-
1 time-dependent password
Безопасность: пароль, действующий в течение ограниченного времениУниверсальный англо-русский словарь > time-dependent password
-
2 time-dependent password
пароль, действующий в течение ограниченного времениАнгло-русский словарь по компьютерной безопасности > time-dependent password
-
3 password
пароль; персональная информация аутентификацииАнгло-русский словарь по компьютерной безопасности > password
-
4 algorithm
алгоритм (cryptoalgorithm) криптографический алгоритм, криптоалгоритм; алгоритм шифрования (криптографического закрытия)- private cryptographic algorithmАнгло-русский словарь по компьютерной безопасности > algorithm
-
5 key
1) (криптографический) ключ2) ключ к замку или запирающему устройству, механический ключ- base key- candidate key- card key- code key- data key- DES key- fake key- file key- good key- hex key- host key- link key- lost key- node key- numeric key- numerical key- pass key- PRN key- safe key- seed key- test key- true key- used key- user key- weak key- work key- zone key -
6 protection
защита; средства защитыАнгло-русский словарь по компьютерной безопасности > protection
См. также в других словарях:
Operating system — Operating systems … Wikipedia
Technical features new to Windows Vista — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features … Wikipedia
Port knocking — In networking, port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports. Once a correct sequence of connection attempts is received, the firewall rules are… … Wikipedia
Windows Vista networking technologies — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features … Wikipedia
Keystroke logging — (often called keylogging) is a method of capturing and recording user keystrokes. The technique and name came from before the era of the graphical user interface; loggers nowadays would expect to capture mouse operations too. Keylogging can be… … Wikipedia
Mobile banking — Part of a series on Electronic commerce Online goods and services Streaming media Electronic books Softw … Wikipedia
Timing attack — In cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. The attack exploits the fact that every operation in a computer … Wikipedia
Fort Boyard (TV series) — Fort Boyard is a French game show created by Jacques Antoine, that was first broadcast in 1990 (as Les Clés de Fort Boyard , shortened for the second series in 1991) and is popular to this day. It has been remade across the globe, most… … Wikipedia
biblical literature — Introduction four bodies of written works: the Old Testament writings according to the Hebrew canon; intertestamental works, including the Old Testament Apocrypha; the New Testament writings; and the New Testament Apocrypha. The Old… … Universalium
Mega Man 2 — This article is about the Nintendo Entertainment System and the Famicom game. For the Game Boy game, see Mega Man II (Game Boy). Mega Man 2 … Wikipedia
Unix security — Unix security: maintaining a secure environment on Unix and Unix like operating systems is dependent on design concepts of these operating systems, but vigilance through user and administrative techniques is important to maintain security… … Wikipedia