Kerberos protocol oor Spaans

Kerberos protocol

Vertalings in die woordeboek Engels - Spaans

Kerberos

HeiNER - the Heidelberg Named Entity Resource

Geskatte vertalings

Vertoon algoritmies gegenereerde vertalings

Soortgelyke frases

Kerberos V5 authentication protocol
protocolo de autenticación Kerberos V5

voorbeelde

wedstryd
woorde
Advanced filtering
Voorbeelde moet herlaai word.
We examine these problems in turn and refer to Table 4.1, which shows the actual Kerberos protocol.
¿ El niño murió también?- ¿ Quién?Literature Literature
It forms the basis for the Kerberos protocol.
Con gusto le recomendaré a los mejores terapeutasWikiMatrix WikiMatrix
This flaw is fixed in the Kerberos protocol by the inclusion of a timestamp.
Lo siguiente que sé, estoy aquíWikiMatrix WikiMatrix
This can be triggered when analyzing traffic using the SNMP, LDAP, COPS, or Kerberos protocols in ethereal.
Tú vas a pasar una Navidad maravillosaCommon crawl Common crawl
It should be borne in mind that the Kerberos protocol, as modified by Microsoft, offers advantages as regards, in particular, faster connection and efficiency (see recital 152 to the contested decision and paragraph 170 above).
Se han notificado casos de sobredosis durante la vigilancia postcomercializaciónEurLex-2 EurLex-2
Multiple vulnerabilities in the krb5 and mit-krb5 implementations of the Kerberos authentication protocol have been identified.
Una vez por mes, la gente debe traerCommon crawl Common crawl
In particular, in the Windows 2000 domain authentication is based on the ‘Kerberosprotocol and no longer on the NTLM (NT LAN Manager) protocol, which provides a series of advantages as regards connection speed, mutual authentication and trust management.
El casi me asombra.- Maravilla de islas, islasEurLex-2 EurLex-2
The ‘Key Distribution Centre’ foreseen by the Kerberos protocol ‘is integrated with other Windows 2000 security services running on the domain controller and uses the domain’s Active Directory as its security account database’ (recital 153 to the contested decision).
Phelps... en nombre de mis queridos amigos Alfred y Carlotta Bowan "EurLex-2 EurLex-2
However, the Kerberos protocol implemented in the Windows 2000 Professional and Windows 2000 Server operating systems is not the standard version developed by the Massachusetts Institute of Technology (MIT), but a version ‘extended’ by Microsoft (recitals 153 and 154 to the contested decision).
Tómate una fríaEurLex-2 EurLex-2
A further example given by the Commission is the fact that, in a Windows domain, the Kerberos protocol, as extended by Microsoft, is used for authentication both between a Windows client PC and a Windows work group server and between several Windows work group servers.
¿ Quién se queda con la tuya?EurLex-2 EurLex-2
Authentication protocols include Kerberos 5.
Podría haber algo allí que nos condujese a la localización de SloaneWikiMatrix WikiMatrix
In his opinion, Mr Lees explains that the DRS protocol created by Microsoft incorporates a series of new features, namely ‘it can combine updates from many servers simultaneously; it is integrated with the standard Domain Naming Service (DNS) protocol (for naming) and the Kerberos protocol (for mutual authentication); it transmits information describing the way a particular company has architected its directory service; it [transmits] information about the role that particular servers play in managing the directory service; and it automatically communicates directory updates between servers’.
Me encanta esa modestiaEurLex-2 EurLex-2
419 At recitals 251 to 266 to the contested decision, the Commission explains that Microsoft introduced a ‘proprietary’ extension to the Kerberos standard protocol and that the work group server operating systems which run the ‘unextended’ version of that security protocol encounter authorisation problems when they work in a Windows environment (see also footnote 786 to the contested decision).
¡ No hables sin permiso!EurLex-2 EurLex-2
Kerberos, a network authentication protocol created by MIT, uses symmetric-key cryptography [1] to authenticate users to network services — eliminating the need to send passwords over the network.
Pide a la Comisión Europea y a los Estados ACP que prevean programas de apoyo a los trabajadores perjudicados por el desplome a nivel mundial de los precios de los productos básicos, programas que deben combinar la ayuda a la reconversión y la ayuda financiera y tener en cuenta las especiales necesidades de las mujeres, que constituyen una proporción importante de la mano de obre en numerosos procesos de producción de productos básicosCommon crawl Common crawl
Kerberos is a way to eliminate the need for protocols that allow unsafe methods of authentication, thereby enhancing overall network security.
Estamos buscando una, así que cálmateCommon crawl Common crawl
Normally, the authentication process is tied to the Kerberos protocol and Microsoft’s Active Directory service.
Nunca y de ninguna manera el inspector jefe Japp debe enterarse de que he investigado este casoParaCrawl Corpus ParaCrawl Corpus
Authentication is provided by the Kerberos protocol.
Chapas, hojas y tiras, de estaño, de espesor superior a #,# mmParaCrawl Corpus ParaCrawl Corpus
ID returned has been authenticated with the Kerberos protocol in the expected Domain.
¿ Y sabe por qué?ParaCrawl Corpus ParaCrawl Corpus
For accounts in this group, Kerberos protocol verifies authentication at each request..
Por que el papà no necesita comida, cariñoParaCrawl Corpus ParaCrawl Corpus
Specifies that the delegation of services on this computer is allowed only with the Kerberos protocol.
¿ Qué te dijeron?ParaCrawl Corpus ParaCrawl Corpus
For example, the server might list the Kerberos protocol and NTLM, and send a Kerberos authentication response.
Este crédito se destina a cubrir los costes de las prestaciones externas que conllevan las operaciones de archivo, incluida la selección, la clasificación y la nueva clasificación en los depósitos, los costes de las prestaciones de archivo, la adquisición y la explotación de fondos de archivo en soportes de sustitución (microfilms, discos, cintas, etc.), así como la compra, el alquiler y el mantenimiento de materiales especiales (electrónicos, informáticos, eléctricos) y los gastos de publicación en todo tipo de formato (folletos, CD-ROM, etcParaCrawl Corpus ParaCrawl Corpus
In order to change passwords successfully by using Kerberos protocols, follow these steps:
Tres veces. ojala estuvieramos equivocados, pero...... no lo estamosParaCrawl Corpus ParaCrawl Corpus
4D supports both NTLM and Kerberos protocols.
No puedo creer que se tome en serio...... los cuentos de hadas bajoranos sobre los contactos ancestralesParaCrawl Corpus ParaCrawl Corpus
(IP addresses are not valid for the Kerberos protocol.
¿ Deberíamos estar preocupados por solo ver un ojo?ParaCrawl Corpus ParaCrawl Corpus
In the Kerberos protocol there are 3 architecture main entities:
Lipi, ¿ qué me traes?ParaCrawl Corpus ParaCrawl Corpus
181 sinne gevind in 14 ms. Hulle kom uit baie bronne en word nie nagegaan nie.