-
-
### Environment info
- Version: 1.11
- Deployment: NA
- Customer: NA
### Actual behavior
1. Today on ACL tampering we change the status in the agent_cli affecting all the nodes (drives)
### …
-
Normally, during the program execution, special characters like '@' are not allowed as part of the patient's ID as seen below.
![image.png](https://raw.githubusercontent.com/nus-cs2113-AY2223S1/pe/ma…
-
hey!
when trying to run this command:
`.\NoFuserEx.exe "AE.Net.Mail.dll" --dont-constants --dont-cflow --dont-proxy-calls --dont-remove-junk-methods --dont-resources --dont-rename`
I get the fo…
-
this is relatively high priority, but will require some aggressive refactoring to do performently.
-
## Link to rule
https://www.elastic.co/guide/en/security/current/tampering-of-shell-command-line-history.html
## Description
We should update the docs for the rules that reference the word co…
-
**iOS:**
**Description:**
I think Apple's DeviceCheck API can be used to mitigate app tampering. I can imagine there are use cases where you want to prevent against copy-cat or otherwise re-signed…
-
The possibility exists for tampering to occur in the time elapsed between an object's publication, and the Bitcoin transaction in which that published version's hash is embedded, is confirmed.
A user…
-
As per communication from SBI there is a need to Reverify the payment. Requirement as provided by SBI:
After you have sent the ‘transaction request’ and received the ‘browser’ response, you need to…
-
### What part of Adonis is this related to?
Other
### What are you suggesting?
## Preface
Adonis has for a long timed used setfenv and getfenv for adding variables to module factory functions but …