steal – Übersetzung – Keybot-Wörterbuch

Spacer TTN Translation Network TTN TTN Login Français English Spacer Help
Ausgangssprachen Zielsprachen
Keybot      6'737 Ergebnisse   1'991 Domänen   Seite 7
  16 Hits arteco-global.com  
As the price for copper surpasses $4.00 a pound, many companies face threats from thieves who steal bulk copper. Wire that is energized has not deterred some criminals. Often sites for theft have baseline security measures in place.
Ci spiace, ma questo articolo è disponibile soltanto in Inglese Americano. Per ragioni di convenienza del visitatore, il contenuto è mostrato sotto nella lingua alternativa. Puoi cliccare sul link per cambiare la lingua attiva.As the price for copper surpasses $4.00 a pound, many companies face threats from thieves who steal bulk copper. Wire that is energized has not deterred some criminals. Often sites for theft have baseline security measures in place. But it is still a challenge to find a...
  explore.nature.ca  
Harvest enough plant material to make it through the long winter. While harvesting, watch out for predators or other pikas that want to steal your haypile away! As a pika, you need to prepare for winter by harvesting and haying plant material.
Devenez un pika! Récoltez suffisamment de végétaux pour l'hiver. Mais attention aux prédateurs et aux autres pikas qui pourraient voler vos provisions ! Pour vous préparer à l'hiver, vous devez cueillir et accumuler suffisamment de végétaux. Choisissez des plantes très variées. Pendant la récolte, vous prendrez une pause-déjeuner au milieu de ces herbes grasses. Mais attention aux prédateurs et aux compétiteurs!
  gisecurity.lv  
The threats for safety may come both from outside (from persons, who are planning to get to the object's territory illegally and to steal or damage the property) and from the inner side (personnel). There is also a possibility of collusion between people who work on the object and people from the outside.
Draudi drošībai var nākt gan no ārpuses (no tiem, kuru nolūks ir nelikumīgi iekļūt objekta teritorijā un izdarīt zādzību vai iekārtu bojājumu), gan no iepkšpuses (no personāla). Tāpat ir iespējams arī slepenas vienošanas variants, starp būvlaukumā strādajošiem cilvēkiem un cilvēkiem, kas iekļūt tajā no ārpuses.
  7 Hits securitystronghold.com  
Keyloggers is a kind of trackware that writes all keys that you press on your keyboard to a special file and sends them to remote hacker. Keyloggers are particularly used to steal usernames, passwords, email addresses, credit card numbers, etc.
Клавиатурные шпионы - это тип программного обеспечения по слежению, которое записывает все вариации наборов клавиш на Вашем компьютере в специальный файл и отправляет его третьим лицами (т.е. хакерам). Клавиатурные шпионы в особенности используются для организации кражи имен пользователей, паролей, адресов электронной почты, номеров кредитных карт и т.д. True Sword удаляет огромное количество клавиатурных шпионов. Для еще лучшей защиты Вашего ПК от данного вредоносного ПО, используйте Stronghold Antivirus, который блокирует ВСЕ типы клавиатурных шпионов, как известные, так и неизвестные.
  www.google.com.tw  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
Misalnya, kami menggunakan cookie yang disebut dengan 'SID' dan 'HSID' yang berisi rekaman ID akun Google milik pengguna yang dienkripsi dan ditandatangani secara digital serta waktu masuk yang terbaru. Kombinasi dari kedua cookie ini memungkinkan kami mencekal banyak jenis serangan, seperti upaya untuk mencuri konten formulir yang Anda selesaikan di laman web.
  2 Hits kb.adguard.com  
Current Yandex policy is to warn their users about any certificate that is not recognized by the browser. This is not unsubstantiated, because sometimes malicious apps can inject their own certificates and use this to harm the system and steal private data.
И Adguard, и Яндекс очень серьезно подходят к вопросу безопасности пользователя в сети. Текущая политика Яндекса предписывает предупреждать пользователей о любом сертификате безопасности, не распознаваемом браузером. Это не всегда необосновано, так как иногда вредоносные программы действительно могут вставлять свои сертификаты, наносить вред системе и красть личные данные.
