sin ejemplosSe encuentra en 3 diccionarios
El diccionario universal inglés-ruso- It is intended for a full-text search and it significantly expands the possibilities of working with lexical items from the Russian glossary of LingvoUniversal. Contains usage examples, synonyms, and antonyms.
- It is intended for a full-text search and it significantly expands the possibilities of working with lexical items from the Russian glossary of LingvoUniversal. Contains usage examples, synonyms, and antonyms.
authenticate
[ɔː'θentɪkeɪt]
гл.
заверять, свидетельствовать, подтверждать, удостоверять
устанавливать подлинность
Law (En-Ru)
authenticate
удостоверять, (за)свидетельствовать подлинность; устанавливать соответствие оригиналу
Recibe acceso a todos los diccionarios temáticos gratuitos
Ejemplos de los textos
Because of this, a hacker can easily identify the SSID within the beacon frame and authenticate with the wireless network.Поэтому хакер может легко обнаружить SSID в маячковом фрейме и аутентифицироваться в беспроводной сети.Geier, Jim / Wireless Networks first-stepГейер, Джим / Беспроводные сети. Первый шагБеспроводные сети. Первый шагГейер, Джим© Издательский дом "Вильямс", 2005© Cisco Systems, Inc., 2005Wireless Networks first-stepGeier, Jim© 2005 Cisco Systems, Inc.
When you use LDP, you must walk through a few steps to bind (authenticate) and set up to view the directory tree.Перед использованием LDP придется выполнить несколько операций по привязке (аутентификации) и настройке просмотра дерева каталога.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
This is especially useful in large 802.1x implementations where wireless connections are using certificates to authenticate via IAS/RADIUS to gain access to an internal network.Это особенно полезно в крупномасштабных реализациях сетей 802.1х, где беспроводные подключения используют сертификаты для аутентификации через IAS/RADIUS и получения доступа к внутренней сети.Morimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed / Microsoft® Windows® Server 2003 Insider SolutionsМаримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд / Microsoft® Windows® Server 2003: решения экспертовMicrosoft® Windows® Server 2003: решения экспертовМаримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд© 2004 SAMS Publishing© Перевод «ИД КУДИЦ-ОБРАЗ», 2005© Русское издание опубликовано издательством КУДИЦ-ОБРАЗ, 2005.Microsoft® Windows® Server 2003 Insider SolutionsMorimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed© 2004 by Sams Publishing
"What if Bishop Wise can authenticate the text, but raises a question on the parchment or the ink?– А если Вайс установит подлинность текста, но поднимет вопрос о пергаменте и чернилах?Simak, Clifford D. / The Fellowship of the TalismanСаймак, Клиффорд Д. / Братство ТалисманаБратство ТалисманаСаймак, Клиффорд Д.© 1978 by Clifford D. Simak© Перевод. К. Королев, 2005The Fellowship of the TalismanSimak, Clifford D.© 1978 by Clifford D. Simak
A variant on the idea of keeping UIDs and GIDs synchronized is to use an outside server to authenticate users on both the client and server.Обеспечить синхронизацию UID и GID можно, используя отдельный сервер для аутентификации пользователей как на клиентских компьютерах, так и на сервере NFS.Smith, Roderick W. / Advanced Linux NetworkingСмит, Родерик В. / Сетевые средства LinuxСетевые средства LinuxСмит, Родерик В.© Издательский дом "Вильямс", 2003© 2002 by Pearson Education, Inc.Advanced Linux NetworkingSmith, Roderick W.© 2002 by Pearson Education, Inc.
After gradm has been installed, the first thing you'll want to do is create a password that gradm will use to authenticate itself to the kernel.После установки утилиты необходимо создать пароль для идентификации в ядре.Lockhart, Andrew / Network Security HacksЛокхарт, Эндрю / Антихакинг в сети. Трюки.Антихакинг в сети. Трюки.Локхарт, Эндрю© 2004 O'Reilly Media, Inc.© Издание на русском языке ЗАО Издательский дом «Питер», 2005© Перевод на русский язык ЗАО Издательский дом «Питер», 2005Network Security HacksLockhart, Andrew© 2004 O'Reilly Media, Inc.
