Eksempler på bruk av Malicious users på Engelsk og deres oversettelse til Norsk
{-}
-
Colloquial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
also to keep malicious users from taking control of your system.
Furthermore, an internet time source can only be accessed through a network firewall so a UDP port has to be kept open providing a possible entrance for software nasties or malicious users.
also with security as malicious users can imitate the NTP time signal and penetrate the firewall.
More importantly, however, is that internet based NTP servers are external to a network's firewall so any regular communication with a NTP server will require the firewall port to be left open allowing easy access for malicious users to take advantage of.
worst-of-all, the entire network could be vulnerable to malicious users and even fraudsters.
However, these features will not prevent a malicious user from making unwanted design changes to your database.
Fixed a bug where for select boxes having non-numerical indices, a malicious user could submit other values than those defined when creating the form;
In general, longer keys are more difficult for a malicious user to break than shorter keys.
This will mean the network firewall will intrinsically have a hole in it which could be manipulated y a malicious user or aggressive malware.
There is no chance your broker will label you as a scalper or some other malicious user.
Gamer should just cut them with his sword, so that no malicious user does not touch the scaly girl.
is sending you spam, it's possible that a malicious user has compromised their account.
A security vulnerability results because it could be possible for a malicious user to attempt to exploit these flaws and execute code in the security context of the logged-on user. .
These buffer overruns may cause a security vulnerability because a malicious user could try to exploit these flaws and run code in the security context of the logged on user. .
If this setting is enabled, a malicious user could use the well-known Administrators SID to obtain the real name of the built-in Administrator account,
Malicious users can then intercept this information.
This protects you from potential eavesdropping by malicious users. If you…?
transferring data to malicious users;
It helps guard your computer against malicious users and against many computer viruses and worms.
An Internet based UTC source is external to the firewall so will leave a potential hole for malicious users to exploit.