Updated in
2564 : on
2021 :
1 :
4 :
anzensei Security :
Secur1ty Usages;
key;
Radical374;
National Security,
Regional Security;
Also see: Idea
Processor;
Manmade
Global Weather; Nama For Humanoid;
OS by numbers of versions,
and, in addition to keywords
(e.g. (BE, FE), CE, MS, MZ,
PE, VM, ... ), TXT for 2 steps ((
verify) verification
(Roaming . Identities . Phone Number)),
WHICH (hub,
IoT,
OEM,
Router, switch),
WHEN
timestamp
user
((login, logout), (sign-in, sign-out)) with web authentication (Web
Authentication a.k.a.
WebAuthn),
WHERE location awareness of the phone number,
mochiron of course! 2
(1 mm ones) gravity spots in
GPS as
embedded
device;
National Security,
Regional Security;
embedded;
Radical693;
2021 | / | 2564 | ; | security | of | key | : | ||
computer | 's | web | site | security | , | IFF | certificate | ; | |
enhance | d | key | usage | ( | e.g. | ♯.♯.♯.♯.♯.♯.♯.♯ | ) | ; | |
issue | d | by | ( | e.g. | Secure Hash Algorithm | ( | SHA | ) | ) |
key | usage | ( | e.g. | digital signature | , | key | code | ) | ; |
serial | number | ( | e.g. | ♯♯:♯♯ | : | ... | ) | ; | |
SHA | - | 256 | fingerprint | ( | e.g. | ♯♯:♯♯ | : | ... | ) |
SHA | 1 | fingerprint | ( | e.g. | ♯♯:♯♯ | : | ... | ) | ; |
signature | algorithm | ( | e.g. | sha256 | this | DOMAIN | ) | ; | |
signature | hash | algorithm | ( | e.g. | SHA256 | ) | ; | ||
subject | alternative | name | ( | e.g. | DNS | name | , | not critical | ) |
subject | country | ( | e.g. | country name | , | geographical domain name | ) | ; | |
subject | locality | ( | e.g. | city name | , | region name | ) | ; | |
subject | organization | ( | e.g. | company name | ) | ; | |||
subject | public key | ( | e.g. | ♯♯:♯♯: | ... | , | this | DOMAIN | ) |
subject | public key | parameter | s | ( | e.g. | #### | ) | ; | |
validation | ( | e.g. | valid from | ( | timestamp | ) | , | ||
valid to | ( | timestamp | ) | ) | ; | ||||
version | ( | e.g. | whole | number | ) | ; | computer | 's | website |
2891 464195 . 2991573312965
. 171254
:
4 .
8 .
2
:
this DOMAIN .
triangulation .
system ;
OEM Drive (protection on), also see:
Directories;
Files;
2018/2561;
(for each Time Zone, for each local system) using
Artificial Intelligence (to do good, to be better secure environmental) i.e.
security ... ; SQRT2 design model:
okonau Do beyond (font, layer, SPL) system security (16 bit, 32 bit, 64
bit, 128 bit, 256 bit, 1K bit, 4K bit, 8K bit, ... ) Q&A, ... ;
03/01/2018 /2561; this DOMAIN 's compilation number: version C118; Global Sign certificate (e.g. this DOMAIN . p7b FILE i.e. (..\..\IT\25620\Certificate\this DOMAIN.p7b)) WHICH has been created and installed for its System Security, using SONY 4K TV with HDMI connection, and NFC with SONY XZ smart phone; with Mini Dictionary (i.e. \\ Mini Dictionary \ *.* /s) contains approx. 6714 Files, 171 Folders, 58.1 MB (60,948,727 bytes) Size, and 3400+characters available to learn and understand;
partition; wall;
Radical381;
Since
2017/2561, using
Walls, for better
system security ... ;
- guard and secure system number of smart sensing and IoT operation ... ;
- protect real time system of airline flights, by using iroColourWaveForm ... ;
- verify iroColourWaveForm color codes, And Then, guard and secure system number ... ;
Since
2017/2561, for each
Time Zone, this
DOMAIN, using AI, in the Internet (High-bandwidth Digital Content
Protection,
HDCP)
... ;
Since
2013/2557, this DOMAIN
has
designed
& developed
its system security to
Sound
Pressure
Level
Security (
ID)
... ;
Time must be
understood 1st,
and then
do computer systems security ... ;
3 common
methods
exist:
1,
establishing sub-tree;
2,
modeling individual entry,
e.g. in 2006, for each 480 Mbps pipe till 30 pipes @ 30 M
c/s (Hz) USB DWA ...
