Greek | English |
Έλεγχος εξωτερικών κλήσεων | Outside Voice Control (The application that connects a mobile device to the enterprise network. Outside Voice Control enables mobile devices that are running the mobile application of Lync Server or Office Communicator Mobile to send and receive calls that come through the enterprise network, in addition to calls that come through the mobile carrier network) |
Έλεγχος προσβασιμότητας | Accessibility Checker (A feature that helps users of some Office applications to improve the accessibility of documents they create) |
Έλεγχος προώθησης κλήσεων από τον Communicator | Control call forwarding from Communicator (An item the user can select in the Options dialog box, Phones tab. When the user selects this option, Communicator controls automatic forwarding of incoming calls using the call-forwarding settings the user selects) |
Έλεγχος συμβατότητας | Compatibility Checker (A feature that identifies elements in your file that aren't supported or will behave differently in a different format or previous version of the product) |
Έλεγχος ταυτότητας μέσω φορμών | forms-based authentication (A service that enables applications to provide their own logon UI and to verify credentials independently) |
Έλεγχος ταυτότητας με αντιστοίχιση πιστοποιητικών προγραμμάτων-πελατών SSL | SSL client certificate mapping authentication (A method of authentication where certificates are used on the client and a mapping is made on the server (or possibly on the Active directory domain controller) to determine which client certificates should be allowed access to the site) |
έλεγχος έκδοσης | version control (The process of maintaining a database of all the source code and related files in a software development project to keep track of changes made during the project) |
έλεγχος αλλαγών | change control (Principles and processes that facilitate the management of change without compromising the quality or integrity of an IT project or solution, through structured procedures for submitting, approving, implementing, and reviewing change requests) |
έλεγχος γνωσιακής συνέπειας | Knowledge Consistency Checker (A built-in process that runs on all domain controllers and generates the replication topology for the Active Directory forest. At specified intervals, the KCC reviews and makes modifications to the replication topology to ensure propagation of data either directly or transitively) |
έλεγχος εγκυρότητας | validity check (The process of analyzing data to determine whether it conforms to predetermined completeness and consistency parameters) |
έλεγχος κατακερματισμού δίσκου | tune-up scan (An online scan that examines a hard disk's level of fragmentation) |
έλεγχος κατακερματισμού δίσκου | tune up scan (An online scan that examines a hard disk's level of fragmentation) |
έλεγχος λογαριασμού χρήστη | User Account Control (A security feature that helps prevent unauthorized changes to a computer, by asking user for permission or administrator credentials before performing actions that could potentially affect the computer's operation or that change settings that affect multiple users) |
έλεγχος περιεχομένου | content scoping (The ability to control (on a folder basis) which file contents are downloaded to document tools on user devices) |
έλεγχος πρόσβασης | access control (A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object) |
έλεγχος πρόσβασης | admission control (The service used to administratively control network resources on shared network segments) |
έλεγχος πρόσβασης μέσου | media access control (A sublayer of the IEEE 802 specifications that defines network access methods and framing) |
έλεγχος συμβατότητας | compatibility checker (A function that verifies the technology is compatible with the target browser) |
έλεγχος συνέπειας ζεύγους | pair wise consistency check (A combinatorial testing method that tests all possible discrete combinations of each input parameter pair) |
έλεγχος ταυτότητας | authentication (The process of verifying the identity of a user, computer, process, or other entity by validating the credentials provided by the entity. Common forms of credentials are digital signatures, smart cards, biometric data, and a combination of user names and passwords) |
έλεγχος ταυτότητας απλού κειμένου | plaintext authentication (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network) |
έλεγχος ταυτότητας βασισμένος σε δηλώσεις | claims-based authentication (The process of authenticating a user based on a set of claims about the user's identity contained in a trusted token. This token is often issued and signed by an entity that is able to authenticate the user by other means, and that is trusted by the entity doing the claims-based authentication) |
έλεγχος ταυτότητας διακομιστή μεσολάβησης | proxy authentication (An authentication method that uses a proxy server) |
έλεγχος ταυτότητας δύο παραγόντων | two-factor authentication (An authentication method that requires two authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature) |
έλεγχος ταυτότητας μέσω πιστοποιητικού | certificate authentication (A form of IIS authentication in which IIS accepts client-certificates used to prove the client's identity. Using this form of authentication, IIS can optionally map a client certificate to a Windows user account by using an internal mapping table or Active Directory) |
έλεγχος ταυτότητας με ανάθεση | delegated authentication (A method of authentication by which a trusted server (or service) is enabled to act as the client when it connects to third-tier application resources) |
έλεγχος ταυτότητας με δυνατότητα σύνδεσης | pluggable authentication (A mechanism to integrate multiple low-level authentication schemes into a high-level API, which allows for programs that rely on authentication to be written independently of the underlying authentication scheme) |
έλεγχος ταυτότητας πολλών παραγόντων | multifactor authentication (An authentication method that requires two or more authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature) |
έλεγχος ταυτότητας προγράμματος-πελάτη | client authentication (A method of authentication by which the client in a client-server communication proves its identity to the server) |
έλεγχος ταυτότητας πρόσβασης | authenticated access (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site) |
έλεγχος ταυτότητας τριών παραγόντων | three-factor authentication (An authentication method that requires three authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature) |
έλεγχος τύπου | type checking (The process performed by a compiler or interpreter to make sure that when a variable is used, it is treated as having the same data type as it was declared to have) |
ανώνυμος έλεγχος ταυτότητας FTP | anonymous FTP authentication (A protocol that makes it possible for a user to retrieve documents, files, programs, and other archived data from anywhere on the Internet without having to establish a logon name and password) |
ανώνυμος έλεγχος ταυτότητας | Anonymous authentication (An authentication mechanism that does not require user accounts and passwords) |
απομακρυσμένος έλεγχος | remote control (The process of viewing and interacting with an existing Remote Desktop Protocol session initiated by another user) |
απομακρυσμένος έλεγχος κλήσεων | remote call control (The ability to send and receive calls on a desktop phone by using a computer-supported telecommunications application, such as Lync or Communicator) |
Bασικός έλεγχος ταυτότητας | Basic authentication (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network) |
Γονικός έλεγχος | Parental Controls (A UI element that enables a user to block adult content) |
γονικός έλεγχος | parental controls (Settings that enable parents to restrict what their children see) |
δηλωτικός έλεγχος ασφαλείας | declarative security check (Declarative security information in metadata. Developers can use such declarations, which are usually written as custom attributes, to invoke several kinds of security functionality - require permissions to bind reference to the code, require permissions to derive a type, demand that callers have certain permissions, and so on) |
Διαγνωστικός έλεγχος | Diagnostics (A feature of Windows that checks for problems associated with network connections) |
δυναμικός έλεγχος πρόσβασης | dynamic access control (The ability for IT pros to define how users access a system based on dynamic qualities, such as a user's location or role) |
Ενσωματωμένος έλεγχος ταυτότητας των Windows | Integrated Windows authentication (A configuration setting that enables negotiation of authentication protocols in Internet Information Services (IIS)) |
Συνοπτικός έλεγχος ταυτότητας | Digest authentication (An authentication method that prompts the user for a user name and a password, also called credentials, which are hashed with other data before being transmitted over the network. Digest authentication is available only on domains that have domain controllers that are running Microsoft Windows Server operating systems) |
υποχρεωτικός έλεγχος ασφάλειας | imperative security check (A security check that occurs when a security method is called within the code that is being protected. This type of check can be data-driven and can be isolated to a single location within an object or method. For example, if the name of a file to be protected is known only at run time, an imperative security check can be invoked by passing the file name as a parameter to a security method) |