-
21 MCDES
Военный термин: malicious code detection and eradication system -
22 система обнаружения и уничтожения компьютерных вирусов
Универсальный русско-английский словарь > система обнаружения и уничтожения компьютерных вирусов
-
23 access
1) доступ (в систему обработки информации или в сеть связи)2) доступ (на защищенную территорию); способ доступа -
24 infector
компьютерный вирус; программа, поражающая другие программы (virus); (компьютерный) вирус; вирусная программа, программа-вирусоносительАнгло-русский словарь по компьютерной безопасности > infector
-
25 user
-
26 virus
(компьютерный) вирус; вирусная программа, программа-вирусоноситель -
27 MCDES
MCDES, malicious code detection and eradication systemEnglish-Russian dictionary of planing, cross-planing and slotting machines > MCDES
-
28 worm
"Self-propagating malicious code that can automatically distribute itself from one computer to another through network connections. A worm can take harmful action, such as consuming network or local system resources, possibly causing a denial of service attack." -
29 elevation of privilege
"The process by which a user obtains a higher level of privilege than that for which he has been authorized. A malicious user may use elevation of privilege as a means to compromise or destroy a system, or to access unauthorized information." -
30 Data Execution Prevention
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
31 DEP
"A security feature that monitors programs on a computer to determine if they use system memory safely. To do this, DEP software works alone or with compatible microprocessors to mark some memory locations as ""non-executable."" If a program tries to run code that is malicious or is not from a protected location, DEP closes the program and notifies you." -
32 elevation
"The process by which a user obtains a higher level of privilege than that for which he has been authorized. A malicious user may use elevation of privilege as a means to compromise or destroy a system, or to access unauthorized information."
- 1
- 2
См. также в других словарях:
Malicious Caller Identification — (MCI), also called Malicious Call Trace (MCT) or Caller Activated Malicious Call Trace (CAMCT) is a facility which enables a phone call recipient to mark a phone call as malicious (i.e. harassing, threatening, obscene, etc.) The phone system will … Wikipedia
System Center Data Protection Manager — Developer(s) Microsoft Corporation Stable release DPM 2010 / April 19, 2010; 18 months ago (2010 04 19) Development status Active … Wikipedia
System Rush — is a futuristic racing game for the Nokia N Gage platform. It was released in 2005 and available Worldwide through leading retailers.Infobox VG title = System Rush developer = Ideaworks 3D publisher = Nokia released = 2005 genre = racing game… … Wikipedia
Malicious prosecution — Tort law Part of the … Wikipedia
System Restore — Infobox Software name = System Restore caption = System Restore in Windows Vista SP1 collapsible = author = developer = Microsoft released = latest release version = 6.0.6001 latest release date = February 4, 2008 latest preview version = latest… … Wikipedia
System File Checker — Infobox Software name = System File Checker caption = collapsible = author = developer = Microsoft released = latest release version = latest release date = latest preview version = latest preview date = frequently updated = programming language … Wikipedia
Windows Malicious Software Removal Tool — Malicious Software Removal Tool A screenshot of Malicious Software Removal Tool Developer(s) Mic … Wikipedia
Intrusion-prevention system — An intrusion prevention system is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real time, to block or prevent those activities. Network based IPS, for example, will… … Wikipedia
Intrusion detection system — An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.[1] Some systems may attempt to stop … Wikipedia
Intrusion prevention system — Intrusion Prevention Systems (IPS), also known as Intrusion Detection and Prevention Systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention… … Wikipedia
Interactive proof system — In computational complexity theory, an interactive proof system is an abstract machine that models computation as the exchange of messages between two parties. The parties, the verifier and the prover, interact by exchanging messages in order to… … Wikipedia