- keystroke verification
- <edp> ■ Verifizierung durch Eingabewiederholung f
English-german technical dictionary. 2013.
English-german technical dictionary. 2013.
Keystroke dynamics — Keystroke dynamics, or typing dynamics, is the detailed timing information that describes exactly when each key was depressed and when it was released as a person is typing at a computer keyboard. Science of Keystroke Dynamics The behavioral… … Wikipedia
Two pass verification — Two pass verification, also called double data entry, is a data entry quality control method that was originally employed when data records were entered onto sequential 80 column Hollerith cards with a keypunch. In the first pass through a set of … Wikipedia
Intruder detection — In information security, intruder detection is the art of detecting intruders behind attacks as unique persons. This techniques try to identify the person analyzing their computational behaviour.This concept is not yet very extended and tend to… … Wikipedia
Malware — Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access… … Wikipedia
Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in … Wikipedia
Password cracking — is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. The purpose of password cracking might be to help a user recover a… … Wikipedia
Digital signature — This article is about secure cryptographic signatures. For simple signatures in digital form, see Electronic signature. A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital… … Wikipedia
Identity theft — is a form of stealing another person s identity in which someone pretends to be someone else by assuming that person s identity, typically in order to access resources or obtain credit and other benefits in that person s name. The victim of… … Wikipedia
Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… … Wikipedia
Electronic music — For electronic musical instruments, see Electronic musical instrument. For other uses, see Electronic music (disambiguation). See also: List of electronic music genres and List of electronic music festivals Electronic music is music that… … Wikipedia
Cangjie input method — Traditional Chinese 倉頡輸入法 Simplified Chinese 仓颉输入法 Tran … Wikipedia