Примери за използване на Unauthorized people на Английски и техните преводи на Български
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Do not let unauthorized people get access to your computers and accounts.
The product has been improperly opened,modified or repaired by unauthorized people;
Otherwise unauthorized people can change your personal settings, alter your forecasts etc….
The effective protection of a device data against the use of unauthorized people.
He can prevent unauthorized people from entering the courtroom or intervene if the accused becomes aggressive.
It's not going to be any mystery how the next guy dies if i let any unauthorized people in that house.
Strong passwords help prevent unauthorized people from accessing files, programs, and other resources, and should be difficult to guess or crack.
The conversion of data into a form that cannot be easily understood by unauthorized people.
The European Central Bank said one of its websites was hacked by unauthorized people who may have stolen private information including contact data.
IRM helps prevent sensitive information from being read, printed, forwarded,or copied by unauthorized people.
The European Central Bank said one of its websites was hacked by unauthorized people who may have stolen private information including contact data.
Encryption: The conversion of data into a form that cannot be easily understood by unauthorized people.
These tips are designed to remove unauthorized people's access to your personal information or mail when you work on a computer network in a public place.
IRM helps prevent sensitive information from being read, printed,forwarded, or copied by unauthorized people.
Strong passwords help prevent unauthorized people from accessing files, programs, and other resources, and should be difficult to guess or crack. A good password.
IRM helps prevent sensitive information from being read, printed, forwarded,or copied by unauthorized people.
We take a broad look at the tasks, roles andtools used to prevent unauthorized people or programs from accessing your networks and the devices connected to them.
These hangars are seen as Israeli territory, and are therefore prohibited territory for unauthorized people, so top secret!
These tips are designed to remove unauthorized people from accessing your personal information or your mail when working on a computer network in a public place.
Employees/committee members should make sure paper documents and printouts are not left where unauthorized people can see them.
The term"looting" is also sometimes used to refer to antiquities being removed from countries by unauthorized people, either domestic people breaking the law seeking monetary gain, or by foreign nations, which are usually more interested in prestige or previously,"scientific discovery".
The software requires to set a password andchoose the necessary application for protection against the use of unauthorized people.
Employees must make sure paper and printouts are not left where unauthorized people could see them, like at the printer.
Information Rights Management(IRM) helps prevent sensitive information from being printed, forwarded, saved, edited,or copied by unauthorized people.
But the overall thrust is the same: network security is implemented by the tasks andtools you use to prevent unauthorized people or programs from accessing your networks and the devices connected to them.
Due to nature of the internet, the information can flow over the internet without sufficient security measures, andsuch information can be obtained and used by unauthorized people.
Casinos with a license, however,must have multiple encryption systems which ensure that no unauthorized people may get to your money or personal data.
Information Rights Management(IRM) allows senders to specify access permissions for their email messages, which might include preventing messages from being forwarded, read, printed,or copied by unauthorized people.
Avoid disastrous mistakes- Data Loss Prevention(DLP)capabilities prevent users from mistakenly sending sensitive information to unauthorized people, while informing them of internal compliance policies.
Bg apply complete technical and organizational measures to protect the data provided against accidental our willful manipulation, loss,destruction and access by unauthorized people.