- time-dependent password
- пароль, действующий в течение ограниченного времени
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Operating system — Operating systems … Wikipedia
Technical features new to Windows Vista — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features … Wikipedia
Port knocking — In networking, port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports. Once a correct sequence of connection attempts is received, the firewall rules are… … Wikipedia
Windows Vista networking technologies — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features … Wikipedia
Keystroke logging — (often called keylogging) is a method of capturing and recording user keystrokes. The technique and name came from before the era of the graphical user interface; loggers nowadays would expect to capture mouse operations too. Keylogging can be… … Wikipedia
Mobile banking — Part of a series on Electronic commerce Online goods and services Streaming media Electronic books Softw … Wikipedia
Timing attack — In cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. The attack exploits the fact that every operation in a computer … Wikipedia
Fort Boyard (TV series) — Fort Boyard is a French game show created by Jacques Antoine, that was first broadcast in 1990 (as Les Clés de Fort Boyard , shortened for the second series in 1991) and is popular to this day. It has been remade across the globe, most… … Wikipedia
biblical literature — Introduction four bodies of written works: the Old Testament writings according to the Hebrew canon; intertestamental works, including the Old Testament Apocrypha; the New Testament writings; and the New Testament Apocrypha. The Old… … Universalium
Mega Man 2 — This article is about the Nintendo Entertainment System and the Famicom game. For the Game Boy game, see Mega Man II (Game Boy). Mega Man 2 … Wikipedia
Unix security — Unix security: maintaining a secure environment on Unix and Unix like operating systems is dependent on design concepts of these operating systems, but vigilance through user and administrative techniques is important to maintain security… … Wikipedia