Examples of using Authenticating in English and their translations into French
{-}
-
Official
-
Colloquial
Authenticating and periodically verifying your licensing rights in the product for anti- piracy purposes.
By registering or authenticating the User allows the Application to identify it and give it access to dedicated services.
the attacker can execute code in ring0 without authenticating.
The signature of Parliament's Speaker authenticating a text is often linked to the transmission of this text and constitutes one of the criteria for transmission.
see Signing and Authenticating REST Requests.
Users release print jobs by authenticating themselves at a vPad, typically located close to the designated printers
see Signing and Authenticating REST Requests.
Adding MYDIGIPASS to your site protects your brand by authenticating identities and securing content to assure users your site is secure.
see Authenticating Email with DKIM in Amazon SES.
Various witnesses' statements regarding factual elements of the claim and authenticating certain accounting documents.
see Authenticating Email with DKIM in Amazon SES.
as well as its status(activated or revoked) by authenticating yourself.
will sign the photograph, thus authenticating the collected magazines as an artwork.
Systems increasingly recommend or require signed software in order to have the best integrity guarantee while authenticating malevolent actions Malware, virus.
a system for authenticating users and services on a network.
Increase the chance that your emails will be delivered to your recipients' inboxes instead of junk boxes by authenticating your emails.
After authenticating, the user's stored print jobs are automatically retrieved and displayed.
His visual testimony is enriched by the addition of texts explaining the circumstances surrounding the pictured events and authenticating the pictures' relationship with those events.
There is minimal benefit to encrypting or authenticating raw data that an adversary can readily spoof in the first place.
The Department does not have a procedure for authenticating ICT users,