Примеры использования Untrusted на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Improved authentication with untrusted domains.
The use of untrusted external devices is blocked by default.
A warning message“This Connection is Untrusted“ might appear.
For untrusted domains grabber does not handle images and video.
You never want to expose this to an online node from an untrusted source.
Untrusted certificate authentication attempts will silently fail.
Do not access financial information across an untrusted network without using VPN.
Stay away from untrusted places and trade only with verified binary brokers.
Perhaps, the described error doesn't reflect well the essence of the untrusted data.
We recommend that you disconnect the untrusted device manually or restart the server.
On an Android phone, disable the option of installing software from untrusted sources.
If the number of untrusted conclusions exceeds 0, the row value is highlighted in red.
The user also should avoid following the links gotten from untrusted sources.
Untrusted conclusions for files Number of objects classed as untrusted by KSN.
Never open emails, attachments, orfiles of any kind from untrusted sources.
Gilles Vincent discovered that deserializing untrusted content could result in arbitrary objects injection.
It is a negative number,which can"leak" through the check and there is untrusted data.
Normal(i.e., untrusted) users do not have the discretion to change the sensitivity or integrity levels of objects.
There are few of them and they don't reflect very well the essence of the bugs related to the use of untrusted data.
This certificate is untrusted what causes the displaying of the corresponding warning in the browsers of users.
This feature seeks to provide better security when unserializing objects on untrusted data.
If the site system is in a remote, untrusted forest, the site system computer account cannot send data back to the site server.
Do not configure this account unless you need it to access a site database in an untrusted forest.
Do not install orstore suspicious files obtained from untrusted sources, downloaded from unknown websites, sent by e-mail, etc.
This may expose preexisting vulnerabilities in applications which use these functions while processing untrusted input.
This can be used to easily crash applications reading untrusted ASN.1 data, but does not seem exploitable for code execution.
Typically, you would need this account if the PXE service point needs to access a site database in a remote, untrusted forest.
Clients can read the published site information,which excludes clients from untrusted domains, clients from workgroups, and clients on the Internet.
Servers hosting the following site system roles should be members of this group,unless they are in a remote, untrusted forest.
It was discovered that the Piston framework can deserializes untrusted YAML and Pickle data, leading to remote code execution CVE-2011-4103.