The Crypt

Results: 208



#Item
151European people / Nobility / Archduke Franz Ferdinand of Austria / Bad Ischl / Gavrilo Princip / Franz Joseph I of Austria / Austria-Este / Imperial Crypt Vaults / House of Habsburg-Lorraine / Knights of the Golden Fleece / Austria

The Ogden Standard. (Ogden, UT[removed]p ].

Add to Reading List

Source URL: chroniclingamerica.loc.gov

Language: English - Date: 2011-04-05 18:43:38
152Cremation / Funeral / Death certificate / Coroner / Death / Disposal of human corpses / Death customs / Undertaking / Culture

ARTICLE 205 DEATHS AND DISPOSALS OF HUMAN REMAINS §[removed]Definitions. When used in this title: (a) "Burial" means interment of human remains in the ground or in a tomb, vault, crypt, cell or mausoleum, and includes any

Add to Reading List

Source URL: www.nyc.gov

Language: English - Date: 2012-05-21 10:46:40
153Password / Crypt / John the Ripper / Phishing / Privileged password management / OTPW / Security / Computer security / Cryptography

Improving Text Passwords Through Persuasion Alain Forget1,2 , Sonia Chiasson1,2 , P.C. van Oorschot1 , Robert Biddle2 1 School of Computer Science & 2 Human Oriented Technology Lab Carleton University, Ottawa, Canada

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2010-02-10 11:41:36
154United States / Shenandoah National Park / Long-distance trails in the United States / Great Smoky Mountains / Appalachian Trail / Crypt Lake Trail / Geography of the United States / Protected areas of the United States / Blue Ridge Mountains

Shenandoah National Park National Park Service U.S. Department of the Interior Park Emergency Number[removed]

Add to Reading List

Source URL: www.nps.gov

Language: English - Date: 2013-05-28 10:41:42
155Cryptography / Password / Crypt / John the Ripper / Password policy / Cognitive password / Computer security / Security / Access control

Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection Serge Egelman1 , Andreas Sotirakopoulos2 , Ildar Muslukhov2 , Konstantin Beznosov2 , and Cormac Herley3 1 2

Add to Reading List

Source URL: www.guanotronic.com

Language: English - Date: 2013-01-25 02:56:05
156Cryptography / Password / Salt / Shadow password / Crypt / Passwd / Password strength / Dictionary attack / Crack / System software / Computer security / Software

‘‘Foiling the Cracker’’: A Survey of, and Improvements to, Password Security† Daniel V. Klein LoneWolf Systems 5606 Northumberland Pittsburgh, PA 15217

Add to Reading List

Source URL: www.klein.com

Language: English - Date: 2002-03-05 20:44:27
157Identity management / Password manager / Password / Cryptography / Crypt / Password strength / Password fatigue / Security / Computer security / Access control

OUCH! | October[removed]IN THIS ISSUE.. • The Problem • The Solution • How Password Managers Work

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2013-10-08 11:51:46
158Cryptographic software / Disk encryption / Password / Crypt / Encrypting File System / Features new to Windows XP / Software / Microsoft Windows / System software

Security Encryption Tool and ESS Password Distribution DOP Security will encrypt user files distributed to the Agency ESS Distribution Points of Contact with CipherLock™ by Bokler Software Corp. Agency’s ESS Distri

Add to Reading List

Source URL: www.dop.wa.gov

Language: English - Date: 2012-11-09 03:45:51
159Cryptographic software / Disk encryption / Password / Crypt / Encrypting File System / Features new to Windows XP / Software / Microsoft Windows / System software

Security Encryption Tool and ESS Password Distribution DOP Security will encrypt user files distributed to the Agency ESS Distribution Points of Contact with CipherLock™ by Bokler Software Corp. Agency’s ESS Distri

Add to Reading List

Source URL: hr.wa.gov

Language: English - Date: 2012-11-09 03:45:51
160Password / Cryptographic software / Crypt / Password manager / Password strength / Security / Computer security / Access control

Notice to customers: WHAT IS HEARTBLEED? You may have heard about the “Heartbleed Bug,” which can compromise the encryption of vulnerable Web sites and allow personal information to be stolen. The Heartbleed bug was

Add to Reading List

Source URL: www.cityfirstbank.com

Language: English - Date: 2014-04-24 09:00:54
UPDATE