- most trusted user
- самый полномочный пользователь
Англо-русский словарь промышленной и научной лексики. 2014.
Англо-русский словарь промышленной и научной лексики. 2014.
Trusted system — In the security engineering subspecialty of computer science, a trusted system is a system that is relied upon to a specified extent to enforce a specified security policy. As such, a trusted system is one whose failure may break a specified… … Wikipedia
Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… … Wikipedia
Power user — A power user is a user of a personal computer who can use advanced features of programs which are outside the expertise of normal users, yet is not capable of advanced, non application oriented tasks like programming and may or may not be capable … Wikipedia
Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… … Wikipedia
Ring (computer security) — In computer science, hierarchical protection domains, [Paul A. Karger, Andrew J. Herbert, [http://doi.ieeecomputersociety.org/10.1109/SP.1984.10001 An Augmented Capability Architecture to Support Lattice Security and Traceability of Access] , sp … Wikipedia
XTS-400 — Infobox OS name = XTS 400 website = [http://www.baesystems.com/ProductsServices/bae prod csit xts400.html www.baesystems.com] developer = BAE Systems source model = Closed source latest release version = 6.5 latest release date = August 2008… … Wikipedia
Virtual private network — A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The link layer protocols… … Wikipedia
Hewlett-Packard — Coordinates: 37°24′49″N 122°08′42″W / 37.413579°N 122.14508°W / 37.413579; 122.14508 HP red … Wikipedia
List of Tenjho Tenge characters — This is a character guide to the manga and anime series Tenjho Tenge. Contents 1 Jyuken Club 2 Executive Council 3 F 4 Supporting characters … Wikipedia
Orcus (Dungeons & Dragons) — Orcus Game background Title(s) Prince of the Undead, Prince of Undeath, The Blood Lord Home plane Abyss Power level Demon lord Alignment … Wikipedia
Linux — This article is about operating systems that use the Linux kernel. For the kernel itself, see Linux kernel. For other uses, see Linux (disambiguation). Linux … Wikipedia