  31 Hits fcac-acfc.gc.ca  
steal your money
de vous voler de l'argent
  unwomen.org  
“At night there is no security. We leave our leftover vegetables and go. Then men come and cut open the bags and steal kaukau, potatoes, bananas and coconut. In the morning we come and see. We bring our complaints to the police station, but the police do not help us.”
« Le marché n’est pas vraiment sûr » estime Janet Osi, une vendeuse qui travaille sur le marché de Gerehu. « La sécurité n’est pas assurée la nuit. Le soir, nous laissons sur place les légumes non vendus. Dès notre départ, des hommes viennent couper nos sacs pour voler leur contenu : kaukaus, pommes de terre, bananes et noix de coco. Le matin, nous n’avons plus qu’à constater les dégâts. Nous allons régulièrement porter plainte au commissariat de police, mais les forces de l’ordre ne nous aident pas ».
“El mercado no es muy seguro”, dice Janet Osi, vendedora en el mercado Geheru. “Por la noche no hay seguridad; dejamos las verduras y nos vamos. Los hombres llegan entonces, rompen las bolsas y roban los camotes, las papas, las bananas y los cocos. En la mañana llegamos, vemos lo que ha pasado, hacemos la denuncia ante la policía, pero ellos no nos prestan ayuda”.
  3 Hits censhare.com  
AI has become a huge topic in the last year. The predictions that machines will steal our jobs is a relevant subject for just about anyone. This article explains how Pearl, “the world’s first artificial intelligence ad awards jury president” still has a thing or two to learn about creativity, but doesn’t mean she can’t learn.
Künstliche Intelligenz wurde letztes Jahr ein großes Thema. Die Vorhersage, dass Maschinen uns unsere Arbeitsplätze stehlen werden, ist eigentlich für jeden ein wichtiges Thema. In diesem Artikel wird erklärt, wie Pearl, „der weltweit erste Jurypräsident für Preisverleihungen im Bereich Werbung mit künstlicher Intelligenz“, noch ein oder zwei Dinge über Kreativität lernen muss, was aber nicht bedeutet, dass er nicht lernen könnte.
  cbo-eco.ca  
Internal theft is committed by someone inside your business. Internal theft includes embezzlement, employee shoplifting and fraud. Although it can be hard to believe that a trusted employee would steal from you, it is important to take precautions.
Le vol interne est commis par quelqu'un au sein de votre entreprise. Le vol à l'interne comprend le détournement de fonds, le vol à l'étalage et la fraude. Même s'il peut être difficile de croire qu'un employé de confiance puisse vous voler, il est important de prendre des précautions.
  6 Hits africadocnetwork.com  
According to Egyptian law, dangerous waste material from hospitals must be burnt within the hospital itself, but in reality rubbish collectors steal most of it and recycle the items as new. Often these rubbish collectors are contaminated by the Hepatitis C virus – which is why Egypt has the fastest rate of increase in this virus in the world.
Selon les lois égyptiennes, les déchets hospitaliers dangereux doivent être brûlés dans l'enceinte des hôpitaux, mais en réalité les ramasseurs de poubelles en volent une grande partie pour les recycler en de nouveaux produits. Bien souvent, ces collecteurs de déchets sont ainsi contaminés par le virus de l'hépatite C, ce qui explique pourquoi l'Egypte est le pays où ce virus se propage le plus dans le monde.
  4 Hits google.com.sa  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
على سبيل المثال، نستخدم ملفي تعريف ارتباط اسمهما "SID" و"HSID" يتضمنان سجلات موقعة رقمية ومشفرة لمعرّف حساب Google للمستخدم وآخر وقت تم فيه تسجيل الدخول إلى هذا الحساب. ويتيح لنا الجمع بين ملفي تعريف الارتباط التصدي لأنواع متعددة من الهجوم مثل محاولات سرقة محتوى النماذج التي تكملها في صفحات الويب.
  2 Hits rrq.gouv.qc.ca  
As you can see, unless you leave your PAC or your other information where other people can see it, the various steps for authenticating put in place by the Régie make it difficult, in fact impossible, to steal your identity.
Comme on le voit, à moins qu'on ne laisse son CAP et ses autres renseignements personnels en terrain découvert, les différents stades d'authentification mis en place par la Régie rendent difficile, voire impossible, l'usurpation de votre identité.
  2 Hits interwetten.es  
Outwit the evil, old witch and steal the treasures from the gingerbread house with Hansel and Gretel!
