Search for: "Root User" Results 1 - 20 of 500
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
14 Feb 2019, 11:27 am by Sydney Li
activity after instructing users to alter the root certificate store on their phones. [read post]
14 Feb 2019, 11:27 am by Sydney Li
activity after instructing users to alter the root certificate store on their phones. [read post]
10 Mar 2020, 11:00 am by Mona Wang
Forcing users to install a root certificate enables the certificate owner to decrypt almost all their [read post]
tampers with Windows' cryptographic security to perform man-in-the-middle attacks against the user [read post]
31 Jan 2019, 9:31 pm by Bennett Cyphers
Root of All Evil After Apple kicked Onavo out of the Apple Store, Facebook resorted to extraordinary [read post]
25 Jan 2015, 6:12 pm by NELB Staff
Last Edition's Most Popular Article(s): I Tried A Brain-Altering Wearable That Allows Users To Change [read post]
15 Dec 2021, 2:46 pm by Alexis Hancock
rsquo;s Digital Identity Framework (eIDAS) would have major, adverse security effects on millions of users [read post]
20 Sep 2024, 2:19 pm by Kevin O'Keefe
The root cause was a technical issue with database connections during a scheduled maintenance event. [read post]
7 Nov 2023, 10:02 am by Jacob Hoffman-Andrews
in turn limits how vigorously browsers can compete with each other on improving security for their users [read post]
3 Mar 2014, 12:40 pm by Ernster the Virtual Library Cat
The Hein Online databases contain an enormous quantity of useful legal material but is not the most user [read post]
2 Aug 2010, 9:10 am by Steve Schultze
On that day, years of planning culminated in the deployment of a cryptographic signature on the root [read post]
15 Mar 2022, 4:41 pm by Alexis Hancock
rejected Ukraine’s requests to revoke Russian top-level domains, access to Domain Name System root [read post]
22 Jul 2019, 4:33 pm by Sabrina I. Pacifici
That’s what happened on June 24, 2019 when users across the world were left unable to access a [read post]
25 Nov 2015, 10:56 am by Cooper Quintin
Lenovo was shipping computers preloaded with software called Superfish, which installed its own HTTPS root [read post]
10 Dec 2015, 2:13 pm by Bill Budington and Eva Galperin
Operating systems and browsers maintain their own list of legitimate root certificates that come bundled [read post]
22 Feb 2019, 10:30 am by Cooper Quintin
Arab Emirates, is seeking to become approved as a top-level certificate authority in Mozilla’s root [read post]
16 Jun 2025, 8:52 am by Jillian C. York
risky content” threaten to overblock legitimate expression, disproportionately harming vulnerable users [read post]
1 May 2019, 11:39 am by Jillian C. York
that govern what users can and cannot say grow more complex with every year. [read post]
3 Oct 2016, 9:15 am by Jeremy Malcolm
oversight over the performance of ICANN's IANA functions—notably its maintenance of the root [read post]
main components of the software is KeyAlert, a keystroke-capturing function that records everything a user [read post]