Перевод: с английского на русский

с русского на английский

bogus address

См. также в других словарях:

  • bogus — bo‧gus [ˈbəʊgəs ǁ ˈboʊ ] adjective informal LAW not real, but dishonestly pretending to be something or someone: • They issue certificates of deposits, often based on fictitious assets such as bogus gold mines. • bogus claims of injury by their… …   Financial and business terms

  • Bounce Address Tag Validation — In computing, Bounce Address Tag Validation (BATV) is the name of a method, defined in an Internet Draft, for determining whether the bounce address specified in an E mail messageis valid. It is designed to reject backscatter, that is, bounce… …   Wikipedia

  • фиктивный адрес — — [Л.Г.Суменко. Англо русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.] Тематики информационные технологии в целом EN bogus address …   Справочник технического переводчика

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • Advance-fee fraud — African sting An advance fee fraud is a confidence trick in which the target is persuaded to advance sums of money in the hope of realizing a significantly larger gain.[1] Among the variations on this type of scam are the Nigerian Letter (also… …   Wikipedia

  • Bogon filtering — A bogon is a bogus IP address, and an informal name for an IP packet on the public Internet that claims to be from an area of the IP address space reserved, but not yet allocated or delegated by the Internet Assigned Numbers Authority (IANA) or a …   Wikipedia

  • Phishing — In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic… …   Wikipedia

  • Comparison of DNS blacklists — The following table lists technical information for a number of DNS blacklists. Blacklist operator DNS blacklist Informational URL Zone Listing goal Nomination Listing lifetime Notes ARM Research Labs, LLC GBUdb Truncate [1] truncate.gbudb.net… …   Wikipedia

  • List of confidence tricks — This list of confidence tricks and scams should not be considered complete, but covers the most common examples. Confidence tricks and scams are difficult to classify, because they change often and often contain elements of more than one type.… …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • Sender Policy Framework — TOC In computing, Sender Policy Framework (SPF) allows software to identify messages that are or are not authorized to use the domain name in the SMTP HELO and MAIL FROM (Return Path) commands, based on information published in a sender policy of …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»