-
1 intercepted conversation
Безопасность: перехваченный разговорУниверсальный англо-русский словарь > intercepted conversation
-
2 intercepted conversation
Англо-русский словарь по компьютерной безопасности > intercepted conversation
-
3 conversation
разговор; переговоры; диалогАнгло-русский словарь по компьютерной безопасности > conversation
-
4 cut off
1. phr v обрезать, отрезать, отрубать, отсекатьto cut down — отрезать, нарезать на части
2. phr v отрезать; изолироватьtowns cut off by floods — города, отрезанные от остального мира наводнением
to cut off — отрезать, обрезать
3. phr v срезатьto cut off a corner — срезать угол, пойти напрямик
4. phr v перерезать, разъединять, прерыватьthe telephone operator cut us off before we had finished our conversation — телефонист разъединил нас прежде, чем мы успели закончить разговор
cut in — вмешиваться; прерывать
cut short — прерывать; прервать
5. phr v выключать6. phr v отключить7. phr v прекращать, кончать; прерывать8. phr v оборвать, привести к концу9. phr v лишать наследстваСинонимический ряд:1. cut (verb) axe; chop; cut; fell; hack; hew; rend; saw; whack2. disinherit (verb) disinherit3. disinherited (verb) disinherited4. intercept (verb) block; catch; intercept5. intercepted (verb) blocked; caught; intercepted6. isolate (verb) close off; enisle; insulate; island; isolate; segregate; separate; sequester7. isolated (verb) closed off; insulated; isolated; segregated; separated; sequestered8. kill (verb) carry off; destroy; dispatch; down; finish; kill; lay low; scrag; slay; take off9. killed (verb) carried off; destroyed; dispatched; downed; finished; killed; laid low; put away; slew/slain; took off/taken off
См. также в других словарях:
Marian Rejewski — (probably 1932, the year he first solved the Enigma machine). Courtesy of Janina Sylwestrzak, Rejewski s daughter. Born Marian Adam Rejewski August 16, 1905(1905 0 … Wikipedia
Secure communication — includes means by which people can share information with varying degrees of certainty that third parties cannot know what was said. Other than communication spoken face to face out of possibility of listening, it is probably safe to say that no… … Wikipedia
Signals intelligence — SIGINT redirects here. For the UNIX signal, see SIGINT (POSIX). RAF Menwith Hill, a large site in the United Kingdom, part of ECHELON and the UK USA Security Agreement. Signals intelligence (often contracted to SIGINT) is intelligence gathering… … Wikipedia
Intelligence in the American Revolutionary War — Intelligences in the American Revolutionary War was essentially monitored and sanctioned by the Continental Congress to provide military intelligence to the Continental Army to aid them in fighting the British during the American Revolutionary… … Wikipedia
2007 Texas Longhorn football team — NCAATeamFootballSeason Year=2007 Team=Texas Longhorn ImageSize=130 Conference=Big 12 Conference Division=South ShortConference=Big 12 CoachRank= 10 APRank= 10 BCSRank= Record=10–3 ConfRecord=5–3 HeadCoach=Mack Brown OffCoach= Greg Davis DefCoach … Wikipedia
Hiroshi Ōshima — General Hiroshi Ōshima Born April 19, 1886 … Wikipedia
List of Terminator: The Sarah Connor Chronicles minor characters — The following is a list of characters in the FOX science fiction television series Terminator: The Sarah Connor Chronicles, including supporting characters, and important villains. Contents: Top · 0–9 A B C D E F G H I J K L M N O P Q R S T… … Wikipedia
Rivalries in the National Football League — As with all sports leagues, there are a number of significant rivalries in the National Football League (NFL). Rivalries are occasionally created due to a particular event that causes bad blood between teams, players, coaches, or owners, but for… … Wikipedia
NSA warrantless surveillance controversy — For the related controversy about data mining of domestic call records see NSA call database. National Security Agency logo The NSA warrantless surveillance controversy (AKA Warrantless Wiretapping ) concerns surveillance of persons within the… … Wikipedia
Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent … Wikipedia
Operation Badr (1973) — Part of the Yom Kippur War/October War … Wikipedia