steal – Traduction – Dictionnaire Keybot
TTN Translation Network
TTN
TTN
Login
Deutsch
English
Langues sources
Langues cibles
Sélectionner
Sélectionner
Keybot
6'737
Résultats
1'991
Domaines Page 7
www.unwomen.org
Show text
Show cached source
Open source URL
“At night there is no security. We leave our leftover vegetables and go. Then men come and cut open the bags and
steal
kaukau, potatoes, bananas and coconut. In the morning we come and see. We bring our complaints to the police station, but the police do not help us.”
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
unwomen.org
as primary domain
« Le marché n’est pas vraiment sûr » estime Janet Osi, une vendeuse qui travaille sur le marché de Gerehu. « La sécurité n’est pas assurée la nuit. Le soir, nous laissons sur place les légumes non vendus. Dès notre départ, des hommes viennent couper nos sacs pour voler leur contenu : kaukaus, pommes de terre, bananes et noix de coco. Le matin, nous n’avons plus qu’à constater les dégâts. Nous allons régulièrement porter plainte au commissariat de police, mais les forces de l’ordre ne nous aident pas ».
2 Hits
kb.adguard.com
Show text
Show cached source
Open source URL
Current Yandex policy is to warn their users about any certificate that is not recognized by the browser. This is not unsubstantiated, because sometimes malicious apps can inject their own certificates and use this to harm the system and
steal
private data.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
kb.adguard.com
as primary domain
И Adguard, и Яндекс очень серьезно подходят к вопросу безопасности пользователя в сети. Текущая политика Яндекса предписывает предупреждать пользователей о любом сертификате безопасности, не распознаваемом браузером. Это не всегда необосновано, так как иногда вредоносные программы действительно могут вставлять свои сертификаты, наносить вред системе и красть личные данные.
71 Hits
www.rcmp.gc.ca
Show text
Show cached source
Open source URL
For example, scammers may sell a product – often at a very cheap price – just so they can
steal
your payment card or personal information. They may also take your money and send you a worthless item, or sometimes, nothing at all.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
rcmp.gc.ca
as primary domain
Ainsi, les escrocs peuvent vendre un produit - souvent à un prix ridiculement bas - juste pour s'emparer de vos renseignements personnels et des données de votre carte de paiement. Ils peuvent aussi prendre votre argent et vous envoyer un objet sans valeur, voire ne rien vous envoyer du tout.
6 Hits
www.pornqualitybbw.com
Show text
Show cached source
Open source URL
According to Egyptian law, dangerous waste material from hospitals must be burnt within the hospital itself, but in reality rubbish collectors
steal
most of it and recycle the items as new. Often these rubbish collectors are contaminated by the Hepatitis C virus – which is why Egypt has the fastest rate of increase in this virus in the world.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
africadocnetwork.com
as primary domain
Selon les lois égyptiennes, les déchets hospitaliers dangereux doivent être brûlés dans l'enceinte des hôpitaux, mais en réalité les ramasseurs de poubelles en volent une grande partie pour les recycler en de nouveaux produits. Bien souvent, ces collecteurs de déchets sont ainsi contaminés par le virus de l'hépatite C, ce qui explique pourquoi l'Egypte est le pays où ce virus se propage le plus dans le monde.
5 Hits
www.google.com.eg
Show text
Show cached source
Open source URL
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to
steal
the content of forms that you complete on web pages.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
google.com.eg
as primary domain
على سبيل المثال، نستخدم ملفي تعريف ارتباط اسمهما "SID" و"HSID" يتضمنان سجلات موقعة رقمية ومشفرة لمعرّف حساب Google للمستخدم وآخر وقت تم فيه تسجيل الدخول إلى هذا الحساب. ويتيح لنا الجمع بين ملفي تعريف الارتباط التصدي لأنواع متعددة من الهجوم مثل محاولات سرقة محتوى النماذج التي تكملها في صفحات الويب.
5 Hits
maps.google.com.ng
Show text
Show cached source
Open source URL
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to
steal
the content of forms that you complete on web pages.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
maps.google.com.ng
as primary domain
على سبيل المثال، نستخدم ملفي تعريف ارتباط اسمهما "SID" و"HSID" يتضمنان سجلات موقعة رقمية ومشفرة لمعرّف حساب Google للمستخدم وآخر وقت تم فيه تسجيل الدخول إلى هذا الحساب. ويتيح لنا الجمع بين ملفي تعريف الارتباط التصدي لأنواع متعددة من الهجوم مثل محاولات سرقة محتوى النماذج التي تكملها في صفحات الويب.
