trusted host

trusted host
● ►en loc. m. ►COP Hôte certifié, auquel on fait confiance, puisque d'une façon ou d'une autre, on s'est assuré de savoir qui il est et qui est derrière...

Dictionnaire d'informatique francophone. 2013.

Игры ⚽ Нужно решить контрольную?

Regardez d'autres dictionnaires:

  • Trusted Computing Group — Rechtsform Konsortium Gründung 2003[1] Sitz Beaverton (Oregon), USA[2] Website …   Deutsch Wikipedia

  • Host-based intrusion detection system — A host based intrusion detection system (HIDS) is an intrusion detection system that monitors and analyses the internals of a computing system rather than on its external interfaces (as a network based intrusion detection system (NIDS) would do) …   Wikipedia

  • Host Identity Protocol — Das Host Identity Protocol (HIP) ist ein von der IETF standardisiertes Protokoll, welches Benutzern von mobilen Geräten (z. B. Notebooks) den Wechsel zwischen verschiedenen IP Netzwerken (Roaming) erleichtern soll, indem es das hierbei… …   Deutsch Wikipedia

  • The Host (novel) — The Host   …   Wikipedia

  • Dynamic Host Configuration Protocol — DHCP redirects here. For other uses, see DHCP (disambiguation). A DHCP Server settings tab The Dynamic Host Configuration Protocol (DHCP) is a network configuration protocol for hosts on Internet Protocol (IP) networks. Computers that are… …   Wikipedia

  • Distributed firewall — A firewall is system or group of system (router, proxy, or gateway) that implements a set of security rules to enforce access control between two networks to protect inside network from outside network. It may be a hardware device or a software… …   Wikipedia

  • The Daily Show — Also known as The Daily Show with Jon Stewart Genre …   Wikipedia

  • Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… …   Wikipedia

  • Abkürzungen/Computer — Dies ist eine Liste technischer Abkürzungen, die im IT Bereich verwendet werden. A [nach oben] AA Antialiasing AAA authentication, authorization and accounting, siehe Triple A System AAC Advanced Audio Coding AACS …   Deutsch Wikipedia

  • Liste der Abkürzungen (Computer) — Dies ist eine Liste technischer Abkürzungen, die im IT Bereich verwendet werden. A [nach oben] AA Antialiasing AAA authentication, authorization and accounting, siehe Triple A System AAC Advanced Audio Coding AACS …   Deutsch Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”