DictionaryForumContacts

   Turkmen
Terms containing Açar | all forms | exact matches only
SubjectTurkmenEnglish
comp., MSaçar berijiaccess provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)
comp., MSAçar dolandyryş hyzmatyKey Management Service (An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures)
comp., MSaçar kodyaccess code (A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on)
comp., MSaçar ogrusypassword stealer (A type of Trojan that captures or transmits passwords to an attacker)
comp., MSaçar süzgüjikey filter (A metadata column or field in a Key Filters control)
comp., MSAçar süzgüçleriKey Filters (A metadata navigation control that enables users to limit the items displayed in a list or library to those that match selected values)
comp., MSbaş açarmaster key (The key used by the client and server for all session key generation. The master key is used to generate the client-read key, the client-write key, the server-read key, and the server-write key. Master keys can be exported as simple key BLOBs)
comp., MSbaşlangyç açarprimary key (One or more fields that uniquely identify each record in a table. In the same way that a license plate number identifies a car, the primary key uniquely identifies a record)
comp., MSdoly açarfull access (A privilege on a computer system that allows a user to read, write, and delete data)
comp., MSgizlin açarsecret key (A symmetric encryption key shared by two entities, such as between a user and the domain controller (DC), with a long lifetime. A password is a common example of a secret key. When used in a context that implies Kerberos only, a principal's secret key)
comp., MSInternete açar berijiInternet access provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers)