user activity log

user activity log
Безопасность: журнал регистрации действий пользователя (в системе)

Универсальный англо-русский словарь. . 2011.

Игры ⚽ Поможем написать реферат

Смотреть что такое "user activity log" в других словарях:

  • Windows Security Log — The Security Log, in Microsoft Windows, is a log that contains records of login/logout activity and/or other security related events specified by the system s audit policy. Auditing allows administrators to configure Windows to record operating… …   Wikipedia

  • Database activity monitoring — (DAM) is a database security technology for monitoring and analyzing database activity that operates independently of the database management system (DBMS) and does not rely on any form of native (DBMS resident) auditing or native logs such as… …   Wikipedia

  • Server log — A server log is a log file (or several files) automatically created and maintained by a server of activity performed by it. A typical example is a web server log which maintains a history of page requests. The W3C maintains a standard format (the …   Wikipedia

  • Nationwide Suspicious Activity Reporting Initiative — The Nationwide Suspicious Activity Reporting (SAR) Initiative (NSI) is a program of the United States Government used to collect and share reports of suspicious activity by people in the United States.[1] [2] The Nationwide SAR Initiative (NSI)… …   Wikipedia

  • Oracle Database — Developer(s) Oracle Corporation Development status Active Written in …   Wikipedia

  • Nintendo 3DS — 3ds redirects here. For other uses, see 3ds (disambiguation). Nintendo 3DS …   Wikipedia

  • Database audit — Database auditing involves observing a database so as to be aware of the actions of database users. Database administrators and consultants often set up auditing for security purposes, for example, to ensure that those without the permission to… …   Wikipedia

  • Wireless security — An example wireless router, that can implement wireless security features Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. Many laptop computers have wireless cards pre installed. The… …   Wikipedia

  • Wii Fit — Infobox VG title=Wii Fit caption=Wii Fit European boxart developer=Nintendo EAD publisher=Nintendo series= Wii Series designer=Shigeru Miyamoto engine=Wii Sports (modified) version= released=vgrelease|JP=December 1 2007cite web|url=… …   Wikipedia

  • Wikipedia:CheckUser — WP:CHECK redirects here. You may be looking for Wikipedia:WikiProject Check Wikipedia. For how to request CheckUser intervention, please, see Wikipedia:Sockpuppet investigations. If you need to contact a Checkuser for a sensitive matter, please… …   Wikipedia

  • Login — In computer security, login (logging or signing in) is the process by which individual access to a computer system is controlled by identification of the user using credentials provided by the user. A user can log in to a system to obtain access …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»