Local\ Password\ Authentication

Local\ Password\ Authentication
аутентификация локального пароля

Англо-русский cловарь терминов и сокращений по мобильной радиосвязи стандарта GSM. 2013.

Игры ⚽ Нужно сделать НИР?

Смотреть что такое "Local\ Password\ Authentication" в других словарях:

  • Password strength — is a measurement of the effectiveness of a password as an authentication credential. Specifically, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to correctly guess it. The… …   Wikipedia

  • Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… …   Wikipedia

  • Password manager — A password manager is software that helps a user organize passwords and PIN codes. The software typically has a local database or a file that holds the encrypted password data for secure logon onto computers, networks, web sites and application… …   Wikipedia

  • Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… …   Wikipedia

  • Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in …   Wikipedia

  • Basic access authentication — In the context of an HTTP transaction, the basic access authentication is a method designed to allow a web browser, or other client program, to provide credentials ndash; in the form of a user name and password ndash; when making a request.… …   Wikipedia

  • Shadow password — In computing, Unix like operating systems use the shadow password database mechanism to increase the security level of passwords by preventing ordinary users from accessing encrypted password data.Unshadowed passwords On a system without shadowed …   Wikipedia

  • Extensible Authentication Protocol — EAP – Extensible Authentication Protocol RFC 3748 (Request for Comments) ist ein von der Internet Engineering Task Force (IETF) entwickeltes, allgemeines Authentifizierungs Protokoll, das unterschiedliche Authentisierungsverfahren (wie z. B …   Deutsch Wikipedia

  • Graphical identification and authentication — The graphical identification and authentication (GINA) library is a component of some Microsoft Windows operating systems that provides secure authentication and interactive logon services. GINA is a dynamically linked library that is loaded in… …   Wikipedia

  • Privileged password management — Overview= Privileged password management software may be deployed by organizations to secure the passwords for login IDs that have elevated security privileges. This is most often done by periodically changing every such password to a new, random …   Wikipedia

  • Security token — Several types of security tokens with a penny for scale …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»