-
1 access control entry
"An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object." -
2 ar-sa التحكم بالوصول
"An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object." -
3 ACE
"An entry in either a securable object's discretionary access control list (DACL) or an object's system access control list (SACL). In a DACL, the entry grants or denies permissions to a user or group. In a SACL, the entry specifies which security events to audit for a particular user or group or controls the Windows Integrity Level for the object." -
4 full trust
"A code access security (CAS) state assigned to managed assemblies. The level of trust granted to an application or Web service affects its ability to use system resources while executing. Assemblies that have full trust can access any resource that is subject to operating system security, and all privileged operations are supported." -
5 elevation of privilege
"The process by which a user obtains a higher level of privilege than that for which he has been authorized. A malicious user may use elevation of privilege as a means to compromise or destroy a system, or to access unauthorized information." -
6 administrator account
"On Windows-based computers, a user account that is a member of the computer’s local Administrators group or a member of a group that is a member of the local Administrators group, such as the Domain Admins group in a Windows domain. This is the first account that is created when you install an operating system on a new workstation, stand-alone server, or member server. By default, this account has the highest level of administrative access to the local computer." -
7 administrator
"On Windows-based computers, a user account that is a member of the computer’s local Administrators group or a member of a group that is a member of the local Administrators group, such as the Domain Admins group in a Windows domain. This is the first account that is created when you install an operating system on a new workstation, stand-alone server, or member server. By default, this account has the highest level of administrative access to the local computer." -
8 built-in administrator account
"On Windows-based computers, a user account that is a member of the computer’s local Administrators group or a member of a group that is a member of the local Administrators group, such as the Domain Admins group in a Windows domain. This is the first account that is created when you install an operating system on a new workstation, stand-alone server, or member server. By default, this account has the highest level of administrative access to the local computer."English-Arabic terms dictionary > built-in administrator account
-
9 built-in administrator
"On Windows-based computers, a user account that is a member of the computer’s local Administrators group or a member of a group that is a member of the local Administrators group, such as the Domain Admins group in a Windows domain. This is the first account that is created when you install an operating system on a new workstation, stand-alone server, or member server. By default, this account has the highest level of administrative access to the local computer."حساب المسؤول المضمَّن -
10 elevated trust
"In Silverlight, a security level that gives out-of-browser applications greater access to the local system." -
11 elevation
"The process by which a user obtains a higher level of privilege than that for which he has been authorized. A malicious user may use elevation of privilege as a means to compromise or destroy a system, or to access unauthorized information."
См. также в других словарях:
Access network — An access network is that part of a telecommunications network which connects subscribers to their immediate service provider. It is contrasted with the core network, (for example the Network Switching Subsystem in GSM) which connects local… … Wikipedia
Level 3 Communications — Infobox Company company name = Level 3 Communications, Inc. company company type = Public (Nasdaq|LVLT) foundation = 1985 location = Broomfield, Colorado, USA key people = James (Jim) Q. Crowe CEO industry = Communications Backbone products =… … Wikipedia
Access control — is the ability to permit or deny the use of a particular resource by a particular entity. Access control mechanisms can be used in managing physical resources (such as a movie theater, to which only ticketholders should be admitted), logical… … Wikipedia
Access (economics) — Access is a catalytic process that enables interactions, contacts and exchanges among people, businesses and nations. An analytical framework to define the drivers and benefits of Access and to quantify the impact of Access on economic growth and … Wikipedia
System Architecture Evolution — (aka SAE) is the core network architecture of 3GPP s LTE wireless communication standard. SAE is the evolution of the GPRS Core Network, with some differences: simplified architecture all IP Network (AIPN) support for higher throughput and lower… … Wikipedia
System Y — is a Digital telephone exchange system used by British Telecom as an alternative to the System X. System Y refers to the AXE 10 system manufactured by Ericsson. British Telecom decided to use the AXE10 digital switch in the mid 1980s as a way of… … Wikipedia
Access to Insight — is a popular Theravada Buddhist website providing access to a huge collection of translated texts from the Tipitaka, as well as contemporary materials published by the Buddhist Publication Society and many teachers from the Thai Forest Tradition … Wikipedia
System Shock 2 — Разработчики Irrational Games Looking Glass Studios Изда … Википедия
System Shock — ist eine Computerspielreihe, die Elemente von 3D Action Rollenspiel und Ego Shooter miteinander verbindet. Die Spielreihe vereint eine überdurchschnittliche Spielerfreiheit mit der Unmittelbarkeit der Egoperspektive und enthält viele Elemente des … Deutsch Wikipedia
System Center Data Protection Manager — Developer(s) Microsoft Corporation Stable release DPM 2010 / April 19, 2010; 18 months ago (2010 04 19) Development status Active … Wikipedia
System/38 — ist ein Computer der Firma IBM. Das System wurde 1978 angekündigt und erstmals August 1979 ausgeliefert. Das System wurde im IBM Labor in Rochester als Mehrbenutzer und Multithreadsystem für kommerzielle oder kaufmännische Anwendungen entwickelt… … Deutsch Wikipedia