-
1 trivial password
Безопасность: легко простой пароль, легко раскрываемый пароль -
2 trivial password
легко раскрываемый (простой) парольАнгло-русский словарь по компьютерной безопасности > trivial password
-
3 non-trivial password
Англо-русский словарь по компьютерной безопасности > non-trivial password
-
4 password
пароль; персональная информация аутентификацииАнгло-русский словарь по компьютерной безопасности > password
См. также в других словарях:
Trivial File Transfer Protocol — Abbreviated TFTP. A little used and simplified version of the TCP/IP file transfer protocol that does not include password protection. Because it has no security associated with it, most system administrators do not support its use and… … Dictionary of networking
Encrypting File System — The Encrypting File System (EFS) on Microsoft Windows is a feature introduced in version 3.0 of NTFS[1] that provides filesystem level encryption. The technology enables files to be transparently encrypted to protect confidential data from… … Wikipedia
Please Save My Earth — Infobox animanga/Header name = Please Save My Earth caption = Cover of the first volume ja name = ぼくの地球を守って ja name trans = Boku no Chikyū o Mamotte genre = science fiction, urban fantasyInfobox animanga/Manga title = author = Saki Hiwatari… … Wikipedia
Keystroke logging — (often called keylogging) is a method of capturing and recording user keystrokes. The technique and name came from before the era of the graphical user interface; loggers nowadays would expect to capture mouse operations too. Keylogging can be… … Wikipedia
Session poisoning — (also referred to as Session data pollution and Session modification ) is to exploit insufficient input validation in server applications which copies user input into session variables. The underlying vulnerability is a state management problem;… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
LM hash — Lanman redirects here. For other uses, see Lanman (disambiguation). LM hash, LanMan, or LAN Manager hash was the primary hash that Microsoft LAN Manager and Microsoft Windows versions prior to Windows NT used to store user passwords. Support for… … Wikipedia
Schéma d'URI — En informatique, un schéma d’URI est le premier niveau de la structure de nommage des identifiants uniformes de ressources (URI). Toutes les URIs sont construites à partir d’un nom de schéma, suivi de deux points (« : ») puis du reste… … Wikipédia en Français
Abkürzungen/Computer — Dies ist eine Liste technischer Abkürzungen, die im IT Bereich verwendet werden. A [nach oben] AA Antialiasing AAA authentication, authorization and accounting, siehe Triple A System AAC Advanced Audio Coding AACS … Deutsch Wikipedia
Liste der Abkürzungen (Computer) — Dies ist eine Liste technischer Abkürzungen, die im IT Bereich verwendet werden. A [nach oben] AA Antialiasing AAA authentication, authorization and accounting, siehe Triple A System AAC Advanced Audio Coding AACS … Deutsch Wikipedia
SHA hash functions — The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. The five algorithms … Wikipedia