Examples of using Remote computers in English and their translations into Polish
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Financial
-
Official/political
-
Programming
-
Computer
Local accounts on the remote computers.
Control remote computers from your mobile device.
Remotely launch applications on remote computers.
These remote computers are called accounting clients.
Starting program on remote computers is easy.
Firewall also provides protection against attacks from remote computers.
To collect events from remote computers, you must create an event subscription.
TeamViewer Host 24/7 access to remote computers.
Transfer files to and from remote computers via drag& drop or via your clipboard.
Scanning roles that are running on remote computers.
Access to remote computers that are turned off, asleep, hibernating, or even damaged.
It is now possible to execute CMD commands on remote computers.
You can collect events from remote computers and store them locally by specifying event subscriptions.
Format of event messages that are displayed on remote computers.
Possibility to connect to multiple remote computers at the same time and easily switch between sessions.
The ForwardedEvents log is used to store events collected from remote computers.
You can collect events from remote computers and store them in logs on the local computer. .
Is the network filesystem used to access disks located on remote computers.
It provides protection against attacks from remote computers and blocks some potentially dangerous services.
Is the network file system used to access disks located on remote computers.
You can create public queues on remote computers using Active Directory Users and Computers. .
Format of event messages- Format of event messages that are displayed on remote computers.
Execute several actions on all remote computers with on click.
If you have additional Server Manager snap-ins in the MMC,repeat this procedure from step 6 to connect additional Server Manager snap-ins to other remote computers.
Members of the Administrators group have access to remote computers, but may not have access to all data.
Outgoing Remote Transactions: In some situations, a local application initiates a transaction andperforms update operations on resources that are located on remote computers.
It provides protection against attacks from remote computers and can block potentially threatening services.
Using the(ECA Web Console), you can deploy ESET solutions, manage tasks, enforce security policies, monitor system status andquickly respond to problems or threats on remote computers.
This process not only protects communication between computers, it also protects remote computers that request secure access to a corporate network.
If you need only to remotely manage DHCP server clusters that are deployed on remote computers, you can use Cluster Administrator to do this.