- Event logging level
- Операционные системы: Уровень регистрации событий
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
Event Viewer — Infobox Software name = Event Viewer caption = Event Viewer in Windows Vista SP1 collapsible = author = developer = Microsoft released = latest release version = 6.0.6001 latest release date = February 4, 2008 latest preview version = latest… … Wikipedia
Keystroke logging — (often called keylogging) is a method of capturing and recording user keystrokes. The technique and name came from before the era of the graphical user interface; loggers nowadays would expect to capture mouse operations too. Keylogging can be… … Wikipedia
Illegal logging — is the harvest, transportation, purchase or sale of timber in violation of national laws. The harvesting procedure itself may be illegal, including using corrupt means to gain access to forests; extraction without permission or from a protected… … Wikipedia
Tracing (software) — In software engineering, tracing is a specialized use of logging to record information about a program s execution. This information is typically used by programmers for debugging purposes, and additionally, depending on the type and detail of… … Wikipedia
Management features new to Windows Vista — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features … Wikipedia
Windows 9x — Windows 4.x redirects here. For the operating system in the NT family, see Windows NT 4.0. Windows 9x Screenshot of Windows 95, the first version of Windows in the 9x series Company / developer … Wikipedia
Technical features new to Windows Vista — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features … Wikipedia
Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… … Wikipedia
Windows Vista networking technologies — This article is part of a series on Windows Vista New features Overview Technical and core system Security and safety Networking technologies I/O technologies Management and administration Removed features … Wikipedia
Windows 2000 — Part of the Microsoft Windows family Screenshot of Windows 2000 Professional … Wikipedia
Netflow — architecture NetFlow is a network protocol developed by Cisco Systems for collecting IP traffic information. NetFlow has become an industry standard for traffic monitoring and is supported by platforms other than Cisco IOS and NXOS such as… … Wikipedia