Lines Matching refs:information

29     authentication, and no passwords or other information is
35 secure channel. Fake Xauthority information is automatically
39 remote machine the real information).
130 Any information that you type or is printed on your screen can be
143 pricing information, subcontractor information, client data, personnel
144 data, financial information, etc. Currently, anyone with access to
148 Many companies are not aware that information can so easily be
150 since nobody is supposed to know that there is sensitive information
154 Individual persons also have confidential information, such as
155 diaries, love letters, health care documents, information about their
171 identify, classify, and file information about millions of people over
173 collecting this information is getting very low.
177 collect huge amounts of information about all people with any
178 significant position in the society. Most of this information is not
180 getting that information. However, the information starts to get
189 totalitarian state. With enough information (the automatically
193 lovers, weaknesses, etc. This information can be used to 1) locate
199 persons distributing information contrary to the official truth.
208 contra-offical information and unable to overturn the government if it
335 information for the server. It then creates random authorization
346 as the display. No authentication information is forwarded in this
495 licensing, and distribution information.
506 Note that any information and cryptographic algorithms used in this
511 COPYING for more information.
521 archive of the mailing list, and detailed information about new
531 information, see http://www.cs.hut.fi/~ylo/. My PGP public key is