;
3,
modeling attributes of
each entry;
802.* specific; 802.* specific: in 2006, 802.1x product specific are EAP-FAST, EAP-TLS, EAP-TTLS, LEAP, PEAP, and etc.
ACAP;
ACE;
ACK; (ACL
One of the
Control Lists (Wire speed) (...)); AEC 128 CCM
encryption, LSI
DWA USB wire AND
wireless, 32 pipes support at 30 MHz;
AES;
AES 256-bit encryption, also see:
CBC mode;
AH
AH OR ESP;
using artificial intelligence 26 secure Ajax proxy (XML Http Request) ... ;
ANS1 USA; ARP; ATP; (Authentication (User account (*FS mount access)) (Password (Good password) (Shadow password)) (Permission (Directory) (File) i.e. suid, sgid in Linux) (...)); AVX, 256-bit, Win7 SP1;
b00tp, B00t Pr0t0c0l;
BSD Meta system Integration specification AND
U-Prove Cryptography specification;
Basic understanding of
HOW security
works is: 1st, copy a noCOOKIE browser file i.e.
noCOOKIE.exe into a USB Drive; 2nd, open the
USB Drive among computers ... ; 3rd, to do
right click
on
the noCOOKIE ... ; Notice THAT there is no
Security Tab prompts, because not yet to be defined
e.g. object,
name,
... , at THIS time; Now is the time to basic understand
WHAT is security, to do so, copy
noCOOKIE into a system drive's directory, right click on i.e. C:\
IT
\
Executable
Application
\
no
COOKIE
.exe ; if Compatibility
prompts, choose local system's version e.g. 95, 98, NT, XP, Win7, ...
>> Properties >> Security >> ... names >>
Advanced >> Advanced Security
Settings for noCOOKIE >> Edit... >> Add... >>
object
>> Check names >> OK; You have just managed group
or user,
by using "name" parameter configuration within your domain system ... ;
BIOS;
Building Security
In Maturity Model (
B S I M M), also see: http://bsimm.com;
BSIMM6;
cable lock slot; CA; CAPTCHA, Completely Automated Public Turing test to tell Computers and Humans Apart;
using artificial intelligence 26 secure captchas ... , for GET/POST requests ... ;
CD;
CERT
USA;
Certificates, also
see: this DOMAIN 's
certificate;
cipher
(PIN,
Personal Identification Number); CIPHERUNICORN-A, NEC's AES DES,interface;
Cisco specific; Computrace, theft
protection agent in BIOS, by Panasonic Tough Book; C0PPA, Ch1ldren 0nl1ne Pr1vacy
and Pr0tect10n Act
USA;
CFS
It supports local and remote;
Core Dump Size limitation;
Cisco specific: 2006 line security ohm · meter products are Clean Access, ACS, ASA, CSA, IPS, Pix, and etc.; 2006 wireless security dB · meter products are Controller specific, IOS AP, Light Weight AP, UCS, and etc.
using artificial intelligence 26 secure Confine untrusted content i.e. <iframe> ... ;
using artificial intelligence 26 secure Cross-site request forgery (i.e. CSRF) ... ;
using artificial intelligence 26 secure Cross-site scripting (i.e. XSS) ... ;
using artificial intelligence 26 secure Cryptographic server identity (i.e. locked SOP) ... ;
using artificial intelligence 26 secure cryptographic tokens ... , for GET/POST requests ... ;
AI
verify
computers
e.g.
info
code (63626066673658558569584)
i.e.
