security hole

security hole
брешь в системе безопасности
см. тж. security

Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. . 1998-2007.

Игры ⚽ Нужна курсовая?

Смотреть что такое "security hole" в других словарях:

  • Hole punching — is a computer networking technique for establishing communications between two parties in separate organizations who are both behind restrictive firewalls. Used for applications such as online gaming, P2P and VoIP, both clients establish a… …   Wikipedia

  • Security of Advanced Access Content System — The security of Advanced Access Content System has a subject of discussion amongst security researchers, high definition video enthusiasts, and consumers at large since its inception. A successor to Content Scramble System, the digital rights… …   Wikipedia

  • Hole cam — In poker, a hole cam (or pocket cam) is a camera that displays a player s face down cards (known as hole cards ) to television viewers.The hole cam became popular in 1999 when the Late Night Poker program first began using it in televised… …   Wikipedia

  • Security Administrator Tool for Analyzing Networks — The Security Administrator Tool for Analyzing Networks (SATAN) is a testing and reporting toolbox that collects a variety of information about networked hosts and was considered one of the best when written. In fact, it was the first truly user… …   Wikipedia

  • hole-and-corner — adjective Conducted in secret; clandestine. Whatever made you think in the first place that I would give up the security of my happy marriage for a hole and corner affair with you? Syn: cloak and dagger …   Wiktionary

  • security bug — saugumo spraga statusas T sritis informatika apibrėžtis Įrangos defektas, neužkertantis kelio neleidžiamam priėjimui prie joje esančių konfidencialių duomenų arba ↑kompiuterių virusų ir kitų kenkimo programų patekimui į kompiuterį. Programas… …   Enciklopedinis kompiuterijos žodynas

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • Charlie Miller (security researcher) — For other people named Charles Miller, see Charles Miller (disambiguation). Charles Miller Nationality United States Fields Computer Science …   Wikipedia

  • Domain Name System Security Extensions — Internet protocol suite Application layer BGP DHCP DNS FTP HTTP …   Wikipedia

  • Capability-based security — is a concept in the design of secure computing systems. A capability (known in some systems as a key) is a communicable, unforgeable token of authority. It refers to a value that references an object along with an associated set of access rights …   Wikipedia

  • Digital Transition Content Security Act — The United States The Digital Transition Content Security Act (DTCSA, H.R. 4569) was a bill introduced by House Judiciary Committee Chairman James Sensenbrenner Jr., a Wisconsin Republican, on December 16, 2005. The bill was backed by Democratic… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»