Subject | English | Wolof |
comp., MS | code access security | ñoŋalug jotaley caabi yi (A mechanism provided by the common language runtime whereby managed code is granted permissions by security policy and these permissions are enforced, helping to limit the operations that the code will be allowed to perform) |
comp., MS | computer security | kaaràngeg ordinaatëer (The protection of information assets through the use of technology, processes, and training) |
comp., MS | IEEE 802.1X security standard | nattukaayu IEEE 802.1x (An Institute of Electrical and Electronics Engineers (IEEE) standard that defines port-based network access control which either allows or denies connection requests to IEEE 802.3 wired Ethernet networks or IEEE 802.11 wireless networks) |
comp., MS | Microsoft Safety and Security Center | Wóoraayu Microsoft ak Barabu Kaarànge (The Microsoft website of information on and resources for computer security, digital privacy, and online safety) |
comp., MS | Microsoft Safety & Security Center | Wóoraayu Microsoft & Barabu Kaarànge (The Microsoft website of information on and resources for computer security, digital privacy, and online safety) |
comp., MS | security file | takkub ñoŋal (A file that contains a digital code that makes it possible to seal messages or to add a digital signature to messages. This file can be stored on a 3.5-inch disk or on your computer's hard disk) |
comp., MS | security ID | ID wu kaaraange (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created) |
comp., MS | security identifier | Ràññeekaayu kaaraange (In Windows-based systems, a unique value that identifies a user, group, or computer account within an enterprise. Every account is issued a SID when it is created) |
comp., MS | security label | xàmmikaayu ñoŋal (A secure e-mail feature that lets you add sensitivity labels, such as Internal Use Only, to the message header. Security labels in your organization are controlled by security policies set up by your e-mail administrator) |