Перевод: с английского на русский

с русского на английский

tampered access

См. также в других словарях:

  • Pirate decryption — most often refers to the reception of compromised pay TV or pay radio signals without authorization from the original broadcaster. The term pirate in this case is used in the sense of copyright infringement and has little or nothing to do with… …   Wikipedia

  • Bank fraud — is the use of fraudulent means to obtain money, assets, or other property owned or held by a financial institution. In many instances, bank fraud is a criminal offense. While the specific elements of a particular banking fraud law vary between… …   Wikipedia

  • Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… …   Wikipedia

  • R v Thomas — Infobox Court Case name=R v Thomas court=Victorian Court of Appeal date decided=18 August 2006 full name=The Queen v Joseph Terrence Thomas citations=Cite Case AU|VSCA|165|2006 judges=Maxwell P, Buchanan Vincent JJA prior actions= DPP v Thomas… …   Wikipedia

  • Premier Election Solutions — Industry Electronic Voting hardware Consulting Founded Ohio (January 22, 2002) Headquarters North Canton, Ohio, United States Products AccuVote TSX, AccuVote OS, AccuView Printer Module, Global Election Manageme …   Wikipedia

  • Zimbabwean presidential election, 2008 — Infobox Election election name = Zimbabwean presidential election, 2008 country = Zimbabwe type = presidential ongoing = no previous election = Zimbabwean presidential election, 2002 previous year = 2002 next election = next year = election date …   Wikipedia

  • education — /ej oo kay sheuhn/, n. 1. the act or process of imparting or acquiring general knowledge, developing the powers of reasoning and judgment, and generally of preparing oneself or others intellectually for mature life. 2. the act or process of… …   Universalium

  • Public-key cryptography — In an asymmetric key encryption scheme, anyone can encrypt messages using the public key, but only the holder of the paired private key can decrypt. Security depends on the secrecy of that private key …   Wikipedia

  • Proxy server — For Wikipedia s policy on editing from open proxies, please see Wikipedia:Open proxies. Communication between two computers (shown in grey) connected through a third computer (shown in red) acting as a proxy. In …   Wikipedia

  • Card reader — A card reader is a data input device that reads data from a card shaped storage medium. Historically, paper or cardboard punched cards were used throughout the first several decades of the computer industry to store information and write programs …   Wikipedia

  • Microsoft SQL Server — Developer(s) Microsoft Stable release SQL Server 2008 R2 (10.50.2500.0 Service Pack 1) / July 11, 2011; 4 months ago …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»