User contributions for Kbjarkefur
- 20:06, 18 May 2020 diff hist +25 Ieduplicates
- 20:05, 18 May 2020 diff hist +10 Ieduplicates
- 20:04, 18 May 2020 diff hist −128 Ieduplicates
- 19:54, 18 May 2020 diff hist +1 Ietestform →Leading and trailing spaces
- 19:51, 18 May 2020 diff hist +65 Ietestform →Stata-specific labels
- 16:52, 18 May 2020 diff hist +138 Ietestform →Matching begin_ and end_
- 16:04, 18 May 2020 diff hist +3 Ietestform →Non-note fields: required
- 16:01, 18 May 2020 diff hist +444 Ietestform →Required Columns
- 15:27, 18 May 2020 diff hist +1 Ietestform →Syntax
- 15:26, 18 May 2020 diff hist +31 Ietestform →Overview
- 15:25, 18 May 2020 diff hist +32 Ietestform
- 14:17, 18 May 2020 diff hist +2 Iefieldkit →Before Data Collection
- 14:17, 18 May 2020 diff hist +47 Iefieldkit →Before Data Collection
- 23:53, 26 April 2020 diff hist +318 Ietestform
- 14:39, 14 February 2020 diff hist −292 Encryption
- 16:51, 11 February 2020 diff hist 0 Encryption →Read First
- 22:19, 10 February 2020 diff hist −15 Microdata Catalog
- 21:44, 10 February 2020 diff hist 0 Encryption →Read First
- 21:43, 10 February 2020 diff hist −1 Encryption →Three types of Encryption
- 17:38, 7 February 2020 diff hist −1 Encryption →Asymmetric Encryption
- 21:01, 27 January 2020 diff hist +31 Encryption
- 20:04, 27 January 2020 diff hist −2 Encryption →Password and Key Management
- 20:04, 27 January 2020 diff hist +4 Encryption →Encryption with SurveyCTO Data
- 20:03, 27 January 2020 diff hist +1 Encryption →Encryption decryption keys =
- 20:03, 27 January 2020 diff hist +170 Encryption →Other software recommendations
- 19:59, 27 January 2020 diff hist +40 Encryption →Public/Private Key Pair
- 19:56, 27 January 2020 diff hist −2 Encryption →Encryption in Transit
- 19:54, 27 January 2020 diff hist +1 Encryption →Encryption in Transit and at Rest
- 19:54, 27 January 2020 diff hist +1,966 Encryption →Encryption in Transit and at Rest
- 19:25, 27 January 2020 diff hist −1,440 Encryption →Use case - secure communication online - http vs https
- 19:23, 27 January 2020 diff hist +1 Encryption →Example of use-case of one-way hashing
- 19:23, 27 January 2020 diff hist +832 Encryption →One-way hashing
- 19:01, 27 January 2020 diff hist +510 Encryption →Asymmetric Encryption
- 18:48, 27 January 2020 diff hist +38 Encryption
- 18:47, 27 January 2020 diff hist +147 Encryption →Symmetric Encryption
- 18:28, 27 January 2020 diff hist +305 Encryption →Symmetric Encryption
- 18:21, 27 January 2020 diff hist +1 Encryption →Symmetric Encryption
- 18:21, 27 January 2020 diff hist +1 Encryption →Use case - secure files to be shared - VeraCrypt
- 18:20, 27 January 2020 diff hist +181 Encryption →Symmetric Encryption
- 18:07, 27 January 2020 diff hist −1 Encryption →Three types of Encryption
- 18:06, 27 January 2020 diff hist −2 Encryption →Three types of Encryption
- 17:26, 27 January 2020 diff hist +1 Encryption →Read First
- 17:26, 27 January 2020 diff hist +166 Encryption
- 17:18, 27 January 2020 diff hist +34 Encryption →Read First
- 17:17, 27 January 2020 diff hist +76 Encryption →Read First
- 17:16, 27 January 2020 diff hist −2 Encryption →Use case - secure files to be shared - VeraCrypt
- 17:16, 27 January 2020 diff hist +2 Encryption →Symmetric Encryption
- 17:15, 27 January 2020 diff hist −1 Encryption →Three types of Encryption
- 17:15, 27 January 2020 diff hist −67 Encryption →Is open source software like VeraCrypt less secure as everyone can see how it is implemented?
- 17:14, 27 January 2020 diff hist −3 Encryption →Three types of Encryption