-
1 защита с помощью электронного ключа
защита с помощью электронного ключа
—
[Л.Г.Суменко. Англо-русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > защита с помощью электронного ключа
-
2 электронный ключ защиты ПО от пиратства
электронный ключ защиты ПО от пиратства
Аппаратно-программный ключ-заглушка, устанавливаемый на один из портов ПК для защиты ПО от несанкционированного доступа, копирования или для ограниченного использования.
[ http://www.morepc.ru/dict/]Тематики
EN
Русско-английский словарь нормативно-технической терминологии > электронный ключ защиты ПО от пиратства
-
3 защита с помощью электронного ключа
1) Computers: hardware key protection2) Programming: (программ) hardware key protectionУниверсальный русско-английский словарь > защита с помощью электронного ключа
-
4 защита (программ) с помощью электронного ключа
Programming: hardware key protectionУниверсальный русско-английский словарь > защита (программ) с помощью электронного ключа
См. также в других словарях:
Hardware Security Module — A Hardware Security Module (often abbreviated to HSM) is a physical device in form of a plug in card or an external security device that can be attached to general purpose computer and servers.The goals of an HSM are the: (a) secure generation,… … Wikipedia
Key size — In cryptography, key size or key length is the size measured in bits[1] of the key used in a cryptographic algorithm (such as a cipher). An algorithm s key length is distinct from its cryptographic security, which is a logarithmic measure of the… … Wikipedia
Software protection dongle — This article is about the software protection devices. Dongle can also refer to, e.g., serial ports, USB flash drives, wireless networking devices, USB Mobile broadband modems. Daisy chained parallel port copy protection dongles. A software… … Wikipedia
Copy protection — Copy protection, also known as content protection, copy obstruction, copy prevention and copy restriction, refer to techniques used for preventing the reproduction of software, films, music, and other media, usually for copyright reasons.[1]… … Wikipedia
Memory protection — is a way to control memory access rights on a computer, and is a part of most modern operating systems. The main purpose of memory protection is to prevent a process from accessing memory that has not been allocated to it. This prevents a bug… … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Iran Software & Hardware Co. (NOSA) — NOSA redirects here. For other uses, see NOSA (disambiguation). Iran Software Hardware Company Type Joint Stock Industry Information Technology Computer software RFID … Wikipedia
Nintendo Entertainment System hardware clone — An example of a clone system: The PolyStation, designed to resemble a PSOne. Owing to the popularity and longevity of the Nintendo Entertainment System (NES; known in Japan as the Family Computer, or Famicom), the system has become one of the… … Wikipedia
Public key infrastructure — In cryptography, a public key infrastructure (PKI) is an arrangement that binds public keys with respective user identities by means of a certificate authority (CA). The user identity must be unique for each CA. The binding is established through … Wikipedia
Video Content Protection System — The Video Content Protection System (VCPS) is a standard for digital rights management, intended to enforce protection or DVD+R/+RW content and related media.It was designed to protect video recordings broadcast terrestrially with the broadcast… … Wikipedia
Extended Copy Protection — XCP redirects here. For other uses, see XCP (disambiguation). Extended Copy Protection (XCP) is a software package developed by the British company First 4 Internet, (which on 20 November 2006, changed its name to Fortium Technologies Ltd see… … Wikipedia