-
1 скаарж
General subject: The character from a computer game on Universe Unreal, the malicious user from the Ukrainian forum. (The character from a computer game on Universe Unreal, the malicious user from the Ukrainian forum.) -
2 взломщик
1) General subject: breaker, burglar, cracksman, housebreaker, picklock, lock picker2) Computers: cracker3) American: yegg4) Law: crack-burglar, effractor, house-breaker6) Information technology: computer trespasser, hacker7) Programming: attacker (лицо, организовавшее атаку на защищённую компьютерную систему или пытающееся её взломать)8) Security: malevolent user, malicious user -
3 злонамеренный пользователь
Security: malevolent user, malicious userУниверсальный русско-английский словарь > злонамеренный пользователь
-
4 пользователь со злоумышленными намерениями
Security: malevolent user, malicious userУниверсальный русско-английский словарь > пользователь со злоумышленными намерениями
-
5 пользователь-злоумышленник
1) Security: fraudulent user2) Microsoft: malicious userУниверсальный русско-английский словарь > пользователь-злоумышленник
См. также в других словарях:
User-mode Linux — (UML) allows multiple virtual Linux systems (known as guests) to run as an application within a normal Linux system (known as the host). As each guest is just a normal application running as a process in user space, this approach provides the… … Wikipedia
Malicious Caller Identification — (MCI), also called Malicious Call Trace (MCT) or Caller Activated Malicious Call Trace (CAMCT) is a facility which enables a phone call recipient to mark a phone call as malicious (i.e. harassing, threatening, obscene, etc.) The phone system will … Wikipedia
user — noun ADJECTIVE ▪ avid (esp. AmE), heavy, large ▪ heavy users of credit ▪ The larger users of the service have to pay more. ▪ small … Collocations dictionary
malicious — adj. VERBS ▪ be ADVERB ▪ rather ▪ He gave a rather malicious smile at her furious expression. Malicious is used with these nouns: ↑allegation, ↑code, ↑ … Collocations dictionary
malicious-logic software — n. malware, software that acts on computer files without the knowledge of the user, general name for computer viruses … English contemporary dictionary
reasonable user — The use of property by a co owner which is not capricious, irresponsible, or malicious, but in one of the ordinary methods of reaping profits from property of like character and in like circumstances. 20 Am J2d Coten § 37. Where two persons own a … Ballentine's law dictionary
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
Data security — is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. Data security is part of the larger practice of… … Wikipedia
Buffer overflow — In computer security and programming, a buffer overflow, or buffer overrun, is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer. The result is that the extra data overwrites adjacent… … Wikipedia
Secure by design — Secure by design, in software engineering, means that the software has been designed from the ground up to be secure. Malicious practices are taken for granted and care is taken to minimize impact when a security vulnerability is discovered. For… … Wikipedia
Format string attack — Format string attacks are a class of software vulnerability discovered around 1999. Previously thought harmless, Format string attacks can be used to crash a program or to execute harmful code. The problem stems from the use of unfiltered user… … Wikipedia