German | English |
Angriff durch Einschleusung von SQL-Befehlen | SQL injection attack (An attack that attempts to compromise your database (and potentially the computer on which the database is running) by creating SQL commands that are executed instead of, or in addition to, the commands that you have built into your application) |
Angriff durch Schlüsselsuche | key search attack (An attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered) |
Angriff durch Skripteinschleusung | script injection attack (An attack that attempts to send executable scripts to your application with the intent of having other users run it. A typical script injection attack sends script to a page that stores the script in a database, so that another user who views the data inadvertently runs the code) |
Authentifizierung durch SSL-Clientzertifikatszuordnung | SSL client certificate mapping authentication (A method of authentication where certificates are used on the client and a mapping is made on the server (or possibly on the Active directory domain controller) to determine which client certificates should be allowed access to the site) |
durch das RD-Gateway verwaltete Computergruppe | RD Gateway-managed computer group (A list of network resources (computers) on an internal corporate or private network that users can access through an RD Gateway server. You can configure RD Gateway-managed computer groups by using RD Gateway Manager after installation of the RD Gateway role service) |
durch plumb-Befehl abmelden | unplumb (To destroy any streams linked with a physical or logical interface and close the related device) |
durch Trennzeichen getrennte Datei | comma-delimited file (A data file consisting of fields and records, stored as text, in which the fields are separated from each other by commas) |
durch Trennzeichen getrennte Datei | comma-separated file (A data file consisting of fields and records, stored as text, in which the fields are separated from each other by commas) |
durch Trennzeichen getrennte Datei | comma-separated value file (A data file consisting of fields and records, stored as text, in which the fields are separated from each other by commas) |
durch Trennzeichen getrennte Datei | comma delimited file (A data file consisting of fields and records, stored as text, in which the fields are separated from each other by commas) |
durch Trennzeichen getrennte Flatfile | delimited flat file (A data file that contains one or more records separated by a record delimiter. Each delimited record contains one or more fields separated by a common field delimiter) |
durch Trennzeichen getrennte Textdatei | comma-delimited text file (A data file consisting of fields and records, stored as text, in which the fields are separated from each other by commas) |
durch Trennzeichen getrennte Textdatei | delimited text file (A file containing data where individual field values are separated by a character, such as a comma or a tab) |
Ersetzen durch | Replace with (A UI element below which are listed items. A user can select an item from the list and it will be put in the place of another item) |
Erweiterung durch verwalteten Code | managed code extension (An application-level add-in or document-level customization. Generally, an extension to Microsoft Office that is created by using Visual Studio Tools for Office) |
Karte durch Lesegerät ziehen | swipe (To slide a machine-readable card through a magnetic stripe reader) |
Missbrauch durch Anrufer melden | malicious call reporting (A feature that enables phone users to report disturbing calls to the system administrator. When the user selects to report a malicious call, data from the last call received is captured and sent to the system administrator) |
Problem durch unzureichenden Speicher | low memory problem (A difficulty in computer operation caused by insufficient memory resources) |
Schutz durch Kopie bei Schreibvorgang | copy-on-write page protection (A concept that allows multiple applications to map their virtual address spaces to share the same physical pages, until an application needs to modify the page and have its own instance copy) |
sitzungsbasierte Desktopbereitstellung durch Remotedesktopdienste | Remote Desktop Services session-based desktop deployment (A session-based deployment that allows users to connect to collections that include published RemoteApp programs and session-based desktops) |
Steuerung der Anrufweiterleitung durch den Communicator | Control call forwarding from Communicator (An item the user can select in the Options dialog box, Phones tab. When the user selects this option, Communicator controls automatic forwarding of incoming calls using the call-forwarding settings the user selects) |
Unterbrechung durch Sterntaste | star out (A function that is available to callers when they are dialed into Unified Messaging Auto Attendant but they want to be able to get to Outlook Voice Access to access their e-mail and voice mail. The caller presses the star (*) key per the voice prompt, which takes them to Outlook Voice Access) |
Wiederherstellung durch Endbenutzer | end-user recovery (A feature that enables an end user to independently recover data by retrieving a shadow copy. This feature requires the shadow copy client software) |