angielsko » arabski

Tłumaczenia dla hasła „authentication“ w angielsko » arabski słowniku (Przełącz na arabsko » angielski)

authentication <an authentication; authentications> RZ.

authentication
authentication INF.
authentication INF.
authentication INF.
authentication INF.
authentication INF.
authentication INF.

authentication

authentication

Anonymous authentication RZ. INF.

authentication data RZ. INF.

authentication database RZ. INF.

authentication method RZ.

authentication method INF.
authentication method INF.

authentication option RZ. INF.

authentication page RZ. INF.

authentication page

authentication service RZ. INF.

authentication set RZ. INF.

authentication set

authentication ticket INF.

Basic authentication RZ. INF.

certificate authentication RZ. INF.

delegated authentication RZ. INF.

Digest authentication RZ. INF.

Digest authentication

flexible authentication RZ. INF.

flexible authentication

password authentication RZ. INF.

plaintext authentication RZ. INF.

pluggable authentication RZ. INF.

proxy authentication RZ. INF.

Przykłady jednojęzyczne (niezredagowane i niesprawdzone przez PONS)

angielski
Some servers or devices that have an authentication system, have default usernames and passwords.
en.wikipedia.org
This property can be used to break naive authentication schemes based on hash functions.
en.wikipedia.org
In general, all compromised authentication material (such as passwords) must be replaced.
en.wikipedia.org
During the regular interaction between a client and a server, the only requests related to authentication are about the "host-based access method".
en.wikipedia.org
A captive portal is used for a variety of functions including, billing or authentication and acceptance of terms and conditions.
en.wikipedia.org
Stolen tokens can be made useless by using two factor authentication.
en.wikipedia.org
For instance, a bare encryption algorithm will provide no authentication mechanism, nor any explicit message integrity checking.
en.wikipedia.org
These are things like weaknesses in protocols, authentication strategies, and system modularization.
en.wikipedia.org
The device contains a password which is physically hidden (not visible to the possessor), but which is transmitted for each authentication.
en.wikipedia.org
Inside the token is an accurate clock that has been synchronized with the clock on the proprietary authentication server.
en.wikipedia.org

Interfejs: Deutsch | English | Español | Français | Italiano | Polski