Überlisten Sie die böse alte Hexe und stehlen Sie mit Hänsel und Gretel die Schätze aus dem Knusperhaus!
¡Engaña a la bruja y llévate con Hänsel y Gretel el tesoro de la cabaña de los dulces!
  uplayonline.com  
If the spin stops in crown category, test your skills in duels against others players and steal their seals! In duels, every player has to try to guess the price of five products, winning who remains closer.
¿Buscas un desafío mayor? ¡Cae en la casilla corona y reta a un duelo para robarle sus sellos! En los duelos cada uno deberá intentar adivinar el precio de cinco artículos y el que más se acerque se llevará la recompensa. Pero ten cuidado, si te pasas de largo tu respuesta quedará descartada. Saca provecho de los comodines para responder cuando tengas dudas sobre un precio y hazte con la victoria.
  5 Hits maps.google.co.th  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
ตัวอย่างเช่น เราใช้คุกกี้ที่เรียกว่า "SID" และ "HSID" ซึ่งบันทึกรหัสบัญชี Google ของผู้ใช้และเวลาที่ลงชื่อเข้าใช้ล่าสุดโดยมีการลงลายมือชื่อและเข้ารหัสแบบดิจิทัล การใช้คุกกี้ทั้งสองแบบนี้ร่วมกันทำให้เราสามารถบล็อกการโจมตีประเภทต่างๆ ได้ เช่น ความพยายามขโมยเนื้อหาในรูปแบบต่างๆ ที่คุณกรอกไว้บนหน้าเว็บ
  5 Hits maps.google.co.ug  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
على سبيل المثال، نستخدم ملفي تعريف ارتباط اسمهما "SID" و"HSID" يتضمنان سجلات موقعة رقمية ومشفرة لمعرّف حساب Google للمستخدم وآخر وقت تم فيه تسجيل الدخول إلى هذا الحساب. ويتيح لنا الجمع بين ملفي تعريف الارتباط التصدي لأنواع متعددة من الهجوم مثل محاولات سرقة محتوى النماذج التي تكملها في صفحات الويب.
  vadecity.com  
The best way to ensure the bicycle is to fix it to varis of his components: two chains and a storage space helmet there are always connected to the device so we realize if they are trying to steal the bike.
Bloqueamos la bici por tres partes: dos cadenas anticizalla y un espacio para guardar el casco, además en todo momento estamos conectados con el aparato, así que nos damos cuenta si están intentando robar la bicicleta.
  2 Hits arts.wales  
Production of David Mamet's 1975 play American Buffalo, which centres around four men and their plot to steal a priceless coin collection from a wealthy man who has previously swindled one of them. It will tour to 8 venues across Wales during September/October 2012.
Cynhyrchiad o ddrama 1975 David Mamet, American Buffalo, sy'n adrodd stori 4 dyn a'u cynllwyn i ddwyn gemwaith oddi wrth ddyn cyfoethog a dwyllasai un ohonynt. Â ar daith i 8 lleoliad ledled Cymru ym Medi/Hydref 2012.
  cbo-eco.ca  
Internal theft is committed by someone inside your business. Internal theft includes embezzlement, employee shoplifting and fraud. Although it can be hard to believe that a trusted employee would steal from you, it is important to take precautions.
Le vol interne est commis par quelqu'un au sein de votre entreprise. Le vol à l'interne comprend le détournement de fonds, le vol à l'étalage et la fraude. Même s'il peut être difficile de croire qu'un employé de confiance puisse vous voler, il est important de prendre des précautions.
  2 Hits cleo.on.ca  
Here are just a few examples of crimes that could affect your immigration status — driving while you are drunk, stealing even if you steal something of little value, assaulting your family or other people, having illegal drugs.
Voici quelques exemples de crimes qui pourraient toucher votre statut d'immigration : l'ivresse au volant; le vol d'objets, peu importe leur valeur; les voies de fait (agression), que ce soit à l'encontre de membres de votre famille ou d'autres personnes; ou la possession de drogues illégales.
  citybikewien.at  
Cycle uphill with the Citybike Uphill Team, steal the calves, strengthen the health and receive great prices!
Viel mehr als nur ein guter Job! Betriebselektriker gesucht! Raum Liestal
Arrow 1 2 3 4 5 6 7 8 9 10 Arrow