When you log on for the first time following Setup, the system prompts you to authenticate with web services.При первой регистрации после завершения установки система предлагает пройти аутентификацию для работы с Web-службами.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
This can be a good way to help lock down access to your server, as inbound users will authenticate against the database (and therefore not require an actual shell account on the server).Он является хорошим вариантом блокировки доступа к серверу, когда прибывающие пользователи идентифицируются в отношении базы данных (и, следовательно, не требуют наличия действительной учетной записи на сервере).Lockhart, Andrew / Network Security HacksЛокхарт, Эндрю / Антихакинг в сети. Трюки.Антихакинг в сети. Трюки.Локхарт, Эндрю© 2004 O'Reilly Media, Inc.© Издание на русском языке ЗАО Издательский дом «Питер», 2005© Перевод на русский язык ЗАО Издательский дом «Питер», 2005Network Security HacksLockhart, Andrew© 2004 O'Reilly Media, Inc.
When an application needs to authenticate a user, it calls the appropriate function, and the PAM subsystem handles the request.Когда приложению необходимо идентифицировать пользователя, оно обращается к соответствующей функции, и подсистема РАМ обрабатывает запрос.Allen, David,Scott, Andrew,Lewis, Herb,Stile, John,Tuck, Tim / Windows to Linux Migration ToolkitАллен, Дэвид,Скотт, Эндрю,Льюис, Герберт,Стайл, Джон,Такк, Тимоти / Переход с Windows на LinuxПереход с Windows на LinuxАллен, Дэвид,Скотт, Эндрю,Льюис, Герберт,Стайл, Джон,Такк, Тимоти© 2004 by Syncress Publishing, Inc.© Перевод на русский язык, «БХВ-Петербург» 2005Windows to Linux Migration ToolkitAllen, David,Scott, Andrew,Lewis, Herb,Stile, John,Tuck, Tim© 2004 by Syngress Publishing, Inc.
In this way if the entire network went to hell in a handbasket, users would still be able to authenticate to get to resources.В этом случае даже если вся сеть внезапно откажет, пользователи все равно смогут пройти аутентификацию и получить доступ к ресурсам.Morimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed / Microsoft® Windows® Server 2003 Insider SolutionsМаримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд / Microsoft® Windows® Server 2003: решения экспертовMicrosoft® Windows® Server 2003: решения экспертовМаримото, Рэнд,Аббат, Эндрю,Ковач, Эрик,Робертс, Эд© 2004 SAMS Publishing© Перевод «ИД КУДИЦ-ОБРАЗ», 2005© Русское издание опубликовано издательством КУДИЦ-ОБРАЗ, 2005.Microsoft® Windows® Server 2003 Insider SolutionsMorimoto, Rand H.,Abbate, Andrew,Kovach, Eric,Roberts, Ed© 2004 by Sams Publishing
This means that you can use a custom class loader to authenticate the user of the class or to ensure that a program has been paid for before it will be allowed to run.Это значит, что для аутентификации пользователя класса или для проверки того, что программа оплачена до ее запуска, можно применять пользовательский загрузчик классов.Horstmann, Cay S.,Cornell, Gary / Core Java™ 2. Volume II - Advanced FeaturesХорстманн, Кей С.,Корнелл, Гари / Java 2. Том II. Тонкости программированияJava 2. Том II. Тонкости программированияХорстманн, Кей С.,Корнелл, Гари© Издательский дом "Вильямc", 2002© Prentice Hall, Inc., 2002Core Java™ 2. Volume II - Advanced FeaturesHorstmann, Cay S.,Cornell, Gary© 2002 Sun Microsystems, Inc.
