DictionaryForumContacts

   Greek
Terms for subject Microsoft containing έλεγχος | all forms
GreekEnglish
Έλεγχος εξωτερικών κλήσεωνOutside Voice Control (The application that connects a mobile device to the enterprise network. Outside Voice Control enables mobile devices that are running the mobile application of Lync Server or Office Communicator Mobile to send and receive calls that come through the enterprise network, in addition to calls that come through the mobile carrier network)
Έλεγχος προσβασιμότηταςAccessibility Checker (A feature that helps users of some Office applications to improve the accessibility of documents they create)
Έλεγχος προώθησης κλήσεων από τον CommunicatorControl call forwarding from Communicator (An item the user can select in the Options dialog box, Phones tab. When the user selects this option, Communicator controls automatic forwarding of incoming calls using the call-forwarding settings the user selects)
Έλεγχος συμβατότηταςCompatibility Checker (A feature that identifies elements in your file that aren't supported or will behave differently in a different format or previous version of the product)
Έλεγχος ταυτότητας μέσω φορμώνforms-based authentication (A service that enables applications to provide their own logon UI and to verify credentials independently)
Έλεγχος ταυτότητας με αντιστοίχιση πιστοποιητικών προγραμμάτων-πελατών SSLSSL client certificate mapping authentication (A method of authentication where certificates are used on the client and a mapping is made on the server (or possibly on the Active directory domain controller) to determine which client certificates should be allowed access to the site)
έλεγχος έκδοσηςversion control (The process of maintaining a database of all the source code and related files in a software development project to keep track of changes made during the project)
έλεγχος αλλαγώνchange control (Principles and processes that facilitate the management of change without compromising the quality or integrity of an IT project or solution, through structured procedures for submitting, approving, implementing, and reviewing change requests)
έλεγχος γνωσιακής συνέπειαςKnowledge Consistency Checker (A built-in process that runs on all domain controllers and generates the replication topology for the Active Directory forest. At specified intervals, the KCC reviews and makes modifications to the replication topology to ensure propagation of data either directly or transitively)
έλεγχος εγκυρότηταςvalidity check (The process of analyzing data to determine whether it conforms to predetermined completeness and consistency parameters)
έλεγχος κατακερματισμού δίσκουtune-up scan (An online scan that examines a hard disk's level of fragmentation)
έλεγχος κατακερματισμού δίσκουtune up scan (An online scan that examines a hard disk's level of fragmentation)
έλεγχος λογαριασμού χρήστηUser Account Control (A security feature that helps prevent unauthorized changes to a computer, by asking user for permission or administrator credentials before performing actions that could potentially affect the computer's operation or that change settings that affect multiple users)
έλεγχος περιεχομένουcontent scoping (The ability to control (on a folder basis) which file contents are downloaded to document tools on user devices)
έλεγχος πρόσβασηςaccess control (A security mechanism that determines which operations a user, group, service, or computer is authorized to perform on a computer or on a particular object, such as a file, printer, registry subkey, or directory service object)
έλεγχος πρόσβασηςadmission control (The service used to administratively control network resources on shared network segments)
έλεγχος πρόσβασης μέσουmedia access control (A sublayer of the IEEE 802 specifications that defines network access methods and framing)
έλεγχος συμβατότηταςcompatibility checker (A function that verifies the technology is compatible with the target browser)
έλεγχος συνέπειας ζεύγουςpair wise consistency check (A combinatorial testing method that tests all possible discrete combinations of each input parameter pair)
έλεγχος ταυτότηταςauthentication (The process of verifying the identity of a user, computer, process, or other entity by validating the credentials provided by the entity. Common forms of credentials are digital signatures, smart cards, biometric data, and a combination of user names and passwords)
έλεγχος ταυτότητας απλού κειμένουplaintext authentication (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network)
έλεγχος ταυτότητας βασισμένος σε δηλώσειςclaims-based authentication (The process of authenticating a user based on a set of claims about the user's identity contained in a trusted token. This token is often issued and signed by an entity that is able to authenticate the user by other means, and that is trusted by the entity doing the claims-based authentication)
έλεγχος ταυτότητας διακομιστή μεσολάβησηςproxy authentication (An authentication method that uses a proxy server)