ASEAN
cyber
security; Also see:
Satellite DNS System;
By
WORMHOLE
(
for
each
surface
95
285
Internet)
... ;
AI
verify
computers
... ;
DACL One of the Control Lists; DDP; DES; DHCP; Difficulty levels: The most difficult system security level is Pin level security > System Menu level security is less difficult than Pin level security > System DB Key level security is less difficult than System Menu level security > Script level security is easiest and commonly available; DNS H0st names ≠ 1P addresses; (DNS server query limitation (Controlling recursive query) ); (DNSSEC (KEY record (A/C) (NAMTYP) (SIG) (XT)) (...) ); D0S, Den1al-0f-Serv1ce, Unit = SYN/s; DSA;
using artificial intelligence 26 secure Dynamic (DNS) ... ; Dynamic Frequency Selection;
EFS; (Encrypt10n (Bl0ck C1pher 1.e. DES's 64b1t bl0ck w1th 56b1t key;) (Stream C1pher) (...)); EIGRP; EKU and EKU OID; Environmental variables Also see: share characters;
using artificial intelligence 26 secure Escudo Web protection (e.g. ACLs, CSRF, XSS) ... ;
using artificial intelligence 26 secure 285 eval() function (i.e. JSON) ... ; Avoid;
FCC; FCS Ethernet; Filtering port number; Firewall/VPN [Develop the unit's characteristics], Firewall coexistence DNS server; FTP;
Firewall specific services oriented security rules:
[Remark: 1st to understand Internet vs. Proxy Server Settings, otherwise following contents may not be understandable; For Internet/Intranet security, also see: IANA 2007 standard Keyword to Port Number]
If ICMP type =
source
quench, and then
;
If ICMP type = echo request
interface
= Ext, and then
;
If ICMP type = echo reply
interface
= Ext, and then
;
If ICMP type = destination
unreachable
interface
= Ext, and then
;
If ICMP type = service
unavailable
interface
= Ext, and then
;
If ICMP type = TTL exceeded
interface
= Ext, and then
;
If ICMP type = parameter
problem
interface
= Ext, and then
;
If ICMP type = echo request
interface
= Int, and then
;
If ICMP type = redirect
interface
= Ext, and then
;
If ICMP type = echo reply
interface
= Int, and then
;
If ICMP type = destination
unreachable
interface
= Ext, and then
;
If ICMP type = service
unavailable
interface
= Ext, and then
;
If ICMP type = TTL exceeded
interface
= Ext, and then
;
If ICMP type = *
interface
= *
interface
= *, and then
;
If ICMP type = *
OP =
source route, and then
;
If ICMP type = *
interface
= Ext
source IP = internal, and then
;
If ICMP type = *
interface
= Int
destination IP = internal, and then
;
If ICMP type = *
interface
= Ext
destination IP = protected servers, and then
;
If ICMP type = *
interface
= Ext
destination port = RIP, and then
;
If ICMP type = *
interface
= Ext
destination port = OSPF, and then
;
If ICMP type = *
interface
= *
interface
= *
destination port = 0 ~ 20
Type =
UDP, and then
;
If ICMP type = *
interface
= *
interface
= *
destination port = 6000
Type =
UDP, and then
;
If ICMP type = *
interface
= *
interface
= *
destination port = 6001
Type =
UDP, and then
;
If ICMP type = *
interface
= *
interface
= *
destination port = 6002
Type =
UDP, and then
;
If ICMP type = *
interface
= *
interface
= *
destination port = 6003
Type =
UDP, and then
;
If ICMP type = *
interface
= *
interface
= *
destination port = 161
Type =
UDP, and then
;
If ICMP type = *
interface
= *
interface
= *
destination port = 162
Type =
