Examples of using Exfiltration in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
DNS exfiltration 19 January 2019 at 15:24.
And they're going to approve your exfiltration.
DNS exfiltration 26 November 2018 at 04:35.
Expanded reconnaissance and exfiltration of data in cloud databases.
DNS exfiltration 17 December 2018 at 20:58.
Storage- path used for storing files scheduled for exfiltration.
Email exfiltration from Android's Native Email client.
In most cases, data collection and exfiltration are carried out straight away.
Exfiltration is coming soon, but we're not there yet.
Protect your structured data against exfiltration with Netwrix Auditor for Oracle Database.
By exfiltration pollutants reach uncontrolled in the ground earth.
The stage is then set for the mission's main goal- exfiltration of sensitive data.
Exfiltration The aim of data collection is to prepare data for exfiltration.
Leakage with or without groundwater infiltration or exfiltration at pipe joints, pipe walls, junctions, etc.
This exfiltration can take place through various channels, with preference given to mechanisms with cryptographic protection.
Leaks with or without groundwater infiltration or exfiltration at pipe joints, pipe walls, junctions, transitions etc.
Exfiltration, I am told by government officials here and there and everywhere exfiltration is broadly considered by all the governments to be a free fire zone.
Look, whatever abilities you have,I'm guessing they don't include rendition, exfiltration, and isolation of enemy combatants.
Then, each combination of exfiltration method and protected file was executed to verify blocking.
In 2016, the Italian email hostingservice LiberoMail revealed an attack resulting in exfiltration of many database records.
In addition to data exfiltration, Win32/StrongPity2 is able to download and execute virtually any other(malicious) software of the attacker's choice, with the privileges held by the compromised account.
Both exfiltrate files in thesame way the main payload handles exfiltration of files previously collected and saved by a dedicated module.
Some of the people around that table have disagreements of policy but there is a broad area of consensus.In the world of cyberwar they talk about exfiltration.
Regional- and local-scale numerical models of groundwater flow were developed to describe infiltration and exfiltration areas and general flow paths from potential siting areas to the exfiltration regions.
Where the disagreements currently exist I am told by thegovernment officials I talked to concerns not exfiltration, but what they call network disruption.
The heated indoor air flows in the upper part of thebuilding through leaks in the building envelope to the outside(exfiltration), while in the lower part of the building cold air leaking through the building envelope nachströmt infiltration.