- eavesdropping connection
- подключение (присоединение) для подслушивания
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
CopSSH — Stable release 4.2.1 / October 18, 2011; 32 days ago (2011 10 18) Development status Active Operating system Windows Typ … Wikipedia
Telephone tapping — Wiretap redirects here. For the radio program, see WireTap (radio program). Telephone tapping (also wire tapping or wiretapping in American English) is the monitoring of telephone and Internet conversations by a third party, often by covert means … Wikipedia
Bluetooth — This article is about the electronic protocol. For the medieval King of Denmark, see Harald I of Denmark. Bluetooth logo Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength … Wikipedia
Foreign Intelligence Surveillance Act — The Foreign Intelligence Surveillance Act of 1978 ( FISA USStatute|95|511|92|1783|1978|10|25, usctc|50|36) is an Act of Congress which prescribes procedures for the physical and electronic surveillance and collection of foreign intelligence… … Wikipedia
Cordless telephone — A cordless telephone with base. A cordless telephone or portable telephone is a telephone with a wireless handset that communicates via radio waves with a base station connected to a fixed telephone line, usually within a limited range of its… … Wikipedia
Proxy server — For Wikipedia s policy on editing from open proxies, please see Wikipedia:Open proxies. Communication between two computers (shown in grey) connected through a third computer (shown in red) acting as a proxy. In … Wikipedia
Computer security compromised by hardware failure — is a branch of computer security applied to hardware. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible … Wikipedia
Computer surveillance — This article is about surreptitious monitoring of computer activity. For information on methods of preventing unauthorized access to computer data, see computer security. Computer surveillance is the act of performing surveillance of computer… … Wikipedia
HTTP cookie — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia
Van Eck phreaking — is the process of eavesdropping on the contents of a CRT display by detecting its electromagnetic emissions. It is named after Dutch computer researcher Wim van Eck, who in 1985 published the first paper on it, including proof of concept.cite… … Wikipedia
United States — a republic in the N Western Hemisphere comprising 48 conterminous states, the District of Columbia, and Alaska in North America, and Hawaii in the N Pacific. 267,954,767; conterminous United States, 3,022,387 sq. mi. (7,827,982 sq. km); with… … Universalium