Ví dụ về việc sử dụng Used to intercept trong Tiếng anh và bản dịch của chúng sang Tiếng việt
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
They also are used to intercept field access.[12].
The Sydney Morning Herald has reported thatdiplomatic posts in Asia were being used to intercept phone calls and data.
Which could be used to intercept cellphone communications.
Arrow 3 missiles, which can destroy ballistic missiles at heights of hundreds of miles,could also be used to intercept satellites in the future.
These weapons are used to intercept incoming missiles or airplanes.
This is because they discovered Iranian IPs were beingused to access machines that were then used to intercept and redirect the network traffic.
They were also used to intercept homing pigeons during World War II.
This is a mobile missile defense system, which is used to intercept various types of missiles.
This is typically used to intercept function calls to either monitor or replace them entirely.
This type of torpedo can also be used to intercept other torpedoes.
These techniques can be used to intercept or manipulate the contents of affected Internet traffic or simply to‘blackhole' traffic.”.
But SharePoint 2013 isn't the only placewhere you will see a reverse proxy used to intercept unsolicited traffic coming from the internet.
In Skype for Business, WA-P is used to intercept IM and Conference traffic from outside of the company and redirect it to the Skype for Business Edge for further processing.
Allegedly, each satellite(those big round white things) is actually part of the Echelon system-a top-secret network that is used to intercept private and commercial communications.
A print server can be used to intercept the data and translate it to a more modern code.
The SOP describes such a device as“any electronic, mechanical or electromagnetic instrument, apparatus equipment or other device that is used oris capable of being used to intercept a private communication”.
A porous network of fibers is used to intercept and capture particles.
Tensions between Canberra and Jakarta began in October when top secret files revealed by the German newspaper Der Spiegel and published by Fairfax newspapers showed that Australiandiplomatic posts across Asia were being used to intercept communications.
Rain gardens can be easily used to intercept the stormwater generated from a typical Melbourne household.
Tensions between Canberra and Jakarta began in October when top secret files revealed by the German newspaper Der Spiegel and published by Fairfax newspapers showed that Australiandiplomatic posts across Asia were being used to intercept communications.
Nevertheless, they can pose a serious threat to users,as they can be used to intercept passwords and other confidential information entered via the keyboard.
Shields are used to intercept specific attacks, whether from close-ranged weaponry or projectiles such as arrows, by means of active blocks, as well as to provide passive protection by closing one or more….
Deviare API Hook Deviare is a freewareinter-process hook framework that can be used to intercept other processes' API calls and show full-parameter information or create API monitors.
Shields are used to intercept specific attacks, whether from close-ranged weaponry or projectiles such as arrows, by means of active blocks, as well as to provide passive protection by closing one or more lines of engagement during combat.
Although authentication relay attacks aren't new,this latest research shows that they can be used to intercept message, track a user's location, and stop a phone from connecting to the network.
Australian embassies are being secretly used to intercept phone calls and data across Asia as part of a US-led global spying network, according to whistleblower Edward Snowden and a former Australian intelligence officer.
While verifying that relay attacks are not new attacks,recent research shows that they can be used to intercept messages, track users' locations, and prevent them from connecting to the network.
Shields are used to intercept specific attacks, whether from close-ranged weaponry or projectiles such as arrows, by means of active blocks, as well as to provide passive protection by closing one or more lines of engagement during combat.
The tension between Australia and Indonesia began in October when documents revealed by the German newspaper Der Spiegel and published by Fairfax newspapers revealed that Australiandiplomatic posts across Asia were being used to intercept phone calls and data.
The NSA documents reveal that, as of May 2012, the agency had collected technical information on about 70 percent of cellphone networks worldwide- 701 of an estimated 985-and was maintaining a list of 1,201 email“selectors” used to intercept internal company details from employees.