UDP, and then
;
If ICMP type = *
interface
= *
interface
= *
destination port = 0 ~ 20
Type =
TCP, and then
;
If ICMP type = *
interface
= *
interface
= *
destination port = 6000
Type =
TCP, and then
;
If ICMP type = *
interface
= *
interface
= *
destination port = 6001
Type =
TCP, and then
;
If ICMP type = *
interface
= *
interface
= *
destination port = 6002
Type =
TCP, and then
;
If ICMP type = *
interface
= *
interface
= *
destination port = 6003
Type =
TCP, and then
;
If ICMP type = *
interface
= *
interface
= *
destination port = 161
Type =
TCP, and then
;
If ICMP type = *
interface
= *
interface
= *
destination port = 162
Type =
TCP, and then
;
If ICMP type = *
interface
= Ext
interface
= *
destination port = 23
Type =
TCP, and then
;
If ICMP type = *
interface
= Ext
interface
= *
destination port = 8080
Type =
TCP, and then
;
If ICMP type = *
interface
= Ext
interface
= *
destination port > 1023
ACK = C
Type =
TCP, and then
;
If ICMP type = *
interface
= Ext
interface
= *
destination port = 20
ACK = C
Type =
TCP, and then
;
If ICMP type = *
interface
= Ext
interface
= *
destination port = 21
ACK = C
Type =
TCP, and then
;
If ICMP type = *
interface
= Ext
interface
= *
destination port = 25
(destination IP ≠ SMTP server)
Type =
TCP, and then
;
If ICMP type = *
interface
= Ext
interface
= *
destination port = 80
(destination IP ≠ Web server)
Type =
TCP, and then
;
If ICMP type = *
interface
= Ext
interface
= *
source port = 80
destination port > 1023
ACK = S
Type =
TCP, and then
;
If ICMP type = *
interface
= Int
interface
= *
source port > 1023
destination port = 80
Type =
TCP, and then
;
If ICMP type = *
interface
= *
interface
= *
source IP = NNTP server
destination IP NNTP server
Type =
TCP, and then
;
If ICMP type = *
interface
= *
interface
= *
source IP = NNTP server
destination port = 119
Type =
TCP, and then
;
If ICMP type = *
interface
= *
interface
= *
source IP SMTP server
destination port = 25
Type =
TCP, and then
;
for
each
time
zone,
for
each
location,
home
security by
humanoids,
also see: Nama
For Humanoid,
HOW to punish
(e.g.
)
unauthorized
trespass
person;
using artificial intelligence 26 secure HTML validation ... ;
using artificial intelligence 26 secure 285 Http Only cookie attribute (i.e. grant access 26 cookies from 15 HTTP request) ... ;
HOW to
determine (foe
or not), also see: enemy; foe; opponent;
Radical745;
_ IFF
virus, EXE
Anti Virus;
system
()
security
system ... ;
IKE; 1MAP; 1SP; 1P; (1P Address Ass1gnment (Manual) (Aut0 b00tp) (Dynam1c b00tp DHCP)); ipchains Controlling access; 1PC1S; 1PSec; 1RC; IRF; IRM; is 1 new cloud - based security control layer 669 browsers; ISMS, INFORMATION SECURITY MANAGEMENT SYSTEM, 1S0; 1V;
using artificial intelligence 26 secure JSONP script tag injection ... ;
(KDC (TGT)) MIT's Kerberos authentication; Kernel configuration; Keyword to Port Number;
L2TP;
lmhosts security initialization;
local;
LSA;
LSP;
LU1D;
MAC; mask; M1B; M1ME; (M0dulat10n (AM) (FM) (PCM) (...) Als0 see: S/N 1n UN1T);
using artificial intelligence 26 secure Mozilla Content Security Policy (i.e. CSP) ... ;
(named running (CHROOT jail) (without ROOT privilege))
DNS server;
NAT;
NBP;
NCP;
NetB10S; NetWare
system usages;
NFS; (N1ST
(SHA N0t
ava1lable 1n publ1c) (SHA-1)
(SHA-*) (...) );
NNTP;
NOS;
NSA;
numerological dimension a.k.a.
