Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • #REDIRECT [[Theft deterrence protocol]] ...
    39 bytes (4 words) - 08:54, 16 July 2008
  • #REDIRECT [[Theft deterrence protocol]] ...
    39 bytes (4 words) - 13:53, 12 June 2008
  • ...ocol at a later date, with the benefit of some experience with the upgrade/theft deterrence system. At various points in the discussion below, we will flag ==Theft-deterrence client request== ...
    11 KB (1,781 words) - 16:13, 1 June 2012
  • There are brief discussions of the theft problem here: :[[Case design#The Theft Problem]], ...
    16 KB (2,710 words) - 20:32, 28 February 2014
  • #REDIRECT [[Theft deterrence protocol]] ...
    39 bytes (4 words) - 08:54, 16 July 2008
  • [[The Theft Problem|english]] | [[The Theft Problem/lang-ko|한국어]] ...
    71 bytes (8 words) - 19:45, 13 July 2007
  • |Name=Theft reporting ...
    1 KB (164 words) - 08:16, 9 December 2008
  • :[[Case design#The Theft Problem]], There is a serious theft problem that must be addressed if this laptop is to be made available in de ...
    12 KB (1,810 words) - 01:38, 31 January 2008

Page text matches

  • [[The Theft Problem|english]] | [[The Theft Problem/lang-ko|한국어]] ...
    71 bytes (8 words) - 19:45, 13 July 2007
  • #REDIRECT [[Theft deterrence protocol]] ...
    39 bytes (4 words) - 13:53, 12 June 2008
  • #REDIRECT [[Theft deterrence protocol]] ...
    39 bytes (4 words) - 08:55, 16 July 2008
  • #REDIRECT [[Theft deterrence protocol]] ...
    39 bytes (4 words) - 08:54, 16 July 2008
  • #REDIRECT [[Theft deterrence protocol]] ...
    39 bytes (4 words) - 08:54, 16 July 2008
  • ...ive kill" -- the latter being a way for a central server to be notified of theft, tell individual laptops that they have been stolen and stop functioning, a ...recent discussions of potential use cases for using leases at all; and for theft or recovery scenarios. A major downside of lease use is its ability to ren ...
    1 KB (187 words) - 14:05, 6 March 2008
  • ...], [[Firmware Security]], [[Pippy]], [[Olpcfs]], [[Network Principles]], [[Theft deterrence protocol]], [[Customization key]], [[Presentations/April 2008 Te ...
    625 bytes (74 words) - 17:27, 4 August 2011
  • ...me of these educational failures stem from security threats such as laptop theft, software interference, or socially malicious pranks. Therefore, we have cr ; [[Theft-deterrence protocol|Theft deterrence]] ...
    5 KB (668 words) - 10:02, 8 October 2010
  • ...} Talk:The Theft Problem] <span style="font-size:80%">([{{fullurl:Talk:The Theft Problem|action=history}} history])</span> ...
    4 KB (563 words) - 02:19, 8 December 2009
  • ...} Talk:The Theft Problem] <span style="font-size:80%">([{{fullurl:Talk:The Theft Problem|action=history}} history])</span> || [{{fullurl:TamTam:Development ...
    5 KB (608 words) - 02:19, 8 December 2009
  • #7397 Theft-deterrence Features <br> ...
    996 bytes (105 words) - 14:34, 8 July 2008
  • * Security issue that threatens anti-theft or child safety; or a known exploit that threatens a large number of laptop ...
    768 bytes (119 words) - 12:52, 2 January 2008
  • ...ocol at a later date, with the benefit of some experience with the upgrade/theft deterrence system. At various points in the discussion below, we will flag ==Theft-deterrence client request== ...
    11 KB (1,781 words) - 16:13, 1 June 2012
  • Theft is a concern in our area. How has the issue of theft been addressed in previous OLPC deployments? Is it acceptable to keep the l ...
    3 KB (493 words) - 10:26, 10 April 2009
  • |Name=Theft reporting ...
    1 KB (164 words) - 08:16, 9 December 2008
  • oatslite is a server implementation of the [[Theft deterrence protocol]]. ...
    1 KB (185 words) - 18:39, 31 January 2013
  • ..._OS_key -- per [[Firmware security#Summary|Firmware security]], guards the theft-deterrence code-path through the kernel and initramfs ...d [[User:Mstone/Commentaries/Mass olpc-update|Mass olpc-update]], verifies theft-deterrence messages. ...
    6 KB (918 words) - 16:26, 5 January 2009
  • ...Uruguay intend to disable user access to the root account as part of their theft-deterrence plan.'' ===== Theft Deterrence ===== ...
    5 KB (797 words) - 22:29, 12 July 2013
  • ...safety/92121700 Security systems services/92121703 Store or business anti theft services ...
    3 KB (296 words) - 00:53, 14 July 2007
  • ...safety/92121700 Security systems services/92121703 Store or business anti theft services ...
    3 KB (296 words) - 00:54, 14 July 2007
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)