Примери за използване на Illegal access на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Article 2- Illegal access.
Illegal access to information systems;
Blocking the terminal under an attempt of an illegal access.
Illegal access into the ship's information core detected from the Kiakra.
Guarantees to prevent abuses or illegal access or transfer;
Instead people gain illegal access to goods and services if they have the right connections.
With abylon LOGON you can protect your computer against illegal access in a comfortable.
Illegal Access to Computer Information, and the Creation, Use, and Distribution of Harmful Programmes for Computers.
After the final decision of the European Court users will, use the illegal access, prosecuted.
Sites or products that enable illegal access of cell phones and other communications or content delivery systems/devices.
Tricolor TV" continues to struggle with piracy sites,offering illegal access to satellite TV channels.
Pages or products that enable illegal access of mobile phones and other communications or content delivery systems or devices.
I would add that there is nothing theoretical about the risks of abusive or illegal access to retained data.
Links to sites orproducts that enable illegal access of cell phones and other communications or content delivery systems or devices.
The principal difference of multi-user systems from single-user is existence of security features of information of each user from illegal access of other users.
The User shall immediately notify the Provider in case of illegal access through the use of his user name and password.
The principal difference of multi-user systems from single-user is existence of security features of information of each user from illegal access of other users.
These claims would then be used as a public excuse to allow them illegal access to the International Collateral Combined Accounts.
As for the rest of your answer, Commissioner, you recited the Commission's usual prayer book, but experience shows that the Commission, your Commission, and the European Court of Justice are passing judgment on the basis of the European treaties, in accordance with a fatal principle, that of free and undistorted competition, andare therefore creating illegal access to housing construction and to housing itself.
The defendants were convicted of illegal access to computer information, as well as for the creation of, use and distribution of malicious programs.
We use the information received during the use by you of our Internet site only for statistical purposes and for protection from illegal access to the offered by us in Internet.
The User shall immediately notify INSA for any case of illegal access through the use of her/his user name or password, as well as there is always a risk of such use exists.
On October 3, 2013, we reported via a public blog post the discovery of sophisticatedattacks on our network, involving the illegal access of customer information as well as source code for numerous Adobe products.
On the other hand,they may also be used for unlawful purposes that lead to illegal access, data interception or interference, system surveillance, and misuse of devices or other forms of malpractice; for example, geo-location tracking could be used to stalk women and make them more vulnerable to gender-related abuse and violence.
Data exchanged during the Europass'Online creation' session are protected from unauthorised, illegal access that may be made be in transit, by the application of SSL(HTTPS) encryption(11/2005).
The protection ofinformation on paper and on electronic carrier from illegal access, damage, loss or destruction is provided by many internally regulated technical and organizational measures, which include(but are not limited to).
Adobe's security team recently discovered sophisticated attacks on our network, involving the illegal access of customer information as well as source code for numerous Adobe products.
The directive requires that States Members set a maximum penalty of two years in prison for crimes concerning illegal access to information systems,illegal retrieving of data, illegal interception of communications such as the production and sales of tools used to commit these crimes.
Offences against the confidentiality, integrity andavailability of computer data and systems: illegal access, illegal interception, data interference, system interference, misuse of devices.
The user is obligated to inform THE SELLER immediately about every case of an illegal access by using his user name and password and also about the cases when such a danger exists.