Knowledge

Talk:Pre-boot authentication

Source 📝

133: 262: 231: 326: 77: 53: 22: 346: 248: 167: 392:
There seems to be no such thing as `Milk Maid' attack, the Google search does not return any relevant results. I have, however, found documents about `Evil Maid' attacks instead and this seem to be the correct term to be used here. I have changed the article accordingly.
472: 247: 507: 198: 467: 117: 517: 123: 482: 462: 310: 502: 93: 316: 492: 156: 84: 58: 477: 497: 286: 487: 269: 236: 142: 63: 512: 335: 241: 33: 432: 409: 207:
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
181: 354: 21: 282: 39: 397: 443: 285:
on Knowledge. If you would like to participate, please visit the project page, where you can join
92:
on Knowledge. If you would like to participate, please visit the project page, where you can join
401: 176: 89: 405: 366: 358: 210:
Find editors who have shown interest in this subject and ask them to take a look here.
456: 132: 413: 325: 261: 230: 345: 76: 52: 278: 274: 166: 433:
The Invisible Things Lab's blog: Evil Maid goes after TrueCrypt!
369:. Please ensure the assessment is correct before removing the 15: 344: 324: 165: 131: 473:
Stub-Class Computer Security articles of Unknown-importance
444:
What is evil maid attack? - Definition from WhatIs.com
273:, a collaborative effort to improve the coverage of 88:, a collaborative effort to improve the coverage of 508:Stub-Class software articles of Unknown-importance 315:This article has not yet received a rating on the 188:Review importance and quality of existing articles 122:This article has not yet received a rating on the 191:Identify categories related to Computer Security 468:Unknown-importance Computer Security articles 8: 225: 197:Identify articles for creation (see also: 151: 47: 19: 518:Automatically assessed Computing articles 179:. Please allow some days for processing. 425: 227: 102:Knowledge:WikiProject Computer Security 49: 370: 105:Template:WikiProject Computer Security 483:Unknown-importance Computing articles 463:Stub-Class Computer Security articles 7: 503:Unknown-importance software articles 267:This article is within the scope of 82:This article is within the scope of 38:It is of interest to the following 14: 204:Identify articles for improvement 260: 246: 229: 75: 51: 20: 295:Knowledge:WikiProject Computing 493:All Computer Security articles 298:Template:WikiProject Computing 1: 478:Stub-Class Computing articles 333:This article is supported by 289:and see a list of open tasks. 175:will be generated shortly by 157:WikiProject Computer Security 140:This article is supported by 96:and see a list of open tasks. 85:WikiProject Computer Security 498:Stub-Class software articles 388:Milk Maid style of attacks? 534: 414:14:05, 3 August 2016 (UTC) 317:project's importance scale 124:project's importance scale 108:Computer Security articles 352: 332: 314: 255: 150: 139: 121: 70: 46: 488:All Computing articles 353:This article has been 349: 329: 283:information technology 170: 136: 28:This article is rated 513:All Software articles 348: 328: 270:WikiProject Computing 169: 143:WikiProject Computing 135: 336:WikiProject Software 194:Tag related articles 155:Things you can help 355:automatically rated 182:More information... 365:because it uses a 350: 330: 301:Computing articles 171: 137: 34:content assessment 417: 400:comment added by 385: 384: 381: 380: 377: 376: 361:or other tool as 224: 223: 220: 219: 216: 215: 99:Computer Security 90:computer security 59:Computer Security 525: 446: 441: 435: 430: 416: 394: 372: 303: 302: 299: 296: 293: 264: 257: 256: 251: 250: 249: 244: 233: 226: 199:Article requests 184: 152: 110: 109: 106: 103: 100: 79: 72: 71: 66: 55: 48: 31: 25: 24: 16: 533: 532: 528: 527: 526: 524: 523: 522: 453: 452: 451: 450: 449: 442: 438: 431: 427: 395: 390: 300: 297: 294: 291: 290: 245: 239: 185: 180: 107: 104: 101: 98: 97: 61: 32:on Knowledge's 29: 12: 11: 5: 531: 529: 521: 520: 515: 510: 505: 500: 495: 490: 485: 480: 475: 470: 465: 455: 454: 448: 447: 436: 424: 423: 419: 389: 386: 383: 382: 379: 378: 375: 374: 351: 341: 340: 331: 321: 320: 313: 307: 306: 304: 287:the discussion 265: 253: 252: 234: 222: 221: 218: 217: 214: 213: 212: 211: 208: 205: 202: 195: 192: 189: 173:Article alerts 164: 161: 160: 148: 147: 138: 128: 127: 120: 114: 113: 111: 94:the discussion 80: 68: 67: 56: 44: 43: 37: 26: 13: 10: 9: 6: 4: 3: 2: 530: 519: 516: 514: 511: 509: 506: 504: 501: 499: 496: 494: 491: 489: 486: 484: 481: 479: 476: 474: 471: 469: 466: 464: 461: 460: 458: 445: 440: 437: 434: 429: 426: 422: 418: 415: 411: 407: 403: 399: 387: 368: 367:stub template 364: 360: 356: 347: 343: 342: 338: 337: 327: 323: 322: 318: 312: 309: 308: 305: 288: 284: 280: 276: 272: 271: 266: 263: 259: 258: 254: 243: 238: 235: 232: 228: 209: 206: 203: 200: 196: 193: 190: 187: 186: 183: 178: 174: 168: 163: 162: 158: 154: 153: 149: 145: 144: 134: 130: 129: 125: 119: 116: 115: 112: 95: 91: 87: 86: 81: 78: 74: 73: 69: 65: 60: 57: 54: 50: 45: 41: 35: 27: 23: 18: 17: 439: 428: 420: 396:— Preceding 391: 362: 334: 268: 172: 141: 83: 40:WikiProjects 457:Categories 421:References 373:parameter. 363:Stub-class 30:Stub-class 292:Computing 279:computing 275:computers 237:Computing 177:AAlertBot 64:Computing 410:contribs 398:unsigned 242:Software 371:|auto= 281:, and 36:scale. 357:by a 159:with: 406:talk 402:JITR 359:bot 311:??? 118:??? 459:: 412:) 408:• 277:, 240:: 62:: 404:( 339:. 319:. 201:) 146:. 126:. 42::

Index


content assessment
WikiProjects
WikiProject icon
Computer Security
Computing
WikiProject icon
WikiProject Computer Security
computer security
the discussion
???
project's importance scale
Taskforce icon
WikiProject Computing
WikiProject Computer Security

AAlertBot
More information...
Article requests
WikiProject icon
Computing
Software
WikiProject icon
WikiProject Computing
computers
computing
information technology
the discussion
???
project's importance scale

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.