:33, 16 October 2014 Mdpeters talk contribs undeleted page 18 (3 revisions restored)
- 12:33, 16 October 2014 Mdpeters talk contribs undeleted page 17 (5 revisions restored)
- 12:25, 16 October 2014 Mdpeters talk contribs deleted page 17 (Vandalism: content was: "==Footnote 17== A nonrepudiation service provides only proof of facts to defend against an opponent's effort to avoid a transaction. See Baum, supra note 16, at 6 (1994). See Guideline 1.20 (nonrepudiation), particularly Commen...)
- 12:25, 16 October 2014 Mdpeters talk contribs deleted page 18 (Vandalism: content was: "==Footnote 18== For a more thorough examination of properties desirable in a digital signature, see generally Bruce Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C §2.6, 33-40 (2d ed. 1996) (hereinaf...)
- 12:23, 16 October 2014 Mdpeters talk contribs deleted page 19 (Vandalism: content was: "==Footnote 19== In contrast with public key cryptography, "conventional," "single key," or "symmetric cryptography" uses the same single key to "encrypt" "plaintext" into "ciphertext," and to "decrypt" it from ciphertext back t...)
- 12:23, 16 October 2014 Mdpeters talk contribs deleted page 2 (Vandalism: content was: "==Footnote 2== See, e.g., U. C. C. § 1-201(39) (1992). == Staging the news and staging reality are the same thing == Jon Rappoport Prison Planet.com October 13, 2013 Hi! Were the newsmanufacturing witnesses, creating dupe...)
- 12:23, 16 October 2014 Mdpeters talk contribs deleted page 20 (Vandalism: content was: "==Footnote 20== Of course, the holder of the private key may choose to divulge it, or may lose control of it (often called "compromise"), and thereby make forgery possible. The Guidelines seek to address this problem in two way...)
- 12:22, 16 October 2014 Mdpeters talk contribs deleted page 21 (Vandalism: content was: "==Footnote 21== Many cryptographic systems will function securely only if the keys are lengthy and complex, too lengthy and complex for a person to easily remember or use. == Teen Facing 8 Years Prison After Violent Joke in On...)
- 12:22, 16 October 2014 Mdpeters talk contribs deleted page 22 (Vandalism: content was: "==Footnote 22== See generally Ford, supra note 16, at 71-75; Charlie Kaufman, Radia Perlman & Mike Speciner, Network Security: Private Communication in a Public World 48-56 (1995) (hereinafter "Kaufman, et al., Network Security...)
- 12:22, 16 October 2014 Mdpeters talk contribs deleted page 23 (Vandalism: content was: "==Footnote 23== "Computationally infeasible" is a relative concept based on the value of the data protected, the computing overhead required to protect it, the length of time it needs to be protected, and the cost and time requ...)
- 12:21, 16 October 2014 Mdpeters talk contribs deleted page 12 (Vandalism: content was: "==Footnote 12== Cf. The U.S. Comptroller General's rationale for accepting digital signatures as sufficient for government contracts under 31 U.S.C. 1501(a)(1): "The electronic symbol proposed for use by certifying officers . ....)
- 12:20, 16 October 2014 Mdpeters talk contribs deleted page 11 (Vandalism: content was: "==Footnote 11== Michael Braunstein, Remedy, Reason, and the Statute of Frauds: A Critical Economic Analysis, 1989 Utah L. Rev. 383, 423-26 (1989); Jhering, supra, note 5, at 474 (inattention to legally appropriate form for expr...)