MyFinder is a unique search engine with a simple privacy concept in mind. We log your searches but none of the data, it's that simple.
Separation of concernsRole-based access controlSandboxCapability-based securityAddress space layout randomizationPrinciple of least privilegeAuthorizationLogical access controlSecurity engineeringSecure codingMemory protectionSeparation logicComputer access controlAccess-control listMutual exclusionFunctional programmingComputer security softwareApplication virtualizationMemory segmentationApparmorPrivatizationPassword policyTask parallelismDependency inversion principleInter-process communicationAspect-oriented programmingTake-grant protection modelControl flow analysisParallel programming modelInformation securityDiscretionary access controlBrowser securityDigital securitySystems programmingStrategy patternPackage principlesMandatory access controlSame-origin policyShadow stackIp address managementComputer network programmingMultiple granularity lockingComputer programmingComputer architectureDesign by contractResource managementApplication frameworkPartial evaluationPolicy-based routingSoftware architectureDomain-specific modelingControl-flow integrityFirewallResponsibility-driven designEndpoint securityLoginEncryption softwareModular programmingSynchronizationLinux security modulesShatter attackOutline of computer scienceHigh-level programming languageSecurity-enhanced linuxRegister renamingLaw of demeterCode refactoringFormal specificationSoftware frameworkInformation hidingProcedural programmingSingle program, multiple dataExecutionDesktop virtualizationPriority inheritanceProgramming language theorySingle-responsibility principleProtected modeSoftware systemUser space and kernel spaceStructured concurrencyNetwork access controlHistory of softwareSoftware system safetyExecutable space protectionProgram optimizationMultitier architectureAccess control matrixPassword crackingInformation rights managementIpsecAbstraction layerShadow memoryTrust boundaryProgram synthesisSoftware versioningModule patternTest doubleOperating environmentComputational trust