Примеры использования The security settings на Английском языке и их переводы на Русский язык
{-}
-
Colloquial
-
Official
The Security settings window closes.
Provides information about the security settings;
Select the security settings for your computer.
Log in to the access point and check the security settings.
Press Enter and the Security Settings page is displayed.
Люди также переводят
You can manage keys in the Amazon AWS account, in the Security settings.
View the security settings on the access point.
Choose Security to change the security settings.
Apply the security settings of the recovery point version.
Anyway, Tedward, I guess you better update all the security settings in my phone.
In the Security settings window, configure the following settings. .
You can reconfigure the security settings as you require.
The Security Settings are used to manage the security features of the device.
You can also configure the security settings for each protection scope.
Once the password is set, the OSD menu returns to the Security Settings page.
If necessary, change the security settings for the network object added.
If you don't want cookies to be used on your devices,you can change the security settings of your browser.
To configure the security settings of the selected node manually, take the following steps.
You can delete the cookies at any time using the security settings in your browser.
The security settings of the parent node are not applied to subnodes that are configured separately.
You can find the instructions on the security settings on your Web browser.
The security settings template is applied to the selected node in the tree of the computer's file resources.
It can be a full-time job managing the security settings around your Facebook page.
Should the security settings of your PC display a warning message after the Java installation, agree to run Java by clicking on OK.
You can delete the cookies in the security settings of your browser at all times.
If you do not want your computer to receive and store cookies,you can modify the security settings of your browser.
By default, the log file inherits the security settings of the directory where it is created.
In the Kaspersky Embedded Systems Security Console tree, select the task for which you want to save the security settings to a template.
By the way, the security settings in the JVM can be flexibly configured, so the boundaries of what is permitted are under our complete control.
Update your browser andthen verify the security settings of the Internet zone.