Recent changes

Track the most recent changes to the wiki on this page.

Recent changes options Show last 50 | 100 | 250 | 500 changes in last 1 | 3 | 7 | 14 | 30 days
Hide registered users | Hide anonymous users | Hide my edits | Show bots | Show minor edits
Show new changes starting from 22:17, 27 September 2024
   
Language:
List of abbreviations:
N
This edit created a new page (also see list of new pages)
m
This is a minor edit
b
This edit was performed by a bot
(±123)
The page size changed by this number of bytes

24 September 2024

23 September 2024

N    15:56  Glossary:Supply chain attack diffhist +556 Philip talk contribs (Created page with "Modern hardware and software is generally composed of many different (hardware and software) components, some of these themselves composed of multiple sub-components. Keeping track of the provenance and trustworthiness of all of these can be an extremely difficult problem. Any of them might be compromised in a "supply chain" attack to compromise the integrity of a finished product. A classic example was the introduction of explosives into pagers and walkie-talkies suppli...")
     15:41 Move log Philip talk contribs moved page Watering hole attack to Glossary:Watering hole attack without leaving a redirect ‎
N    15:40  Watering hole attack‎‎ 2 changes history +353 [Philip‎ (2×)]
     
15:40 (cur | prev) +9 Philip talk contribs
N    
14:00 (cur | prev) +344 Philip talk contribs (Created page with "A watering hole attack is an attempt to compromise a target organisation or individual by first compromising a website or online resource that they are known or suspected to use (their "watering hole"). In this way, for example, the attacker may hope to gain access to a well defended defence contractor though one of its less secure suppliers.")
N    15:38  Glossary:Side channel attack‎‎ 2 changes history +504 [Philip‎ (2×)]
     
15:38 (cur | prev) +147 Philip talk contribs
N    
08:44 (cur | prev) +357 Philip talk contribs (Created page with "A side channel or covert channel attack is one which exploits some side-effect of the processing, transmission or storage of data to draw inferences about the data itself. For example, unless carefully designed, observing how the power consumed by a processor while encrypting data can leak informaion, ultimately leading to discovery of the encryption key.")

20 September 2024

N    21:00  Fixing Laptop Hinges‎‎ 2 changes history +2,919 [Philip‎ (2×)]
     
21:00 (cur | prev) +411 Philip talk contribs
N    
20:56 (cur | prev) +2,508 Philip talk contribs (Created page with "When a laptop screen comes off in your hand (or feels like it might), this page will help... <div class="showtoc"> __TOC__ </div> ==Summary== All pages should start with a summary, to enable the reader to see at a glance what the page is about and whether it is likely to give the information required. This is subtly different from the description of the page's purpose, given above. Retaining the basic structure, replace all the text of this page with your own content....")

17 September 2024

12 September 2024

     20:51 User rights log Philip talk contribs changed group membership for Lee-Grant from (none) to Editor ‎

4 September 2024

     20:09  Glossary:Gnats whisker diffhist +103 Philip talk contribs

30 August 2024

     10:06  Glossary diffhist +160 Philip talk contribs (→‎Glossary of Terms)
N    09:56  Glossary:Speculative execution diffhist +426 Philip talk contribs (Created page with "High performance CPUs use multiple logic blocks in order to perform as much work as possible in parallel. So for example, if a CPU is required to process a list of ten items it might start to "speculatively execute" the processing of an 11th before it has been able to determine that it has completed the list. Even though this wasted effort has to be discarded, a net performance improvement can be achieved.")
N    09:16  Glossary:Cache diffhist +141 Philip talk contribs (Created page with "A cache is a small and very fast block of memory used to hold immediate working data or frequently used instructions from a computer program.") Tag: Visual edit: Switched

29 August 2024

     11:23  Glossary diffhist +59 Philip talk contribs (→‎Glossary of Terms)
N    11:20  Glossary:PEBKAC‎‎ 2 changes history +450 [Philip‎ (2×)]
     
11:20 (cur | prev) +36 Philip talk contribs Tag: Visual edit
N    
11:19 (cur | prev) +414 Philip talk contribs (Created page with "Problem Exists Between Keyboard And Chair (or a variant) is an expression sometimes used by computer experts and support staff to indicate that a problem lies with a user rather than the computer system. It should be used sparingly and with caution as it can cause offence, also bearing in mind that the real source of the problem might often be shortcomings in the usability of the system or opaque documentation.")
     08:38  How to use a multimeter diffhist +197 Philip talk contribs (→‎Choosing a multimeter)