- file shadowing
- Безопасность: скрытое копирование файлов
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
File shadowing — There are several different technologies that use the term file shadowing , but the intent of file shadowing within these technologies is to provide an exact copy (or mirror of a set of data). For file shadowing to be effective, the shadow needs… … Wikipedia
Shadowing — may refer to:* File shadowing, to provide an exact copy of or to mirror a set of data * Job shadowing, learning tasks by first hand observation of daily behavior * Projective shadowing, a process by which shadows are added to 3D computer… … Wikipedia
Disk mirroring — In data storage, disk mirroring or RAID1 is the replication of logical disk volumes onto separate physical hard disks in real time to ensure continuous availability. A mirrored volume is a complete logical representation of separate volume copies … Wikipedia
Common Lisp — Paradigm(s) Multi paradigm: procedural, functional, object oriented, meta, reflective, generic Appeared in 1984, 1994 for ANSI Common Lisp Developer ANSI X3J13 committee Typing discipline … Wikipedia
Shadow password — In computing, Unix like operating systems use the shadow password database mechanism to increase the security level of passwords by preventing ordinary users from accessing encrypted password data.Unshadowed passwords On a system without shadowed … Wikipedia
Quake engine — Infobox Software name = Quake engine caption = collapsible = author = developer = id Software released = latest release version = latest release date = latest preview version = latest preview date = frequently updated = programming language = C… … Wikipedia
id Tech 4 — in Doom 3, the engine s parent game. Developer(s) id Software Written in C++ … Wikipedia
Random-access memory — RAM redirects here. For other uses of the word, see Ram (disambiguation). Example of writable volatile random access memory: Synchronous Dynamic RAM modules, primarily used as main memory in personal computers, workstations, and servers … Wikipedia
List of Xbox games compatible with Xbox 360 — This is a list of Xbox games that are compatible with the Xbox 360. Additionally, the manner in which compatibility is achieved and the software errors associated with it are discussed in brief. This list is final as Microsoft confirmed in… … Wikipedia
Unix security — Unix security: maintaining a secure environment on Unix and Unix like operating systems is dependent on design concepts of these operating systems, but vigilance through user and administrative techniques is important to maintain security… … Wikipedia
Microsoft Word — Microsoft Office Word Microsoft Office Word 2010 on Windows 7 … Wikipedia