A modern Windows computer that belongs to a Mixed domain will always authenticate with an Active Directory-based domain controller if one is available.Компьютеры под управлением современных операционных систем Windows, которые входят в домен, работающий в режиме Windows 2000 Mixed, всегда проходят аутентификацию на контроллере домена Active Directory, если такой контроллер домена доступен.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
You can store your username and password in the credentials cache and use them to automatically authenticate when reconnecting to the target server.Имя и пароль можно хранить в кэше регистрационных данных и воспользоваться ими для автоматической регистрации при подключении к интересующему серверу.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
WPA uses mathematical algorithms to authenticate users to the network.WPA использует математический алгоритм для аутентификацию пользователей сети.Geier, Jim / Wireless Networks first-stepГейер, Джим / Беспроводные сети. Первый шагБеспроводные сети. Первый шагГейер, Джим© Издательский дом "Вильямс", 2005© Cisco Systems, Inc., 2005Wireless Networks first-stepGeier, Jim© 2005 Cisco Systems, Inc.
Multipart usernames are recognized by MITv5 Kerberos, so a UNIX/Linux administrator might attempt to authenticate as jane/admin .Реализация MITV5 Kerberos распознает составные имена, поэтому администраторы UNIX/Linux могут попытаться пройти аутентификацию, как jane /admin.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
Traducciones de usuarios
Categoría gramatical no está fijada
- 1.
аутентифицировать
Traducción agregada por foreforever1 foreforever1Bronce en-ru - 2.
подтвердить подлинность
Traducción agregada por foreforever1 foreforever1Bronce en-ru - 3.
авторизовать
Traducción agregada por foreforever1 foreforever1Bronce ru-en - 4.
удостоверять
Traducción agregada por foreforever1 foreforever1Bronce en-ru - 5.
идентифицировать
Traducción agregada por foreforever1 foreforever1Bronce en-ru
Expresiones
to authenticate
визировать
authenticate a copy
заверять копию
authenticated copy
заверенная копия
duly authenticated
удостоверенный надлежащим образом
self-authenticating
"самосвидетельствующий"
self-authenticating
не требующий засвидетельствования
authenticated copy
заверенная копня
authenticated copy
заверенный экземпляр
authenticated copy
засвидетельствованная копия
notarially authenticated
нотариально оформленный
notarially authenticated transaction
нотариально удостоверенная сделка
notarially authenticated
нотариально удостоверенный
authenticated signature
удостоверенная подпись
officially authenticated
официально удостоверенный
authenticated user
аутентифицированный пользователь
Forma de la palabra
authenticate
verb
| Basic forms | |
|---|---|
| Past | authenticated |
| Imperative | authenticate |
| Present Participle (Participle I) | authenticating |
| Past Participle (Participle II) | authenticated |
| Present Indefinite, Active Voice | |
|---|---|
| I authenticate | we authenticate |
| you authenticate | you authenticate |
| he/she/it authenticates | they authenticate |
| Present Continuous, Active Voice | |
|---|---|
| I am authenticating | we are authenticating |
| you are authenticating | you are authenticating |
| he/she/it is authenticating | they are authenticating |
| Present Perfect, Active Voice | |
|---|---|
| I have authenticated | we have authenticated |
| you have authenticated | you have authenticated |
| he/she/it has authenticated | they have authenticated |
| Present Perfect Continuous, Active Voice | |
|---|---|
| I have been authenticating | we have been authenticating |
| you have been authenticating | you have been authenticating |
| he/she/it has been authenticating | they have been authenticating |
| Past Indefinite, Active Voice | |
|---|---|
| I authenticated | we authenticated |
| you authenticated | you authenticated |
| he/she/it authenticated | they authenticated |
| Past Continuous, Active Voice | |
|---|---|
| I was authenticating | we were authenticating |
| you were authenticating | you were authenticating |
| he/she/it was authenticating | they were authenticating |
| Past Perfect, Active Voice | |
|---|---|
| I had authenticated | we had authenticated |
