Examples of using Control list in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
Access control list.
See discretionary access control list.
Xml(access control list) read: Access Control List.
Permissions(access control list).
Using Access Control Lists to mitigate threats and minimise attack surfaces.
SACL See system access control list(SACL).
A control list of the supporting documents to be included in a contract award file will be made available to the staff concerned.
The rights are stored in an ACL(Access Control List) file.
It lays down a common EU control list as well as rules for its implementation.
The access control device here is the access control list or ACL.
The IP-MAC-Port-VID Binding and Access Control List(ACL) functions protect against broadcast storms, ARP and Denial-of-Service(DoS) attacks, etc.
If necessary, IBO GmbH identifies information, software and documentationregarding the licensing requirements according to the German and EU export list as well as the US Commerce Control List.
The Regulation establishes a common EU control list as well as rules for its implementation.
In addition, the Access Control Lists(ACL, L2 to L4) feature restricts access to sensitive network resources by denying packets based on source and destination MAC address, IP address, TCP/UDP ports and even VLAN ID.
Commercial file systems still use access control lists. see: secure computing.
Etc/exports is an access control list which provides an entry for any directory that can be exported to an NFS client using the exportfs command.
Germany is also pushingheavily to have 2013 changes to the Wassenaar control list come into force at the EU level as quickly as possible.
(b)(i) The key and ancillary control lists were only agreed with MSs in the spring of 2015, hence not available for CBs when guidelines were drafted.
Two of the most significantnew security mechanisms are file system Access Control Lists(ACLs) and Mandatory Access Control(MAC) facilities.
Where necessary, Schaeffler will identify information, software and documentationin relation to the approval requirements in accordance with the German and EU export list and the US Commerce Control List.
The IP-MAC-Port Binding and Access Control List(ACL) functions protect against broadcast storm, ARP and Denial-of-Service(DoS) attacks, etc.
Insofar as such is necessary, Schaeffler shall label information, software anddocumentation in terms of its duty to obtain a permit according to German and EU Export List as well as the US Commerce Control List.
Following an observation by the Court,the AgencyŐs financial service has revised the control lists, in particular in the field of commitments, payments and the award of contracts.
Its ACL(Access Control List) and ICS(Internet Connection Sharing) let you easily manage your access authority and quickly turns your PC into a Wireless AP, flexible and convenient.
OAM, L2PT and sFlow can meet the requirement of large ISP customers,and the IP-MAC-Port Binding and Access Control List(ACL) functions protect against broadcast storm, ARP and Denial-of-Service(DoS) attacks, etc.
The EU must proactively and instantly update control lists to include relevant devices, equipment, components, accessories, intermediate products and technologies entering the market.
To ensure compliance with the provisions of the Financial Regulation relating to the validation of expenditure by the authorising officer,the Commission uses standard financial circuits and control lists for each transaction performed, thereby contributing to the standardisation and quality of the transactions.
The Bureau of Export Administration(BXA) maintains the Commerce Control List(CCL) within The Electronic Code of Federal Regulations e-CFR better known as Export Administration Regulations, EAR.
The Wireless Voice Gateway offers a choice of b/g/n, WPA and WPA-PSK authentication of your PCs to the gateway, 64 and 128 bit WEP encryption of communication between the gateway and your PCs to guaranty security,and an Access Control List function that enables you to restrict wireless access to only your specific PCs.
In the A-share market, 244 central enterprises and its controlling listed companies in the loss of A reached 67, accounting for more than 27%.