Примери за използване на Malicious user на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
This helps protect you from malicious users.
Download now to prevent a malicious user from misusing the Name Conflict and….
The only way to protect themselves from attacks by malicious users.
According to the research, malicious users utilize RAT software to.
It's a powerful way to secure network interfaces from malicious users.
Download now to prevent a malicious user from creating or predicting pipes that….
Under certain conditions,the vulnerability could allow a malicious user to….
Download now to prevent a malicious user from launching a Denial of Service attack via the Remote Procedure….
The search manipulation bug was documented by Wietze Beukema,a London-based security specialist, who warned that a malicious user could use this bug to generate misinformati….
If a malicious user knows or can get to know your password, he/she could then have access to all of your accounts.
However, these features will not prevent a malicious user from making unwanted design changes to your database.
A malicious user can view this map information by using a Microsoft Visual Basic for Applications(VBA) macro.
No one wants the network they manage to become the target of malicious users trying to steal corporate data or cause damage to the organization.
One way a malicious user can get access to your data is by playing off your day-to-day life routines.
Fixed a bug where for select boxes having non-numerical indices, a malicious user could submit other values than those defined when creating the form;
A malicious user may be able to craft a SQL query that is designed to steal or to destroy data that you have access to.
This information may be stored as plain text, and a malicious user could access the information to compromise the security of the data source.
If a malicious user tries to spend their bitcoins to two different recipients at the same time, this is double spending.
This information may be stored as plain text, and a malicious user could access the information to compromise the security of the data source.
A malicious user does this by accessing the SSL, or secure socket layer, on your encrypted official Apple applications, such as Safari, Twitter and Mail.
This information may be stored as plain text in the workbook and the connection file, and a malicious user can access the information to compromise the security of the data source.
In order to avoid malicious users defacing the Fedora Project Wiki, we have had to restrict edit access a little.
This information may be stored as plain textin the workbook and the connection file, and a malicious user can access the information to compromise the security of the data source.
A malicious user may be able to craft a SQL query that is designed to steal or to destroy data that you have access to.
This information may be stored as plain text in the workbook andthe connection file, and a malicious user can access the information to compromise the security of the data source.
A malicious user can send commands to any watch making the call another number of his choice, can communicate with the child on the device or locate the child through GPS.”.
Even if the credentials aren't saved with the connect string, a malicious user could modify permissions on the SharePoint site with the assistance of a collaborator who already has sufficient permissions.
Real-time analysis has displaced this reactive model using complex models, behaviour analysis andartificial intelligence(AI) to quickly discern between valid and malicious user activity.
The vulnerability could allow a malicious user to gain control of an affected server. Microsoft ships two versions of Network Monitor….
This reactive model has been displaced by real-time analysis, using complex models, behavior analysis andartificial intelligence(AI) to quickly discern between valid and malicious user activity.