- illegitimate user
- 1) Юридический термин: незаконный пользователь2) Банковское дело: незаконный пользователь (банковской карточкой)
Универсальный англо-русский словарь. Академик.ру. 2011.
Универсальный англо-русский словарь. Академик.ру. 2011.
User Friendly — This article is about a popular webcomic titled User Friendly. For the term used generically, see Usability. For other uses, see User Friendly (disambiguation). User Friendly … Wikipedia
Privacy-invasive software — is a category of computer software that ignores users’ privacy and that is distributed with a specific intent, often of a commercial nature. Three typical examples of privacy invasive software are adware, spyware and content hijacking programs.… … Wikipedia
Diamond is Unbreakable — (ダイヤモンドは砕けない, Daiyamondo wa Kudakenai?), initially referred to as Dai 4 Bu Higashikata Jōsuke (第4部 東方仗助, Dai Yon Bu Higashikata Jōsuke … Wikipedia
Disposable e-mail address — Disposable e mail addressing (DEA) refers to an alternative way of sharing and managing e mail addressing. DEA aims to set up a new, unique e mail address for every contact or entity, making a point to point connection between the sender and the… … Wikipedia
Bank of America controversies — Bank of America has been involved in several controversies and received a wide variety of public criticism. This page details some of the more notable and public issues.Criticism of policiesAccount closures without warningWhen opening a deposit… … Wikipedia
Vampire Academy — series Vampire Academy – book 1 Vampire Academy Frostbite Shadow Kiss Blood Promise Spirit Bound Last Sacrifice Author … Wikipedia
Wikipedia:Glossary — Welcome to Wikipedia, which anyone can edit. Help index: Ask questions · Learn wikicode · View FAQ · Read Glossary · Live Wikipedia editing related help via web chat … Wikipedia
Facebook — This article is about the Web site. For the collection of photographs of people after which it is named, see Facebook (directory). Facebook, Inc … Wikipedia
Digital rights management — (DRM) is a term for access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals to limit the use of digital content and devices. The term is used to describe any technology that inhibits uses … Wikipedia
Cookie stuffing — (also cookie dropping) is a blackhat[neutrality is disputed] online marketing technique used to generate illegitimate[neutrality is disputed] affiliate sales. Cookie stuffing occurs when a user visits a website, and as a result of that visit… … Wikipedia
Bayesian spam filtering — (pronounced BAYS ee ən, IPA pronunciation: IPA| [ beɪz.i.ən] , after Rev. Thomas Bayes), a form of e mail filtering, is the process of using a naive Bayes classifier to identify spam e mail.The first known mail filtering program to use a Bayes… … Wikipedia