Глоссарий





Новости переводов

19 апреля, 2024

Translations in furniture production

07 февраля, 2024

Ghostwriting vs. Copywriting

30 января, 2024

Preparing a scientific article for publication in an electronic (online) journal

20 декабря, 2023

Translation and editing of drawings in CAD systems

10 декабря, 2023

About automatic speech recognition

30 ноября, 2023

Translation services for tunneling shields and tunnel construction technologies

22 ноября, 2023

Proofreading of English text



Глоссарии и словари бюро переводов Фларус

Поиск в глоссариях:  

Watering hole attack

Глоссарий терминов по социальной инженерии и информационной безопасности
    The targeting of a website used by a specific group of users. for example, if an attacker wanted to attack an airline, they might insert malware into an aviation website, such as pprune.org, which is a website frequented by airline staff. if, for example, the target inadvertently downloads credential harvesting software from this site, it could easily lead to an airline’s network being compromised. in 2017, the polish financial supervision authority’s website was infected with code which would trigger the download of malware onto the users’ computers. this malware was squarely targeted at those working in the polish financial sector.




Harvesting, английский
    Removing merchantable trees (contrasts with cuttings, which remove immature trees) (17).


Compromised, английский

Supervision, английский
  1. The observation and inspection of construction work in order to ensure conformity with the contract documents; direction of the work, 1 by contractor’s personnel. supervision is neither a duty nor a responsibility of the architect as part of his basic professional services.

  2. Management or organisation  elderly patients need constant supervision.  the sheltered housing is under the supervision of a full-time nurse.

  3. Технический надзор [контроль] ~ of safety sites надзор за техникой безопасности на стройплощадках

  4. Технический надзор (при реализации проекта)

  5. The act of oversight regarding the work or tasks of coaches/mentors, often to ensure standards are met and to provide support and feedback.


Whitelisting, английский
    As traditional anti-virus software only relies on signature-based definitions or heuristics, there is always the risk that a zero-day threat will infect a system. to mitigate against this risk, application whitelisting can be used. this method protects computing devices by allowing only trusted applications to run. however, the administration of whitelisting controls can be resource intensive when operating systems or applications are patched. whitelisting is also commonly used to prevent unauthorised storage devices from being used on end-point devices.


Vishing, английский
    A social engineering scam in which confidential information (such as credit card information) is extracted from a target over the telephone for financial gain. a common vishing scam involves an attacker who uses the guise of a technical support employee to call the victim and inform them that they have a serious problem with their computer which needs to be resolved. thereafter, the victim is asked for sensitive information, such as their credit card details.other pretexts used during vishing scams include calls from broadband companies about “outstanding balances” and calls from your bank’s “fraud department” about a fraud that has occurred on your account and which needs to be “urgently resolved”. vishing scams can have surprisingly high success rates as an authentic call-centre environment is often used along with spoofed phone numbers, which appear to be local or familiar to the victim. also, the victim’s logical judgement gets impaired by a huge sense of urgency that is imposed on the victim by the fraudster. vishing is often used in conjunction with a phishing email as any story becomes more credible if it comes from more than one source.