Ciro Santilli
🔗
Computer security
|
🗖 nosplit
|
↑ parent "Software"
|
0
,
13
,
91
🗖 nosplit
|
⇓ toc
|
↑ parent "Software"
|
Wikipedia
|
0
,
13
,
91
🔗
Table of contents
|
0
,
13
,
91
1. Arbitrary code execution (ACE)
|
🔗 link
|
🗖 nosplit
|
↑ parent "Computer security"
2. Multi-factor authentication (2FA)
|
0
,
2
,
66
|
🔗 link
|
🗖 nosplit
|
↑ parent "Computer security"
2.1. 2FA app
|
🔗 link
|
🗖 nosplit
|
↑ parent "Multi-factor authentication"
2.2. Google 2FA app token can be updated without checking the old 2FA
|
66
|
🔗 link
|
🗖 nosplit
|
↑ parent "Multi-factor authentication"
3. OAuth
|
🔗 link
|
🗖 nosplit
|
↑ parent "Computer security"
4. Security through obscurity
|
2
,
1
,
25
|
🔗 link
|
🗖 nosplit
|
↑ parent "Computer security"
4.1. Kerckhoffs's principle
|
23
|
🔗 link
|
🗖 nosplit
|
↑ parent "Security through obscurity"
5. Malware
|
🔗 link
|
🗖 nosplit
|
↑ parent "Computer security"
6. Ransomware
|
🔗 link
|
🗖 nosplit
|
↑ parent "Computer security"
7. Data breach
|
0
,
3
,
0
|
🔗 link
|
🗖 nosplit
|
↑ parent "Computer security"
7.1. WikiLeaks
|
🔗 link
|
🗖 nosplit
|
↑ parent "Data breach"
7.2. List of data breaches
|
0
,
1
,
0
|
🔗 link
|
🗖 nosplit
|
↑ parent "Data breach"
7.2.1. United States diplomatic cables leak (2010)
|
🔗 link
|
🗖 nosplit
|
↑ parent "List of data breaches"
🔗
Incoming links
The best articles by Ciro Santilli