• Binary hardening is a security technique in which binary executables are analyzed and modified to protect against common exploits. Binary hardening is independent...
    3 KB (279 words) - 06:55, 29 August 2024
  • up hardening or harden in Wiktionary, the free dictionary. Hardening is the process by which something becomes harder or is made harder. Hardening may...
    782 bytes (139 words) - 05:51, 13 February 2025
  • contribute to these streaks: under sampling, photon starvation, motion, beam hardening, and Compton scatter. This type of artifact commonly occurs in the posterior...
    155 KB (16,219 words) - 20:30, 29 May 2025
  • Thumbnail for Rkhunter
    Samhain (software) Host-based intrusion detection system comparison Hardening (computing) Linux malware MalwareMustDie Rootkit "A way to detect the rootkits...
    4 KB (321 words) - 08:42, 7 May 2025
  • Radiation hardening is the process of making electronic components and circuits resistant to damage or malfunction caused by high levels of ionizing radiation...
    45 KB (5,216 words) - 07:09, 28 May 2025
  • Thumbnail for GrapheneOS
    GrapheneOS (redirect from Android Hardening)
    2022. Baader, Hans-Joachim (9 April 2019). "Android Hardening wird zu GrapheneOS" [Android Hardening becomes GrapheneOS]. Pro-Linux (in German). Archived...
    27 KB (2,139 words) - 00:02, 29 May 2025
  • Thumbnail for Chkrootkit
    detection by them. Host-based intrusion detection system comparison Hardening (computing) Linux malware MalwareMustDie rkhunter Lynis OSSEC Samhain (software)...
    2 KB (194 words) - 06:32, 13 March 2025
  • using anti-tampering techniques, for example the Mariposa botnet. Hardening (computing) Fault tolerance Denuvo Arnold, Michael; Schmucker, Martin; Wolthusen...
    8 KB (890 words) - 23:10, 1 May 2025
  • Cambridge Quantum Computing (CQC). HQS was founded in 2014. The company used a trapped-ion architecture for its quantum computing hardware, which Honeywell...
    29 KB (2,593 words) - 06:53, 25 May 2025
  • Thumbnail for Next-Generation Secure Computing Base
    effort to promote personal computing confidence and security. The TCPA released detailed specifications for a trusted computing platform with focus on features...
    79 KB (7,349 words) - 10:48, 27 May 2025
  • Thumbnail for Mobile device
    a mobile computing device is pocket-sized, but other sizes for mobile devices exist. Mark Weiser, known as the father of ubiquitous computing, referred...
    16 KB (1,780 words) - 19:10, 18 May 2025
  • Thumbnail for Fedora Linux
    controls, which Fedora adopted early on. Fedora provides a hardening wrapper, and does hardening for all of its packages by using compiler features such...
    50 KB (4,120 words) - 12:21, 17 May 2025
  • Jeffrey; Manico, Jim; Wall, Kevin (2018-03-02) [2013]. "C-Based Toolchain Hardening". The Open Web Application Security Project (OWASP). Archived from the...
    10 KB (984 words) - 14:39, 26 May 2025
  • Thumbnail for Technology Innovation Institute
    system research centre is known for its operation in hardware hardening, software hardening, system integrity, network resilience etc. The centre is currently...
    23 KB (1,786 words) - 11:00, 15 April 2025
  • Thumbnail for Quine (computing)
    self-referential formula Programming languages Quine's paradox Polyglot (computing) Examples include Bash, Perl, and Python Bratley, Paul; Millo, Jean (1972)...
    25 KB (2,564 words) - 00:57, 20 March 2025
  • infrastructure of cloud computing. It is a sub-domain of computer security, network security and, more broadly, information security. Cloud computing and storage...
    53 KB (6,671 words) - 06:52, 7 April 2025
  • Thumbnail for Viscoplasticity
    the isotropic hardening laws, and those of Kratochvil, Malinini and Khadjinsky, Ponter and Leckie, and Chaboche for the kinematic hardening laws. Perzyna...
    47 KB (6,919 words) - 17:18, 28 August 2024
  • Thumbnail for Atherosclerosis
    describing any hardening (and loss of elasticity) of medium or large arteries (from Greek ἀρτηρία (artēria) 'artery' and σκλήρωσις (sklerosis) 'hardening'); arteriolosclerosis...
    105 KB (11,388 words) - 20:02, 29 May 2025
  • certain classes of attack against it. This was accomplished through system hardening and a proactive, ongoing focus on security and attack resistance. Subgraph...
    6 KB (498 words) - 20:27, 25 April 2025
  • RTX (section Computing)
    lymphomas, transplant rejection and autoimmune disorders RTX2010, a radiation-hardened microprocessor which has been used in numerous spacecraft RTX toxin (repeats...
    2 KB (237 words) - 22:02, 3 June 2024
  • Thumbnail for Internet of things
    Internet of things (category Computing and society)
    goods (supply chain), industrial Internet, pervasive computing, pervasive sensing, ubiquitous computing, cyber-physical systems (CPS), wireless sensor networks...
    189 KB (20,220 words) - 18:37, 27 May 2025
  • Thumbnail for Gentoo Linux
    patches to produce a hardened kernel, but these were discontinued. Other parts of the hardened set, such as SELinux, and userspace hardening remain. In June...
    55 KB (4,562 words) - 15:26, 15 May 2025
  • Case (section Computing)
    to requests Calcium selenide (chemical formula: CaSe) Case-hardening, a process of hardening the surface of a metal object Case-shot, a type of anti-personnel...
    5 KB (687 words) - 07:02, 5 May 2025
  • Thumbnail for History of computed tomography
    in the 1970s with the work of Godfrey Hounsfield, when advancements in computing power and the development of commercial CT scanners made routine diagnostic...
    48 KB (6,003 words) - 07:45, 28 May 2025
  • Kubernetes (category Free software for cloud computing)
    community of contributors, and the trademark is held by the Cloud Native Computing Foundation. The name Kubernetes originates from the Greek κυβερνήτης (kubernḗtēs)...
    73 KB (6,713 words) - 21:27, 23 May 2025
  • Thumbnail for Computer security
    address in a network packet to hide their identity or impersonate another computing system. MAC spoofing, where an attacker modifies the Media Access Control...
    220 KB (22,314 words) - 20:25, 29 May 2025
  • Thumbnail for Wikipedia
    have been cited 92,300 times in scholarly journals, from which cloud computing was the most cited page. On January 18, 2023, Wikipedia debuted a new...
    321 KB (27,690 words) - 17:47, 29 May 2025
  • fully minimalized OS install profiles forced, for example, with security hardening tools or representing Recovery Console images and JeOS richer install...
    3 KB (255 words) - 15:02, 16 February 2025
  • Thumbnail for Flow plasticity theory
    rule and a hardening model. Typical flow plasticity theories for unidirectional loading (for small deformation perfect plasticity or hardening plasticity)...
    13 KB (2,011 words) - 10:01, 27 May 2025
  • Thumbnail for Ian Coldwater
    2021. Retrieved July 23, 2021. Cloud Native Computing Foundation (November 20, 2020). "Cloud Native Computing Foundation Announces 2020 Community Awards...
    13 KB (868 words) - 18:32, 15 November 2024