-
1 sophisticated eavesdropper
Безопасность: перехватчик, располагающий современной аппаратуройУниверсальный англо-русский словарь > sophisticated eavesdropper
-
2 sophisticated eavesdropper
Англо-русский словарь по компьютерной безопасности > sophisticated eavesdropper
-
3 eavesdropper
1) перехватчик (информации)Англо-русский словарь по компьютерной безопасности > eavesdropper
См. также в других словарях:
Squidgygate — refers to the pre 1990 telephone conversations between Diana, Princess of Wales and a close friend, James Gilbey, and to the controversy surrounding how those conversations were recorded. During the calls, Gilbey affectionately called Diana by… … Wikipedia
performing arts — arts or skills that require public performance, as acting, singing, or dancing. [1945 50] * * * ▪ 2009 Introduction Music Classical. The last vestiges of the Cold War seemed to thaw for a moment on Feb. 26, 2008, when the unfamiliar strains … Universalium
Challenge-response authentication — For the spam filtering technique, see Challenge response spam filtering. For other uses, see CRAM (disambiguation). In computer security, challenge response authentication is a family of protocols in which one party presents a question (… … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
TEMPEST — is a codename referring to investigations and studies of compromising emanations (CE). Compromising emanations are defined as unintentional intelligence bearing signals which, if intercepted and analyzed, may disclose the information transmitted … Wikipedia
Radiotelephone — A radiotelephone is a communications device that allows two or more people to talk using radio. There is disagreement about the definition of the term. There is a conflict between British English usage, American English usage, and historic use.… … Wikipedia
TEMPEST — Saltar a navegación, búsqueda Para el personaje de historietas, ver Garth Para el videojuego de Atari, ver Tempest (videojuego) TEMPEST es un nombre en clave referido a diversos estudios e investigaciones acerca de emanaciones comprometedoras… … Wikipedia Español
Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… … Wikipedia
RSA — In cryptography, RSA is an algorithm for public key cryptography. It is the first algorithm known to be suitable for signing as well as encryption, and one of the first great advances in public key cryptography. RSA is widely used in electronic… … Wikipedia
Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… … Wikipedia
List of works by H. P. Lovecraft — This is a complete, exhaustive list of works by H. P. Lovecraft. Dates are the time of composition, not publication. Many of these works can be found on . Fiction* At the Mountains of Madness (February 22 March 1931) * Azathoth (June 1922) *… … Wikipedia