aka.INF;
Note for security novice: Automata theory is
recommended to read because relation between handshakes and
communication between computer machines
sometimes are abstract to common people; Once abstract
can be overviewed, twist-and-turn in cryptanalysis and cryptography becomes a
little easier ... ;
optional finger printer reader; 0SPF; OU;
password security; Peculiar mind reminder: O01I, IOl0
i o L zero, *$,
" '', ... ;
P2P;
P0P;
PPDD; (PPTP
(PPP) (...) );
Public Key Token,
matrix of base16 hexadecimal and 16 characters where: If Time AND Possible value
matches And Then Assembly Cache = TRUE;
Quantum cryptography (Stable key generation (Q B E R)); (QoS (Application Q o S OSI application level priority) (Port QoS Specific port enable OR disable; ingress OR egress) (Voice Q o S) (...));
RAD1US; Recommended website: www.ccc.go.jp;
*$ is wildcard * AND share character $ i.e. $HOME, $PATH, ADMIN$, C$, D$, F$, S$, IPC$, PRINT$, SYSVOL$, ... , also see: variable; [SEC];
SACL One of the Control Lists; SAM; Samba Server;
using artificial intelligence 26 secure Scanning tools and services (e.g. SQL or DO MX SS) ... ;
SCCML; s Flow traffic
Monitor by Foundry Network;
S1D;
SK1P;
SLIMIT-C
wireless e-mail filter;
SMB
C2MYAZZ, LANMAN authent1cat10n;
SMTP
ASC11 text 0nly;
SNMP
SNMP agent and
1ts management: Als0 see:
M1B; Split
namespace Public
OR private;
Spread spectrum;
SPX;
SSH;
SSL
SSL3 1s TLS pr0t0c0l;
ssl ciphers
;
SYN; syslog utility
syslog.conf
file in
Linux; Systems security links: Also see:
File Systems;
System time stamp;
swatch
Perl
script;
verify connection's integrity:
- security certificate, using a strong signature;
- security certificate (name of the page you are trying to view);
- security certificate is from a trusted certifying authority;
- security certificate has a valid name matching;
- security certificate has expired;
- security certificate is not yet valid;
TCP;
TCP Wrapper Samba
Linux; inetd; xinetd; TCP/IP; TCP/IP
protocol stack embedded IC chips; T D S,
encryption
System certificates;
TLS;
TPM security ship v♯
; TTL;
UDP; umask configuration; updates is Edit | Preferences... | Startup. 333+ of Preferences... exist, i.e. temp is one of the Preferences...'s options; UPS; URL;
using artificial intelligence 26 secure un-trusted data (e.g. post input, query strings, URLs) ... ;
USA (United States of America) National
Security (e.g. NOT
to happen 2+ hours of overwriting & resetting GPS of automotives)
... ;
USA's National
Security,
protected by
Rakhine American
Ace Jaw,
e.g.
IFF (hack,
hacked,
hacker,
hacking)
is defined
by
cyber , remotely burning
the defined
(hack,
hacked,
hacker,
hacking)
computer's
motherboard physically (using
military grade multi long length
WORMHOLE way laser)
... ; power of the Internet must be peaceful & tranquil;
using insectoids report to animaloids report to humanoids to mark ... ;
USA (United States of America) National
Security (e.g. NOT
to happen
2+ hours of overwriting & resetting GPS of automotives)
... ;
W E P (64 bit) (128 bit); wh01s rs.1ntern1c.net; W1reless T0p0l0gy; WMPInfo.xml;
''Y0u kn0w" ''when" ''y0u kn0w what y0u d0 n0t kn0w ... ; A1s0 see: Instruction Segment; Netw0rk Des1gn Pr1nc1ples; Pr0t0c0l and P0rt; Scripts;
Zone transfer restriction DNS server;
...
舰㠂आ蘪虈܁ꀂʂ〩ʂȥā1ରआ蘪虈܁ꀁʂ」 ʂ〉 Ƃꁶȃ ȁဂꛑё栻꼍Ꝍ軐퓱ꅹरԆหȃԝㄘ〖ؔ唃ഓ摁業楮瑳慲潴ひᜠ」〹ㄲ㐷〱娲༘ㄲ㤰㜱㜱ㄴ㈰ずㄘ〖ؔ唃̄ഓ摁業楮瑳慲潴ひ龁ര आ蘪虈āԁ̀趁要脂沥ꀟ☟贊囇囬乿넵髇쯶㨃麙蛸蔜솙踠㰳㾡⊦潎쯮O밍ギ怆啸푍黟䔂揀䋉織녙ꦂ䨘氶��띍謄ᅍ埭ꅭ擺혛��臨缸᠏��偏熂ഥ䂮♯紏ࡷ袝ᔢⓄ姠攜֣̂ꌁずじؕ唃┝คర ਆ ث Ё舁Ѓ㐰ᵕБꀫة⬊Ć Ą㞂Ȕꀃఛ䄙浤湩獩牴瑡牯啀䅓奍乁䅍R र̆ᵕ Г。 ̎ᴂ 脃ꊉ煌듼ﺎ⟲捦胎ᶧ쀘䵯䪠ꮱ㵸㑠钨㖃須춹ꄆꥉ諓㽑䀰˅ꜭ貕賄㔲㿄旐츧䠔ɟ큻์癸뽣娜릫惧뼤宬桦㷒ʐ㮉섮祑ȝ㬢椖娘ᖅϩ왱㉷Ȣ1
![]() |