-
1 password technique
метод паролей (парольной защиты)Англо-русский словарь по компьютерной безопасности > password technique
-
2 technique
Англо-русский словарь по компьютерной безопасности > technique
-
3 PRP
1) Общая лексика: hum. сокр. Precursor Rna Processing, hum. сокр. Prion Related Protein, panretinal photocoagulation, панретинальная фотокоагуляци, performance-related pay2) Компьютерная техника: Pdp Rear Panel3) Медицина: platelet rich plasma плазма, богатая тромбоцитами, плазма с высоким содержанием тромбоцитов4) Американизм: Potentially Responsible Party, Primary Responsible Person5) Спорт: Player Run Plot6) Военный термин: Portable Radio Program, Post Reinforcement Pause, Production Readiness Plan, pattern recognition technique, peak radiated power, personnel reliability program, personnel requirements program, petrol refilling point, pickup-zone release point, power-deployed reserve parachute, production requirements plan, production reserve policy, program review panel, public relations personnel7) Техника: Precision Rubber Plate, pseudo-random pulse8) Юридический термин: NAFO Performance Review Panel9) Бактериология: polyribosylribitolphosphate10) Сокращение: Performance Recovery Program (USA), Personnel Reliability Programme, Podvizhny Razvedyvatel'ny Punkt (Mobile reconnaissance post (Russia)), pulse repetition period, purple, purpose11) Университет: Policy Research Project12) Стоматология: platelet-rich plasma13) Экология: Party Responsible for Pollutants14) Энергетика: prime power15) Деловая лексика: Partner Rewards Program16) Образование: Personal Reality Programming17) Автоматика: probability ranking principle18) Контроль качества: prerequisite programs (HACCP)19) Химическое оружие: potentially responsible person20) Авиационная медицина: psychological refractory period21) Расширение файла: Model properties (Rational Rose)22) Майкрософт: password replication policy23) Должность: Pre Retirement Provision -
4 PrP
1) Общая лексика: hum. сокр. Precursor Rna Processing, hum. сокр. Prion Related Protein, panretinal photocoagulation, панретинальная фотокоагуляци, performance-related pay2) Компьютерная техника: Pdp Rear Panel3) Медицина: platelet rich plasma плазма, богатая тромбоцитами, плазма с высоким содержанием тромбоцитов4) Американизм: Potentially Responsible Party, Primary Responsible Person5) Спорт: Player Run Plot6) Военный термин: Portable Radio Program, Post Reinforcement Pause, Production Readiness Plan, pattern recognition technique, peak radiated power, personnel reliability program, personnel requirements program, petrol refilling point, pickup-zone release point, power-deployed reserve parachute, production requirements plan, production reserve policy, program review panel, public relations personnel7) Техника: Precision Rubber Plate, pseudo-random pulse8) Юридический термин: NAFO Performance Review Panel9) Бактериология: polyribosylribitolphosphate10) Сокращение: Performance Recovery Program (USA), Personnel Reliability Programme, Podvizhny Razvedyvatel'ny Punkt (Mobile reconnaissance post (Russia)), pulse repetition period, purple, purpose11) Университет: Policy Research Project12) Стоматология: platelet-rich plasma13) Экология: Party Responsible for Pollutants14) Энергетика: prime power15) Деловая лексика: Partner Rewards Program16) Образование: Personal Reality Programming17) Автоматика: probability ranking principle18) Контроль качества: prerequisite programs (HACCP)19) Химическое оружие: potentially responsible person20) Авиационная медицина: psychological refractory period21) Расширение файла: Model properties (Rational Rose)22) Майкрософт: password replication policy23) Должность: Pre Retirement Provision -
5 Prp
1) Общая лексика: hum. сокр. Precursor Rna Processing, hum. сокр. Prion Related Protein, panretinal photocoagulation, панретинальная фотокоагуляци, performance-related pay2) Компьютерная техника: Pdp Rear Panel3) Медицина: platelet rich plasma плазма, богатая тромбоцитами, плазма с высоким содержанием тромбоцитов4) Американизм: Potentially Responsible Party, Primary Responsible Person5) Спорт: Player Run Plot6) Военный термин: Portable Radio Program, Post Reinforcement Pause, Production Readiness Plan, pattern recognition technique, peak radiated power, personnel reliability program, personnel requirements program, petrol refilling point, pickup-zone release point, power-deployed reserve parachute, production requirements plan, production reserve policy, program review panel, public relations personnel7) Техника: Precision Rubber Plate, pseudo-random pulse8) Юридический термин: NAFO Performance Review Panel9) Бактериология: polyribosylribitolphosphate10) Сокращение: Performance Recovery Program (USA), Personnel Reliability Programme, Podvizhny Razvedyvatel'ny Punkt (Mobile reconnaissance post (Russia)), pulse repetition period, purple, purpose11) Университет: Policy Research Project12) Стоматология: platelet-rich plasma13) Экология: Party Responsible for Pollutants14) Энергетика: prime power15) Деловая лексика: Partner Rewards Program16) Образование: Personal Reality Programming17) Автоматика: probability ranking principle18) Контроль качества: prerequisite programs (HACCP)19) Химическое оружие: potentially responsible person20) Авиационная медицина: psychological refractory period21) Расширение файла: Model properties (Rational Rose)22) Майкрософт: password replication policy23) Должность: Pre Retirement Provision
См. также в других словарях:
Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… … Wikipedia
Password notification e-mail — is a common technique used by websites. If a user forgets their password then a password notification e mail is sent containing enough information for the user to access their account again. This method of password retrieval relies on the… … Wikipedia
The Password Is Courage — Mot de passe : courage Mot de passe : courage (The Password Is Courage) est un film britannique réalisé par Andrew L. Stone sorti en 1962, d après le livre de John Castle Mot de passe courage . Sommaire 1 Synopsis 2 Fiche technique 3… … Wikipédia en Français
Keystroke logging — (often called keylogging) is a method of capturing and recording user keystrokes. The technique and name came from before the era of the graphical user interface; loggers nowadays would expect to capture mouse operations too. Keylogging can be… … Wikipedia
Rainbow table — A rainbow table is a lookup table offering a time memory tradeoff used in recovering the plaintext password from a password hash generated by a hash function, often a cryptographic hash function. A common application is to make attacks against… … Wikipedia
Dictionary attack — In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by searching likely possibilities. Contents 1 Technique 2 Pre… … Wikipedia
LM hash — Lanman redirects here. For other uses, see Lanman (disambiguation). LM hash, LanMan, or LAN Manager hash was the primary hash that Microsoft LAN Manager and Microsoft Windows versions prior to Windows NT used to store user passwords. Support for… … Wikipedia
Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… … Wikipedia
Code injection — is the exploitation of a computer bug that is caused by processing invalid data. Code injection can be used by an attacker to introduce (or inject ) code into a computer program to change the course of execution. The results of a code injection… … Wikipedia
Disk encryption software — To protect confidentiality of the data stored on a computer disk a computer security technique called disk encryption is used. This article discusses software that is used to implement the technique (for cryptographic aspects of the problem see… … Wikipedia
Unix security — Unix security: maintaining a secure environment on Unix and Unix like operating systems is dependent on design concepts of these operating systems, but vigilance through user and administrative techniques is important to maintain security… … Wikipedia