έλεγχος ταυτότητας δύο παραγόντωνtwo-factor authentication (An authentication method that requires two authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
έλεγχος ταυτότητας μέσω πιστοποιητικούcertificate authentication (A form of IIS authentication in which IIS accepts client-certificates used to prove the client's identity. Using this form of authentication, IIS can optionally map a client certificate to a Windows user account by using an internal mapping table or Active Directory)
έλεγχος ταυτότητας με ανάθεσηdelegated authentication (A method of authentication by which a trusted server (or service) is enabled to act as the client when it connects to third-tier application resources)
έλεγχος ταυτότητας με δυνατότητα σύνδεσηςpluggable authentication (A mechanism to integrate multiple low-level authentication schemes into a high-level API, which allows for programs that rely on authentication to be written independently of the underlying authentication scheme)
έλεγχος ταυτότητας πολλών παραγόντωνmultifactor authentication (An authentication method that requires two or more authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
έλεγχος ταυτότητας προγράμματος-πελάτηclient authentication (A method of authentication by which the client in a client-server communication proves its identity to the server)
έλεγχος ταυτότητας πρόσβασηςauthenticated access (A user access option that you specify at the default Web site level or Application level in IIS. Authenticated access requires a user to have a valid account and password to access the site)
έλεγχος ταυτότητας τριών παραγόντωνthree-factor authentication (An authentication method that requires three authentication methods, which may include something the user provides, such as certificates; something the user knows, such as user names, passwords, or pass phrases; physical attributes, such as a thumbprint; and personal attributes, such as a personal signature)
έλεγχος τύπουtype checking (The process performed by a compiler or interpreter to make sure that when a variable is used, it is treated as having the same data type as it was declared to have)
ανώνυμος έλεγχος ταυτότητας FTPanonymous FTP authentication (A protocol that makes it possible for a user to retrieve documents, files, programs, and other archived data from anywhere on the Internet without having to establish a logon name and password)
ανώνυμος έλεγχος ταυτότηταςAnonymous authentication (An authentication mechanism that does not require user accounts and passwords)
απομακρυσμένος έλεγχοςremote control (The process of viewing and interacting with an existing Remote Desktop Protocol session initiated by another user)
απομακρυσμένος έλεγχος κλήσεωνremote call control (The ability to send and receive calls on a desktop phone by using a computer-supported telecommunications application, such as Lync or Communicator)
Bασικός έλεγχος ταυτότηταςBasic authentication (An authentication mechanism that is supported by most browsers, including Internet Explorer, and encodes (but does not encrypt) user name and password data before transmitting it over the network)
Γονικός έλεγχοςParental Controls (A UI element that enables a user to block adult content)
γονικός έλεγχοςparental controls (Settings that enable parents to restrict what their children see)
δηλωτικός έλεγχος ασφαλείαςdeclarative security check (Declarative security information in metadata. Developers can use such declarations, which are usually written as custom attributes, to invoke several kinds of security functionality - require permissions to bind reference to the code, require permissions to derive a type, demand that callers have certain permissions, and so on)
Διαγνωστικός έλεγχοςDiagnostics (A feature of Windows that checks for problems associated with network connections)
δυναμικός έλεγχος πρόσβασηςdynamic access control (The ability for IT pros to define how users access a system based on dynamic qualities, such as a user's location or role)
Ενσωματωμένος έλεγχος ταυτότητας των WindowsIntegrated Windows authentication (A configuration setting that enables negotiation of authentication protocols in Internet Information Services (IIS))
Συνοπτικός έλεγχος ταυτότηταςDigest authentication (An authentication method that prompts the user for a user name and a password, also called credentials, which are hashed with other data before being transmitted over the network. Digest authentication is available only on domains that have domain controllers that are running Microsoft Windows Server operating systems)
υποχρεωτικός έλεγχος ασφάλειαςimperative security check (A security check that occurs when a security method is called within the code that is being protected. This type of check can be data-driven and can be isolated to a single location within an object or method. For example, if the name of a file to be protected is known only at run time, an imperative security check can be invoked by passing the file name as a parameter to a security method)