callback security

callback security
callback security UK US noun [U] (also dial-back security)
IT a system used for protecting a computer network, in which a user calls into a computer, which checks the person's username and password, ends the call, and then calls back the number connected with that username and password

Financial and business terms. 2012.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Callback (telecommunications) — In telecommunications, a callback (also written as call back) occurs when the originator of a call is immediately called back in a second call as a response. International calling A callback in this sense is a method of making low cost… …   Wikipedia

  • Security token — Several types of security tokens with a penny for scale …   Wikipedia

  • dial-back security — UK US noun [U] ► IT CALLBACK SECURITY(Cf. ↑callback security) …   Financial and business terms

  • Core Security Technologies — Core Security Type Private Industry Computer Security Vulnerability Management Security Consulting Services Founded 1996 Headquarters …   Wikipedia

  • защита с помощью обратного вызова — — [Л.Г.Суменко. Англо русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.] Тематики информационные технологии в целом EN callback security …   Справочник технического переводчика

  • Vyke — Infobox Software name = Vyke caption = Vyke PC interface developer = Vyke operating system = Microsoft Windows and Mac genre = VoIP Internet Phone Mobile VoIP SMS license = Freeware website = [https://www.vyke.com www.vyke.com] Slogan = Vyke… …   Wikipedia

  • Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… …   Wikipedia

  • Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… …   Wikipedia

  • Shatter attack — In computing, a shatter attack is a programming technique employed by hackers on Microsoft Windows operating systems that can be used to bypass security restrictions between processes in a session. A shatter attack takes advantage of a design… …   Wikipedia

  • Object Manager (Windows) — Object Manager in Windows, categorized hierarchically using namespaces Object Manager (internally called Ob) is a subsystem implemented as part of the Windows Executive which manages Windows resources. Each resource, which are surfaced as logical …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”