- impersonate the user
- выдавать себя за (законного) пользователя, маскироваться под (законного) пользователя
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
The Pirate Bay — Infobox Website name = The Pirate Bay logo = caption = The World s Largest BitTorrent Tracker url = http://thepiratebay.org/ type = Torrent index registration = Free owner = Gottfrid Svartholm, Fredrik Neij, Peter Sunde author = Gottfrid… … Wikipedia
Soul Nomad & the World Eaters — Developer(s) Nippon Ichi Publisher(s) … Wikipedia
Man-in-the-middle attack — Not to be confused with Meet in the middle attack. In cryptography, the man in the middle attack (often abbreviated MITM), bucket brigade attack, or sometimes Janus attack, is a form of active eavesdropping in which the attacker makes independent … Wikipedia
Conan the Adventurer (animated series) — This article is about the cartoon. For the live action television series, see Conan the Adventurer (TV series). Conan the Adventurer Conan the Adventurer logo, featuring Jezmine, Snagg, Needle, Greywolf and Zula Genre … Wikipedia
List of characters in the Mega Man Battle Network series — The following is a list characters from both the Mega Man Battle Network series of video games, and the MegaMan NT Warrior ( Rockman EXE ) anime and manga. For brevity, only human characters and programs are listed here. For their NetNavi… … Wikipedia
List of minor characters in Saved by the Bell — Below is a list of minor characters from the TV show Saved by the Bell , many of whom only appeared in one or two episodes.Lieutenant Chet AdamsPlayed by Cylk Cozart, Lieutenant Chet Adams appeared in season two during the episode Zack s War as… … Wikipedia
List of Saved by the Bell characters — Below is a list of characters from the TV show Saved by the Bell. Contents 1 Main characters 1.1 Zack Morris 1.2 Kelly Kapowski 1.3 Samuel Screech Powers … Wikipedia
Session hijacking — The term session hijacking refers to the exploitation of a valid computer session sometimes also called a session key to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of… … Wikipedia
List of Married... with Children episodes — The following is an episode list for the Fox sitcom Married... with Children. The series aired its pilot on April 5, 1987[1] and its series finale aired on June 9, 1997 with the episodes The Desperate Half Hour (Part 1) and How to Marry a Moron… … Wikipedia
cryptology — cryptologist, n. cryptologic /krip tl oj ik/, cryptological, adj. /krip tol euh jee/, n. 1. cryptography. 2. the science and study of cryptanalysis and cryptography. [1635 45; < NL cryptologia. See CRYPTO , LOGY] * * * Introduction … Universalium
HTTP cookie — HTTP Persistence · Compression · HTTPS Request methods OPTIONS · GET · HEAD · POST · PUT · DELETE · TRACE · CONNECT Header fields Cookie · ETag · Location · Referer DNT · … Wikipedia