Subject | Turkmen | English |
comp., MS | açar beriji | access provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |
comp., MS | Açar dolandyryş hyzmaty | Key Management Service (An optional Microsoft Exchange 2000 Server component that is installed on a designated server in an administrative group. It provides centralized administration and archival of private keys, and maintains every user s private encryption key in an encrypted database. The keys are used for encrypting e-mail messages and signing messages with digital signatures) |
comp., MS | açar kody | access code (A string of characters entered by a user to verify his or her identity to a network or to a local computer, device, or client, or to sign in to an account, app, and so on) |
comp., MS | açar ogrusy | password stealer (A type of Trojan that captures or transmits passwords to an attacker) |
comp., MS | açar süzgüji | key filter (A metadata column or field in a Key Filters control) |
comp., MS | Açar süzgüçleri | Key Filters (A metadata navigation control that enables users to limit the items displayed in a list or library to those that match selected values) |
comp., MS | baş açar | master key (The key used by the client and server for all session key generation. The master key is used to generate the client-read key, the client-write key, the server-read key, and the server-write key. Master keys can be exported as simple key BLOBs) |
comp., MS | başlangyç açar | primary key (One or more fields that uniquely identify each record in a table. In the same way that a license plate number identifies a car, the primary key uniquely identifies a record) |
comp., MS | doly açar | full access (A privilege on a computer system that allows a user to read, write, and delete data) |
comp., MS | gizlin açar | secret key (A symmetric encryption key shared by two entities, such as between a user and the domain controller (DC), with a long lifetime. A password is a common example of a secret key. When used in a context that implies Kerberos only, a principal's secret key) |
comp., MS | Internete açar beriji | Internet access provider (A business that supplies Internet connectivity services to individuals, businesses, and other organizations. An ISP provides a telephone number, a user name, a password, and other connection information so that users can access the Internet through the ISP's computers) |