Examples of using Security log in English and their translations into Hungarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Financial
-
Programming
-
Official/political
-
Computer
The Security Log.
We checked the security log.
The security log is full.
This is the building security log.
Security log, supplemental.
View the Security Log.
Security log, stardate 47284.1.
Check the JAG security log.
Open the Security log to view these events.
Checked the JAG security log.
The security log shows that Allison activated the isolation protocols.
Police went through their security log.
We checked the security log to see who opened the door.
Anyway, it was she who checked the security log for me.
According to the security log… this is when T'Pau's biometric signature was recorded.
And if you don't believe me, you can check the security log at the time of Kaleb's death.
According to the security log, there hasn't been any human activity in the MALP room for 36 hours.
We're gonna need Jennie's medical records, the hospital security log, list of all employees.
Security log shows a delivery from Wadata a week ago-That was placed in locker number allegro.
So, I checked the JAG security log, and what do you know?
IT administrators need to learn a whole new networking approach,from simple network troubleshooting to firewall configuration and security log monitoring.
Computer, display bridge security log USS Defiant, stardate 48214.5, time index 310.
Security log Records security events such as invalid and valid logon attempts and events related to resource use, such as creating, opening, or deleting files.
Error message when you try to clear or to back up the Security log on a Windows XP-based computer:"Stop 0xC0000244(STATUS_AUDIT_FAILED)".
The security log can record security events such as valid and invalid login attempts, and events related to resource use, such as creating, opening, or deleting files.
This event happens when the Security Log new has reached the specified Maximum Log Size and does not permit logging of audit information.
The Security log contains events such as valid and invalid logon attempts, as well as events related to resource use, such as creating, opening, or deleting files or other objects.
The Security log records events related to security like valid and invalid logon attempts or events related to resource usage, such as creating, opening, or deleting files.
The Security log can record security events such as valid and invalid logon attempts as well as events related to resource use, such as creating, opening, or deleting files.