Глоссарий





Новости переводов

19 апреля, 2024

Translations in furniture production

07 февраля, 2024

Ghostwriting vs. Copywriting

30 января, 2024

Preparing a scientific article for publication in an electronic (online) journal

20 декабря, 2023

Translation and editing of drawings in CAD systems

10 декабря, 2023

About automatic speech recognition

30 ноября, 2023

Translation services for tunneling shields and tunnel construction technologies

22 ноября, 2023

Proofreading of English text



Глоссарии и словари бюро переводов Фларус

Поиск в глоссариях:  

Baiting

Глоссарий терминов по социальной инженерии и информационной безопасности
    A social engineering attack that involves the attacker leaving malware infected portable storage media, such as usb memory sticks, in locations where people will find them. the hope is that the target will insert the usb device into a computer. once this occurs, an executable malware file is triggered to run surreptitiously. for example, keylogger software might be downloaded onto the target’s computer, which transmits login credentials back to the attacker’s command and control centre. the stuxsnet virus was propagated using an infected usb stick which was strategically dropped near an iranian nuclear facility.




Engineering, английский
  1. Инжиниринг. техническая разработка проектов, составление смет, иногда также включает финансовое и экологическое обоснование проектов. так же деятельность по оказанию услуг в этой области

  2. Техника, инженерное дело

  3. Машиностроение; техника

  4. Американское сантехническое общество

  5. Инжиниринг. техническая разработка проектов, составление смет, иногда также включает в себя финансовое и экологическое обоснова- ние проектов. также деятельность по оказанию услуг в этой области.

  6. Инженерия


Executable, английский
  1. A file in portable executable (pe) file format that can be loaded into memory and executed by the operating system loader. it can be either an .exe or a .dll file. in the .net context, a pe file must be translated by the common language runtime into code before it can be executed by the operating system.

  2. A le that can be executed by the operating system.


Credentials, английский
  1. Полномочия; "верительные данные"; мандат (в системах защиты); имя пользователя и пароль

  2. Information that includes identification and proof of identification that is used to gain access to local and network resources. examples of credentials are user names and passwords, smart cards, and certificates.

  3. Полномочия

  4. Certified documents, diplomas

  5. Certified documents, diplomas proof of a person’s earned authority, status, or rights, usually in writing (for example, a university diploma, or proof of passing a professional exam)

  6. These are qualifications or achievements that validate an individual`s competence or suitability for a task or role in the coaching or mentoring field.


Baselining, английский
    Monitoring resource usage (such as email usage) to determine typical usage patterns so that significant deviations can be detected.


Anti-virus software, английский
    Software designed to prevent and detect malware infections. early versions of anti-virus software were signature-based, which meant detection relied on a database of known malware. however, malware and virus authors circumvented these detection methods by using techniques, such as polymorphism (changing code on-the-fly), encryption and obfuscation. as a result, many av companies introduced heuristic-based (behaviour-based) detection into their products. but even this type of detection can be avoided as threats can be programmed to lie dormant or execute inside “safe” applications. the efficacy of anti-virus software is further eroded by the prevalence of so-called zero-day threats in circulation which av software has difficulty detecting. despite these shortcomings, anti-virus still acts as a useful layer of defence against known threats. see also scareware.