Examples of using Security rules in English and their translations into Greek
{-}
-
Official
-
Colloquial
-
Medicine
-
Ecclesiastic
-
Financial
-
Official/political
-
Computer
Why have the Council' s security rules been published and not the Commission' s?
Additionally, connection security rules are used to enforce the Network Access Protection(NAP) policy.
(j)adopt the security rules of the Agency as referred to in Article 96;
strictly observe security rules.
Remote access to the application based on system security rules.
The passenger violates the security rules of the airline, the air carrier and/or the airport.
I call on Member States to ensure that the EU security rules are enforced and our citizens better protected.”.
For more information about IPsec and connection security rules, visit the following Microsoft Web site.
any shortcomings in applying security rules, operational functions must be segregated from security accreditation functions.
According to security rules, your account address
Aquino appealed to Filipinos to follow security rules after two people were killed in a stampede during a religious procession on Friday.”.
Create connection security rules that force other computers attempting to communicate with yours to use different types of authentication protocols to establish their identity.
A little pre-planning and understanding of both security rules and your right to privacy can help you avoid problems in transit
The European Commission has asked Germany to correctly apply the EU port security rules(Directive 2005/65/EC)
Here, scroll at the end of the security rules, and change from deny to allow for the rule H/app. server/S/3200.
All of our vehicles follow strict security rules and receive extensive technical checks ahead of every excursion or transfer.
They found many users do not know basic security rules when making online payments
Keeping stringent security rules and business continuity plans increases business performance
This section describes the syntax for using the Netsh advfirewall command to add and to modify connection security rules.
Actions which do not comply with security rules may be rejected or terminated at any time.