Примеры использования Unauthorized users на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Be diverted to unauthorized users.
Preventing unauthorized users is done by controlling your user accounts management.
To provide the sessions management for information protection from the unauthorized users;
By criminal groups, and other unauthorized users, including terrorists.
If you change the default settings,you can exchange instant messages with unauthorized users.
This protection prevents unauthorized users to see the cookies' contents in the client browser.
Penetration test service is provided to protect any valuable information from unauthorized users.
With our computer software,you can prevent unauthorized users from using your computer.
Unauthorized users cannot browse to the underlying microdata, but they do have access to the metadata of this microdata.
It's important to password protect your accounts in Windows XP to prevent unauthorized users from gaining access.
Administrators can also put unauthorized users into Guest VLAN and give them limited access rights.
The Guest Account can cause security issues in Windows XP by giving unauthorized users access to your PC.
The first, is to prevent unauthorized users sitting at your computer and logging in through your keyboard.
Samba was vulnerable to a missing access control check inthe VFS shadow_copy2 module, that could allow unauthorized users to access snapshots.
This makes it more difficult for thieves and unauthorized users, but is easy to handle for the proper operator.
It was discovered that a missing access control check in the VFS shadow_copy2 module could allow unauthorized users to access snapshots.
Secondly, there is also a risk that unauthorized users might use the ITDBonline+ and that would endanger the complete Authorization procedure see point K.
Because the user's old password could also be the user's current Windows password,this can expose the user's Windows password to unauthorized users on the network.
If you want to protect the package content from unauthorized users, add users or groups to the package access accounts instead of adding the Users group.
Nicklous Roberts discovered that the Reupload module of Gallery 2, a web based photo management application,allowed unauthorized users to edit Gallery's data file.
After completion of integration required, the front page for unauthorized users has been created with its own navigation and text panels, ispolzoalsya the same display method and structure for the panels in the buyer's office.
It aims at facilitating and controlling access to applications and resources while protecting confidential personal andbusiness information from unauthorized users.
Data violation, unavailability, lack of accountability and loss of integrity could result, should unauthorized users successfully exploit weak authentication credentials.
It aims at facilitating and controlling access to applications and resources while protecting confi dential personal andbusiness information from unauthorized users;
Other measures implemented to deter thefts have included the implementation of a radio trunking system, whereby stolen communications equipment can be immediately disabled,rendering it useless to unauthorized users(and subsequently often recoverable through local markets), and similar disabling of INMARSAT satellite communications equipment, which can be traced and recovered should attempts be made to re-register it for later use.
Encryption WPA/ WPA2 protects the wireless network that allows you to organize securely share the connection 3G/ 4G,without fear that the network will have access to unauthorized users.
With a robust and comprehensive security detection system, the DWC-2000 manages associated APs by blocking potential attacks from unauthorized users and appliances, which is particularly crucial in wireless environments.
By regulating the legal trade in conventional arms, an arms trade treaty should also contribute to preventing the illicit and irresponsible trade in conventional arms andthe diversion of transferred weapons to unintended and unauthorized users.
Keystroke recording software(popular as keyloggers software)is password protected that prevents unauthorized users to change software configuration settings.
In an attempt to render yet another concrete contribution to the consolidation of stability and the strengthening of confidence in the region of South-East Europe, the Federal Republic of Yugoslavia has decided to begin continued action to destroy the excess quantities of small arms and light weapons, primarily those seized from smugglers,terrorists and other unauthorized users.