Приклади вживання User's password Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
The user's password may be encrypted.
The user's password must never travel over the network;
The user's password is never transmitted over the network.
Enter the user's password in the field“Password for the camera”.
In particular, XSS andCSRF vulnerabilities may be exploited by hackers to obtain a user's password.
The software is able to store the user's passwords in safety and protect the home network against the spyware.
To authorize access to the Site,the login(e-mail address or mobile phone number) and the User's password are used.
The next change of the User's password is carried out using the Application software provided in its Personal Account.
You can encode(encrypt)the selected text document on your computer using the user's password and decrypt(decipher) it at the right time.
The user's password should never be stored in an unencrypted form even in the authentication server database;
When a user logs on, the system verifies the user's password by comparing it with information stored in a security database.
The user's password must never be stored in any form on the client machine: it must be immediately discarded after being used;
Then type the command passwd(to change the password of the root user) or passwd jimbot(jimbot to change the user's password) then.
If monitoring takes place, user's passwords, credit card details, and other types of sensitive information is stolen.
Immediately notify the Website Administration of any unauthorized use of the User's password or account, or any other security breach;
User's password For authentication Not transferred Unlimitedly in an encrypted form(until the removal of the user), as a hash sum.
The Contractor shall not be liable for the storage and use of the User's password required to access his account on the Site, as well as to theService and the Google Gmail Service.
The User's password For authentication Not transmitted During unlimited period of time(until users delete themselves), as a hash sum.
To connect to the created base is used database name,username and user's password, that were set by creating database. in the administration panel.
Upl is not responsible for any loss that the said user may incur as a result of any unauthorized person using the said user's account or the user's password.
Someone could just capture as many Facebook orTwitter sessions as they can(after which they can change a user's password and keep the Facebook account for themselves), hijack Amazon shopping sessions and grab address and credit card information, read your email and chats, and so on.
Theft of password information, external media(floppy disk or an electronic key,which is stored on the user's password, designed for entering the operating system);