Examples of using File operations in English and their translations into Russian
{-}
-
Official
-
Colloquial
File operations queue.
Many string and file operations.
Monitor file operations when the task is not running.
Function for Performing File Operations.
File operations inside of Windows are improved by up to 20 percent.
It provides the basic file grid of the desktop and basic file operations.
Select the Detect file operations basing on the following markers option.
Kaspersky Security 10.1 for Windows Server does not analyze file operations for specified exclusions.
Performs file operations according to the authentication above.
The check box disables use of exclusions for folders where file operations do not need to be monitored.
File operations are rename, delete, mkdir to create a folder and upload.
By default, a monitoring scope is not specified andthe task does not monitor file operations in any folder.
Perform basic file operations, such as move, rename, delete or copy.
The server side script file_op. jss performs the necessary HTTP authentication and handles the file operations.
Transfer file operations that are time-consuming, to the background, while continuing the current work.
Not applied You can check the use of exclusions for folders in which file operations do not need to be monitored.
Any file operations from this host will be blocked for a period of time specified in the storage settings.
Kaspersky Security 10.1 for Windows Server intercepts file operations, executed in Windows Server 2016 containers.
To perform the file operations in these tabs, you had to manually browse or search the files. .
If the check box is cleared, the application will not log file operations in monitoring scopes when the task is not running.
Opening a source file Operations with files are performed via the menu bar in Solveig Multimedia Video Splitter.
When PHP scripts are stored on a remote UNC file share, the file operations introduce a significant performance overhead.
Select this option to block file operations performed by the compromised hosts on a protected NAS.
Configuring monitoring rules By default, a monitoring scope is not specified andthe task does not monitor file operations in any directory.
Select the users orgroups of users for whom file operations are allowed in the selected monitoring scope, and click the OK button.
You can use rule triggering criteria to configure the conditions that trigger the task, andadjust the importance level of events for detected file operations recorded in the task log.
If the check box is selected, all file operations executed by the user/ IP address/ path specified in the list below are allowed.
Click the Add button to have Kaspersky Embedded Systems Security start monitoring file operations in the indicated monitoring scope.
You can more easily perform file operations on parent and child references, multiple references, or references that are spread across vaults.
These ready to use functions include: Mathematics, logic,network, file operations, socket communication plus many more.
