Examples of using Unauthorized users in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Measures against unauthorized users.
Unauthorized users cannot perform specific actions by bypassing the user interface.
Trusted protection against unauthorized users.
Due to a buffer overflow unauthorized users may execute code at an administrator level.
Keep out of reach of children and unauthorized users.
Prevents unauthorized users from accessing your computer and taking advantage of your personal data.
Keep this device away from children under age 14 and unauthorized users.
Different access levels prevent unauthorized users from making settings to the datalogger.
We will never share your personal information with unauthorized users.
Unauthorized users can try to see your data via this Internet connection, to modify it or to manipulate your PCs.
Nodes can thus be automatically suppressed for unauthorized users.
In order to prevent unauthorized users from changing the BIOS settings, you should always enable the setup or administrator's password.
Private-GuestAcc: Similar to Private, but with guest access for unauthorized users.
Additionally, you can identify unauthorized users and therefore minimize the security risk within your organization.
I programmed a back door into the satellite to protect it from unauthorized users.
This information alone doesn't give unauthorized users the actual passwords-- each password would need to be deciphered individually.
Keep in mind that even deleted files can be recovered by unauthorized users.
Windows Firewall is specially designed to assist in keeping away unauthorized users so that they cannot access resources and files on your system.
By setting password to a PDF file you can prevent its access by unauthorized users.
Port security provides the ability to deny unauthorized users from accessing the network.
Private with guest access: Similar to Private network, but with guest access for unauthorized users.
NT can secure sensitive data and keep unauthorized users off the network.
Other feature that makes software special is password protected functionality that prevents unauthorized users to access.
In addition, TIS reserves the right to exclude unauthorized users even retrospectively.
In addition, Focused has the right to take measures preventing you fromsharing your account data or allowing unauthorized users access to it.
Hoccer can make"mug shot" with the front camera when unauthorized users try to access the app.
A vulnerability in Sun Java System Application Server andSun Java System Web Server may allow unauthorized users to view the JSP source code.
It can be used to allow legitimateusers to send email while denying the service to unauthorized users, such as spammers.
Keystroke recording software(popular as keyloggers software) is password protected that prevents unauthorized users to change software configuration settings.
Biz features in addition to its convenient link management through robust security features that ensure no one can get unauthorized users and automatically running scripts directly to the content.