- security hole
-
предохранительная скважина
Англо-русский словарь технических терминов. 2005.
Англо-русский словарь технических терминов. 2005.
Hole punching — is a computer networking technique for establishing communications between two parties in separate organizations who are both behind restrictive firewalls. Used for applications such as online gaming, P2P and VoIP, both clients establish a… … Wikipedia
Security of Advanced Access Content System — The security of Advanced Access Content System has a subject of discussion amongst security researchers, high definition video enthusiasts, and consumers at large since its inception. A successor to Content Scramble System, the digital rights… … Wikipedia
Hole cam — In poker, a hole cam (or pocket cam) is a camera that displays a player s face down cards (known as hole cards ) to television viewers.The hole cam became popular in 1999 when the Late Night Poker program first began using it in televised… … Wikipedia
Security Administrator Tool for Analyzing Networks — The Security Administrator Tool for Analyzing Networks (SATAN) is a testing and reporting toolbox that collects a variety of information about networked hosts and was considered one of the best when written. In fact, it was the first truly user… … Wikipedia
hole-and-corner — adjective Conducted in secret; clandestine. Whatever made you think in the first place that I would give up the security of my happy marriage for a hole and corner affair with you? Syn: cloak and dagger … Wiktionary
security bug — saugumo spraga statusas T sritis informatika apibrėžtis Įrangos defektas, neužkertantis kelio neleidžiamam priėjimui prie joje esančių konfidencialių duomenų arba ↑kompiuterių virusų ir kitų kenkimo programų patekimui į kompiuterį. Programas… … Enciklopedinis kompiuterijos žodynas
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Charlie Miller (security researcher) — For other people named Charles Miller, see Charles Miller (disambiguation). Charles Miller Nationality United States Fields Computer Science … Wikipedia
Domain Name System Security Extensions — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP … Wikipedia
Capability-based security — is a concept in the design of secure computing systems. A capability (known in some systems as a key) is a communicable, unforgeable token of authority. It refers to a value that references an object along with an associated set of access rights … Wikipedia
Digital Transition Content Security Act — The United States The Digital Transition Content Security Act (DTCSA, H.R. 4569) was a bill introduced by House Judiciary Committee Chairman James Sensenbrenner Jr., a Wisconsin Republican, on December 16, 2005. The bill was backed by Democratic… … Wikipedia