Examples of using User credentials in English and their translations into Slovak
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
If the MySQL server requires database user credentials.
WinRM 2.0 supports delegating user credentials across multiple remote computers.
If the PostgreSQL server requires database user credentials.
Validate the user credentials against the user information that is stored in your user database.
Asp to avoid transferring the user credentials in clear text.
They may need user credentials, credit card information, website control or other dirty motives behind their attacks.
Create a ValidateUser function to validate the user credentials by looking in the database.
All user credentials are communicated to the MFP using a combination of secure protocols to help avoid interception.
Create a ValidateUser function to validate the user credentials by looking in the database.
The firmware Trusted Platform Module(TPM) provides hardware-based encryption keys to help secure your data,e-mail, and user credentials.
If your Active Directory settings are accurate, user credentials should sync in the Active Directory properly.
Improvements in computer hardware and software algorithms havemade these protocols vulnerable to published attacks for obtaining user credentials.
The Mount commandaccesses an NFS share by using incorrect user credentials in Windows Server 2008 R2.
If no user credentials are present, the server reads all nearby computers from Network folders available in Windows that are populated automatically by the operation system.
Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information.
If the SAP HANA server requires database user credentials, then in the Access an SAP HANA database dialog box, do the following.
This may allow aman-in-the-middle attacker to redirect connections and intercept user credentials or other sensitive information.
These credentials must match the user credentials defined on the files that the user is attempting to access.
Currently, Kerberos authentication enables auser to log on to a domain-joined computer by using user credentials in one of the following formats.
Select the check box next to Use current user credentials to have the login credentials be automatically completed.
When you enable SSO for a terminal server from a Windows XP SP3-based client computer,you are still prompted for user credentials when you log on to the terminal server.
An attacker with a privileged network position could intercept user credentials or other sensitive information intended for a site with a certificate issued by DigiCert Malaysia.
In addition, Adobe LiveCycle Policy Server 7.2 offers a multi-platform solution thatenables organizations to aggregate group information and check user credentials against existing authentication directories.
If you select the check box next to Use current user credentials, login credentials will be automatically completed.
Hackers are finding new ways to break into oldPCs through the virtual front door by stealing user credentials to gain privileges inside organizations.
You can select thecheck box next to Use current user credentials and login credentials will be automatically completed.
Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information.
If you leave this policy unsetGoogle Chrome will not delegate user credentials even if a server is detected as Intranet.
CredSSP enables a program to use client-side SSP to delegate user credentials from the client computer to the target server.