| you had authenticated | you had authenticated |
| he/she/it had authenticated | they had authenticated |
| Past Perfect Continuous, Active Voice | |
|---|---|
| I had been authenticating | we had been authenticating |
| you had been authenticating | you had been authenticating |
| he/she/it had been authenticating | they had been authenticating |
| Future Indefinite, Active Voice | |
|---|---|
| I shall/will authenticate | we shall/will authenticate |
| you will authenticate | you will authenticate |
| he/she/it will authenticate | they will authenticate |
| Future Continuous, Active Voice | |
|---|---|
| I shall/will be authenticating | we shall/will be authenticating |
| you will be authenticating | you will be authenticating |
| he/she/it will be authenticating | they will be authenticating |
| Future Perfect, Active Voice | |
|---|---|
| I shall/will have authenticated | we shall/will have authenticated |
| you will have authenticated | you will have authenticated |
| he/she/it will have authenticated | they will have authenticated |
| Future Perfect Continuous, Active Voice | |
|---|---|
| I shall/will have been authenticating | we shall/will have been authenticating |
| you will have been authenticating | you will have been authenticating |
| he/she/it will have been authenticating | they will have been authenticating |
| Future in the Past Indefinite, Active Voice | |
|---|---|
| I should/would authenticate | we should/would authenticate |
| you would authenticate | you would authenticate |
| he/she/it would authenticate | they would authenticate |
| Future in the Past Continuous, Active Voice | |
|---|---|
| I should/would be authenticating | we should/would be authenticating |
| you would be authenticating | you would be authenticating |
| he/she/it would be authenticating | they would be authenticating |
| Future in the Past Perfect, Active Voice | |
|---|---|
| I should/would have authenticated | we should/would have authenticated |
| you would have authenticated | you would have authenticated |
| he/she/it would have authenticated | they would have authenticated |
| Future in the Past Perfect Continuous, Active Voice | |
|---|---|
| I should/would have been authenticating | we should/would have been authenticating |
| you would have been authenticating | you would have been authenticating |
| he/she/it would have been authenticating | they would have been authenticating |
| Present Indefinite, Passive Voice | |
|---|---|
| I am authenticated | we are authenticated |
| you are authenticated | you are authenticated |
| he/she/it is authenticated | they are authenticated |
| Present Continuous, Passive Voice | |
|---|---|
| I am being authenticated | we are being authenticated |
| you are being authenticated | you are being authenticated |
| he/she/it is being authenticated | they are being authenticated |
| Present Perfect, Passive Voice | |
|---|---|
| I have been authenticated | we have been authenticated |
| you have been authenticated | you have been authenticated |
| he/she/it has been authenticated | they have been authenticated |
| Past Indefinite, Passive Voice | |
|---|---|
| I was authenticated | we were authenticated |
| you were authenticated | you were authenticated |
| he/she/it was authenticated | they were authenticated |
| Past Continuous, Passive Voice | |
|---|---|
| I was being authenticated | we were being authenticated |
| you were being authenticated | you were being authenticated |
| he/she/it was being authenticated | they were being authenticated |
| Past Perfect, Passive Voice | |
|---|---|
| I had been authenticated | we had been authenticated |
| you had been authenticated | you had been authenticated |
| he/she/it had been authenticated | they had been authenticated |
| Future Indefinite, Passive Voice | |
|---|---|
| I shall/will be authenticated | we shall/will be authenticated |
| you will be authenticated | you will be authenticated |
| he/she/it will be authenticated | they will be authenticated |
| Future Perfect, Passive Voice | |
|---|---|
| I shall/will have been authenticated | we shall/will have been authenticated |
| you will have been authenticated | you will have been authenticated |
| he/she/it will have been authenticated | they will have been authenticated |