Search for: "In Re TLS" Results 221 - 240 of 389
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
2 Aug 2010, 9:10 am by Steve Schultze
An infrastructure has been created for a hierarchical security system, which can be purposed and re-purposed in a number of different ways. [read post]
6 Jul 2023, 9:00 am by Dennis Crouch
(If you’re tempted to ask about those old studies, read this.) [read post]
29 May 2018, 5:47 pm by Erica Portnoy
That said, we do not recommend re-enabling GPGMail with Apple Mail yet. [read post]
10 Feb 2010, 4:26 am
u miktar 1.000 TL iken 600 TL'ye indirilerek yasala? [read post]
31 May 2012, 3:22 am
rken, "Köylüde para yok. 6 aydan beri veresiye defteri tutuyorum. 12-13 bin TL çay paras? [read post]
27 Aug 2012, 10:41 pm by tekEditor
In fact, I think our generation is embracing storytelling—we’re just doing it visually. [read post]
15 Jan 2015, 2:52 pm by Peter Eckersley
Update: 2015-01-15: tl;dr this post was updated to shorten the introduction. 1. [read post]
20 Sep 2011, 4:10 pm by Elie Mystal
The fact that Tulane’s admissions committee vetted Bruce was, to me, evidence enough that they considered him fit for re-acceptance as a full-fledged civilian. [read post]
8 Sep 2013, 3:43 pm by Dan Wallach
Certainly, we’re setting an ugly example for the world. [read post]
10 Sep 2018, 11:35 am by Cory Doctorow
"Link Tax": Article 11, which will only allow internet users to post links to news sites if the service they're using has bought a "linking license" from the news-source they're linking to; under a current proposal, links that repeat more than two consecutive words from an article's headline could be made illegal without a license. [read post]
7 May 2015, 3:14 am by SHG
  While he runs through the studies in greater detail, the TL;dr version is: we have no clue. [read post]
26 Mar 2017, 9:24 pm by Jeremy Gillula and Peter Eckersley
  Risk #1: Snooping On Traffic (And Creating New Targets for Hackers) In order for Internet providers to make money off your browsing history, they first have to collect that information—what sort of websites you’re browsing, metadata about whom you’re talking to, and maybe even what search terms you’re using. [read post]