- Malicious System
- Security: MS
Универсальный русско-английский словарь. Академик.ру. 2011.
Универсальный русско-английский словарь. Академик.ру. 2011.
Malicious Caller Identification — (MCI), also called Malicious Call Trace (MCT) or Caller Activated Malicious Call Trace (CAMCT) is a facility which enables a phone call recipient to mark a phone call as malicious (i.e. harassing, threatening, obscene, etc.) The phone system will … Wikipedia
System Center Data Protection Manager — Developer(s) Microsoft Corporation Stable release DPM 2010 / April 19, 2010; 18 months ago (2010 04 19) Development status Active … Wikipedia
System Rush — is a futuristic racing game for the Nokia N Gage platform. It was released in 2005 and available Worldwide through leading retailers.Infobox VG title = System Rush developer = Ideaworks 3D publisher = Nokia released = 2005 genre = racing game… … Wikipedia
Malicious prosecution — Tort law Part of the … Wikipedia
System Restore — Infobox Software name = System Restore caption = System Restore in Windows Vista SP1 collapsible = author = developer = Microsoft released = latest release version = 6.0.6001 latest release date = February 4, 2008 latest preview version = latest… … Wikipedia
System File Checker — Infobox Software name = System File Checker caption = collapsible = author = developer = Microsoft released = latest release version = latest release date = latest preview version = latest preview date = frequently updated = programming language … Wikipedia
Windows Malicious Software Removal Tool — Malicious Software Removal Tool A screenshot of Malicious Software Removal Tool Developer(s) Mic … Wikipedia
Intrusion-prevention system — An intrusion prevention system is a network security device that monitors network and/or system activities for malicious or unwanted behavior and can react, in real time, to block or prevent those activities. Network based IPS, for example, will… … Wikipedia
Intrusion detection system — An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station.[1] Some systems may attempt to stop … Wikipedia
Intrusion prevention system — Intrusion Prevention Systems (IPS), also known as Intrusion Detection and Prevention Systems (IDPS), are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention… … Wikipedia
Interactive proof system — In computational complexity theory, an interactive proof system is an abstract machine that models computation as the exchange of messages between two parties. The parties, the verifier and the prover, interact by exchanging messages in order to… … Wikipedia