プロの翻訳者、企業、ウェブページから自由に利用できる翻訳レポジトリまで。
consent form for security clearance ( privacy statement en .
consent form for security clearance ( privacy statement en .
最終更新: 2011-10-23
使用頻度: 2
品質:
participants shall keep such information confidential , unless the ecb has explicitly given its written consent to disclose .
participants shall keep such information confidential , unless the ecb has explicitly given its written consent to disclose .
最終更新: 2011-10-23
使用頻度: 1
品質:
however , if you wish to retire between the ages of 55 and 60 , you will need the administrator 's consent .
however , if you wish to retire between the ages of 55 and 60 , you will need the administrator 's consent .
最終更新: 2011-10-23
使用頻度: 1
品質:
kohdassa c viitataan ilmaisulla "pre-consent" (ennalta hyväksytty) tämän asetuksen 14 artiklaan.
taħt c, il-kunsens minn qabel jirreferi għall-artikolu 14 ta' dan ir-regolament.
最終更新: 2010-09-25
使用頻度: 1
品質:
警告:見えない HTML フォーマットが含まれています
e assignment of rights and obligations the rights and obligations of the participant cannot be assigned , altered or otherwise transferred by the participant to third parties without the prior written consent of the ecb .
e assignment of rights and obligations the rights and obligations of the participant cannot be assigned , altered or otherwise transferred by the participant to third parties without the prior written consent of the ecb .
最終更新: 2011-10-23
使用頻度: 1
品質:
and ( c ) in cases where a payer or a payee has been suspended , the suspended participant 's cb 's explicit consent has been obtained .
and ( c ) in cases where a payer or a payee has been suspended , the suspended participant 's cb 's explicit consent has been obtained .
最終更新: 2011-10-23
使用頻度: 1
品質:
windows creates (typically, without your knowledge or consent) various log files, temporary files, etc., on the system partition. it also saves the content of ram to hibernation and paging files located on the system partition. therefore, if an adversary analyzed files stored on the partition where the original system (of which the hidden system is a clone) resides, he might find out, for example, that you used the truecrypt wizard in the hidden-system-creation mode (which might indicate the existence of a hidden operating system on your computer).to prevent such issues, truecrypt will, in the next steps, securely erase the entire content of the partition where the original system resides. afterwards, in order to achieve plausible deniability, you will need to install a new system on the partition and encrypt it. thus you will create the decoy system and the whole process of creation of the hidden operating system will be completed.
windows crea (tipicamente, a vostra insaputa e senza vostro consenso) vari file log, temporanei ecc. nella partizione di sistema. esso anche salva il contenuto della ram nei file di ibernazione e file paging collocati nella partizione di sistema. pertanto, se un avversario analizza i file memorizzati nella partizione di sistema dove risiede il sistema originale (del quale il sistema ignoto è un clone), potrebbe scoprire, per esempio, che avete usato la procedura guidata di truecrypt nella modalità di creazione del sistema ignoto (che potrebbe segnalare l’esistenza di un sistema operativo ignoto nel vostro computer).per evitare tale problema, truecrypt deve, nei passi successivi, eliminare sicuramente l’intero contenuto della partizione dove risiede il sistema originale. dopo, allo scopo di realizzare una scusa plausibile, dovete installare un nuovo sistema nella partizione e codificarla. quindi voi creerete il sistema di richiamo e l’intero processo di creazione del sistema operativo ignoto sarà completato.
最終更新: 2010-03-26
使用頻度: 1
品質: