DictionaryForumContacts

   Spanish
Terms for subject Microsoft containing protección | all forms | exact matches only
SpanishEnglish
configuración de protecciónprotection configuration (The collection of settings that are common to a protection group; specifically, the protection group name, disk allocations, replica creation method, network bandwidth throttling, and on-the-wire compression)
directiva de proteccióncheck-in policy (A policy that provides the ability to validate compliance with organizational rules for a team project)
directiva de protecciónprotection policy (The collection of recurring job definitions and schedules associated with a protection group)
grupo de protecciónprotection group (A collection of data sources that share the same protection configuration and schedule)
miembro de grupo de protecciónprotection group member (A data source within a protection group)
plan de protecciónprotection plan (The collection of recurring job definitions and schedules associated with a protection group)
protección antivirusvirus protection (A series of measures to protect a machine from being infected by a virus)
protección automáticaauto-protection (In DPM, a feature that automatically identifies and adds new data sources for protection)
protección contra ataques de repeticiónanti-hammering A type of software or hardware method that increases the difficulty and cost of a key search attack on a PIN or password (hammering)
protección contra copia analógicaanalogue copy protection (A form of rights management based on technology developed by Macrovision, which prevents analogue output to be played back from VHS tape)
protección contra suplantación de identidadanti-phishing Pertaining to methods employed to protect users from phishing (anti-phishing)
protección cíclicacyclic protection (A type of protection between two DPM servers where each server protects the data on the other)
Protección de acceso a redesNetwork Access Protection (A set of operating system components that can help protect access to a private network by enforcing health policies. System administrators establish health policies which NAP enforces by inspecting and assessing the health of client computers, restricting network access when client computers are deemed noncompliant, and remediating noncompliant client computers for full network access. NAP also provides ongoing health compliance enforcement while a client computer is connected to a network)
Protección de archivos de WindowsWindows File Protection (A feature that runs in the background and protects your system files from being overwritten. When a file in a protected folder is modified, WFP determines whether the new file is the correct Microsoft version or whether the file is digitally signed. If not, the modified file is replaced with a valid version)
Protección de cliente WindowsWindows Client Protection (A strategy including components and features of Windows Vista that allows system administrators to manage the system from one place by combining antivirus and anti-spyware software)
Protección de contenido digital de ancho de banda altoHigh-bandwidth Digital Content Protection (An encryption and authentication specification created by Intel for Digital Video Interface (DVI) devices such as digital cameras, high-definition televisions, and video disk players. HDCP is designed to protect transmissions between DVI devices from being copied)
Protección de disco de WindowsWindows Disk Protection (A feature that helps protect the Windows partition that contains the Windows operating system and other programs from being permanently modified from user session to user session)
protección de enrutadorrouter guard (A feature that drops router advertisement and redirection messages from unauthorized virtual machines pretending to be routers)
protección de flujo de controlcontrol flow guard (A security feature that makes it more difficult to corrupt memory by implementing restrictions on where an application can execute code from)
Protección de mensajes activaActive Messaging Protection (A process by which antivirus and anti-spam agents and filters are applied to e-mail messages for the purpose of stopping unsolicited or malicious e-mails from entering the organization)
protección de página de escrituracopy-on-write page protection (A concept that allows multiple applications to map their virtual address spaces to share the same physical pages, until an application needs to modify the page and have its own instance copy)
Protección de rastreoTracking Protection (The feature that blocks third-party web content that could potentially track someone's web activity)
Protección de recursos de WindowsWindows Resource Protection (A feature in Windows that attempts to block the replacement of necessary system files to improve reliability and security)
protección de softwaresoftware protection (The process of protecting data from loss or corruption by preventing installation of driver software from untrusted sources)
Protección del sistemaSystem Protection (A Windows technology that protects OS resources (files, folders registry keys) and prevents applications and administrators from making changes to a computer's resources in an arbitrary way)
protección DHCPDHCP guard (A feature that protects against a malicious VM representing itself as a Dynamic Host Configuration Protocol (DHCP) server for man-in-the-middle attacks)
Protección en tiempo realReal-time protection (An option in Windows AntiSpyware that, when selected, provides spyware protection in real time)
Protección infantilFamily Safety (Software that enables parents and guardians to customize children's web experiences in order to help protect their safety and privacy online)
Protección infantil de MicrosoftMicrosoft Family Safety (Software that enables parents and guardians to customize children's web experiences in order to help protect their safety and privacy online)
Protección IPsec contra ataques por denegación de servicioIPsec Denial of Service Protection (A feature that helps client machines to provide basic protection against denial-of-service attacks)
protección primariaprimary protection (A type of protection in which data on the protected server is directly protected by a primary DPM Server)
protección secundariasecondary protection (A type of protection in which data on the protected server is protected by a primary DPM server and the replica on the primary DPM server is protected by a secondary DPM server)
protección siempre activaon-access protection (Virus protection (e.g. antivirus software) that is active continuously, as opposed to on demand)
prueba de proteccióncheck-in test (A test run by a developer to determine whether his code has affected the general stability of the product)
servicio Agente de protección de datos DPMDPM File Agent service (The component of DPM that synchronizes replicas of protected volumes with the data sources. The DPM File Agent service receives changes to protected data from the file servers and applies the changes to the replicas on the DPM server)
servicio Agente de protección DPMDPM protection agent service (The component of DPM that synchronizes replicas of protected data with the data sources. The DPM protection agent service receives changes to protected data from the servers and applies the changes to the replicas on the DPM server)
Servicio de protección de MicrosoftMicrosoft Protection Service A firewall engine installed and managed by Windows Live OneCare as part of its subscription service (MPS)
sistema de protección de serviciosservice hardening (The process of making services less susceptible to attack from malicious software by running least privilege, minimizing resource access, locking down ports and protocols, and generally reduce the damage potential and number of critical vulnerabilities in services)
Windows Live Protección infantilWindows Live Family Safety (Software that enables parents and guardians to customize children's web experiences in order to help protect their safety and privacy online)
zona de protección de datos confidencialesethical wall (A zone of non-communication between distinct departments of a business or organization to prevent conflicts of interest that might result in the inappropriate release of sensitive information)