- bogus address
- фиктивный адрес
Англо-русский словарь по вычислительной технике и информационным технологиям - 4-е изд.. Сергей Орлов .
Англо-русский словарь по вычислительной технике и информационным технологиям - 4-е изд.. Сергей Орлов .
bogus — bo‧gus [ˈbəʊgəs ǁ ˈboʊ ] adjective informal LAW not real, but dishonestly pretending to be something or someone: • They issue certificates of deposits, often based on fictitious assets such as bogus gold mines. • bogus claims of injury by their… … Financial and business terms
Bounce Address Tag Validation — In computing, Bounce Address Tag Validation (BATV) is the name of a method, defined in an Internet Draft, for determining whether the bounce address specified in an E mail messageis valid. It is designed to reject backscatter, that is, bounce… … Wikipedia
фиктивный адрес — — [Л.Г.Суменко. Англо русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.] Тематики информационные технологии в целом EN bogus address … Справочник технического переводчика
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Advance-fee fraud — African sting An advance fee fraud is a confidence trick in which the target is persuaded to advance sums of money in the hope of realizing a significantly larger gain.[1] Among the variations on this type of scam are the Nigerian Letter (also… … Wikipedia
Bogon filtering — A bogon is a bogus IP address, and an informal name for an IP packet on the public Internet that claims to be from an area of the IP address space reserved, but not yet allocated or delegated by the Internet Assigned Numbers Authority (IANA) or a … Wikipedia
Phishing — In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic… … Wikipedia
Comparison of DNS blacklists — The following table lists technical information for a number of DNS blacklists. Blacklist operator DNS blacklist Informational URL Zone Listing goal Nomination Listing lifetime Notes ARM Research Labs, LLC GBUdb Truncate [1] truncate.gbudb.net… … Wikipedia
List of confidence tricks — This list of confidence tricks and scams should not be considered complete, but covers the most common examples. Confidence tricks and scams are difficult to classify, because they change often and often contain elements of more than one type.… … Wikipedia
Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… … Wikipedia
Sender Policy Framework — TOC In computing, Sender Policy Framework (SPF) allows software to identify messages that are or are not authorized to use the domain name in the SMTP HELO and MAIL FROM (Return Path) commands, based on information published in a sender policy of … Wikipedia