- trusted publisher
- The developer of a macro that is trusted by you on your computer. The trusted publisher is identified by the certificate that they used to digitally sign the macro.ناشر موثوق
English-Arabic terms dictionary. 2015.
English-Arabic terms dictionary. 2015.
Trusted Computing — (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing the computer will consistently behave in specific ways, and… … Wikipedia
Trusted Solaris — is a security evaluated operating system based on Solaris by Sun Microsystems, featuring a mandatory access control model.Parts of Trusted Solaris: *Accounting *Role Based Access Control *Auditing *Device Allocation *Mandatory Access Control… … Wikipedia
Trusted Platform Module — In computing, Trusted Platform Module (TPM) is both the name of a published specification detailing a secure cryptoprocessor that can store cryptographic keys that protect information, as well as the general name of implementations of that… … Wikipedia
Trusted client — In computing, a trusted client is a device or program controlled by the user of a service, but with restrictions designed to prevent its use in ways not authorised by the provider of the service. That is, the client is a device that vendors trust … Wikipedia
Joseph Johnson (publisher) — 200px|thumb|right|Joseph Johnson (engraving by William Sharp after a painting by Moses Haughton) [Tyson, xvi.] Joseph Johnson (15 November 1738 – 20 December 1809) was an influential eighteenth century London bookseller. His publications covered… … Wikipedia
Gert van Rooyen — Cornelius Gerhardus van Rooyen ( Gert van Rooyen) was a South African paedophile and serial killer who, together with his partner Joey Haarhof, abducted and murdered at least six young girls between 1988 and 1989cite… … Wikipedia
Intel vPro — technology is a set of features built into a PC’s motherboard and other hardware.cite web |title=Remote Pc Management with Intel s vPro |url=http://www.tomshardware.com/reviews/command conquer,1591.html |publisher=Tom s Hardware… … Wikipedia
Scout Law — Since the publication of Scouting for Boys in 1908, all Scouts and Guides around the world have taken a Scout Promise or oath to live up to ideals of the movement, and subscribed to a Scout Law. The wording of the promise and law have varied… … Wikipedia
Saddam Hussein and al-Qaeda link allegations timeline — The Saddam Hussein and al Qaeda timeline below list allegations of meetings, all but one now discounted, denied or disproven by the United States Government, between al Qaeda members and members of Saddam Hussein s government, as well as other… … Wikipedia
Intel Active Management Technology — (AMT) is hardware based technology for remotely managing and securing PCs out of band.] cite web |title=New Intel Based Laptops Advance All Facets of Notebook PCs|url=http://www.intel.com/pressroom/archive/releases/20080715comp… … Wikipedia
Phishing — In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic… … Wikipedia