Examples of using To gain unauthorized access in English and their translations into Slovak
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
Tries to gain unauthorized access to the Site, its computers
You must not attempt to gain unauthorized access to the Sites, the server on which our Sites are stored or any server,
Attempt to gain unauthorized access to computer systems owned
Tries to gain unauthorized access to the Websites, their computers
must not attempt to gain unauthorized access.
attempts to deliver any destructive code to this Website or attempts to gain unauthorized access to any page on or part of this Website.
suggesting that the page warning that TrueCrypt isn't safe wasn't a hoax posted by hackers who managed to gain unauthorized access.
must not attempt to gain unauthorized access.
attempts to deliver any destructive code to this web site or attempts to gain unauthorized access to any page on this web site.
You must not attempt to gain unauthorized access to our website, the server on which our website is stored
Attempt to gain unauthorized access to our computer systems
You must not attempt to gain unauthorized access to the Site, the server on which our site is stored
You may not attempt to gain unauthorized access to any Services, other accounts,
(vi) you agree not to interfere with, disrupt or attempt to gain unauthorized access to the servers or networks connected to the Services
it involves System Administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crack able passwords.
involves system administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords.
it involves System Administration privileges), to gain unauthorized access to a system, or as a preventive measure by system administrators to check for easily crackable passwords.
but it involves System Administration privileges), to gain unauthorized access to a system, or to act as a preventive measure whereby system administrators check for easily crackable passwords.
unknown to the Grand Jury(collectively the'Conspirators'), to gain unauthorized access(to'hack') into the computers of U.S. persons