2 Hits
www.seth.pt
Show text
Show cached source
Open source URL
Outwit the evil, old witch and
steal
the treasures from the gingerbread house with Hansel and Gretel!
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
interwetten.es
as primary domain
Überlisten Sie die böse alte Hexe und stehlen Sie mit Hänsel und Gretel die Schätze aus dem Knusperhaus!
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
interwetten.es
as primary domain
¡Engaña a la bruja y llévate con Hänsel y Gretel el tesoro de la cabaña de los dulces!
designmotivators.com
Show text
Show cached source
Open source URL
Increase the chances of a stolen vehicle being recovered before thieves damage it or steal its cargo. In addition, you can discuss insurance conditions with your insurance company. You might discover that you are eligible for lower insurance rates with an immobilizer installed in your vehicle.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
frotcom.com
as primary domain
Aumente a probabilidade de recuperar um veículo roubado antes que os ladrões o danifiquem ou roubem a carga. Além disso, pode discutir condições de seguro com a sua companhia de seguros. Pode descobrir que é elegível para tarifas de seguro mais baixas com um imobilizador instalado no seu veículo.
7 Hits
present4d.com
Show text
Show cached source
Open source URL
Keyloggers is a kind of trackware that writes all keys that you press on your keyboard to a special file and sends them to remote hacker. Keyloggers are particularly used to
steal
usernames, passwords, email addresses, credit card numbers, etc.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
securitystronghold.com
as primary domain
Клавиатурные шпионы - это тип программного обеспечения по слежению, которое записывает все вариации наборов клавиш на Вашем компьютере в специальный файл и отправляет его третьим лицами (т.е. хакерам). Клавиатурные шпионы в особенности используются для организации кражи имен пользователей, паролей, адресов электронной почты, номеров кредитных карт и т.д. True Sword удаляет огромное количество клавиатурных шпионов. Для еще лучшей защиты Вашего ПК от данного вредоносного ПО, используйте Stronghold Antivirus, который блокирует ВСЕ типы клавиатурных шпионов, как известные, так и неизвестные.
7 Hits
www.google.hu
Show text
Show cached source
Open source URL
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to
steal
the content of forms that you complete on web pages.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
google.hu
as primary domain
Például az „SID” és a „HSID” nevű cookie-kat használjuk a felhasználó Google Fiókjához tartozó azonosító digitálisan aláírt és titkosított adatainak és a legutóbbi bejelentkezési időpont tárolására. Ennek a két cookie-nak a segítségével számos támadást meg tudunk akadályozni, például a weboldalakon kitöltött űrlapok tartalmának ellopására irányuló kísérleteket is.
21 Hits
www.getcybersafe.gc.ca
Show text
Show cached source
Open source URL
But criminals behind escrow scams create fake escrow sites intended to spoof -- or look identical to -- the real thing. Before you know it, you're making a payment to a criminal out to
steal
your money.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
getcybersafe.gc.ca
as primary domain
Les criminels gèrent parfois des sites de services d'entiercement frauduleux. Ils subtiliseront votre argent et s'enfuiront ensuite. Les sites légitimes d'entiercement font le paiement à la place du client pour assurer les achats importants. Cependant, les criminels qui procèdent aux escroqueries par des sites d'entiercement créent de faux sites dans le seul et unique but de duper le client. Ces sites paraissent identiques aux originaux. Sans le savoir, le client « autorise » un criminel à lui voler son argent.
6 Hits
www.asianlii.org
Show text
Show cached source
Open source URL
For example: In two cases where M and N separately
steal
assets and which have the same other details, but M steals an asset at the value of 55 million dong, and N steals an asset at the value of 195 million dong, the Judge shall apply Point e of Article 138 of the Penal Code to M and N but decide a heavier penalty to N than M.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
asianlii.org
as primary domain
Ví dụ: Cùng phạm tội trộm cắp tài sản, nếu trong hai vụ án có cùng các tình tiết khác như nhau, nhưng trong vụ án thứ nhất M trộm cắp tài sản có giá trị 55 triệu đồng, còn trong vụ án thứ hai N trộm cắp tài sản có giá trị 195 triệu đồng, thì tuy cùng áp dụng điểm e khoản 2 Điều 138 BLHS để xử phạt các bị cáo, song cần phải quyết định hình phạt đối với N nặng hơn M.
www.chastel-marechal.com
Show text
Show cached source
Open source URL
From electrically or gas heated melting furnaces, dewaxing furnaces or core drying furnaces to fully automatic annealing plants for aluminum or
steal
, Nabertherm covers professionally all applications for the foundry industry.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
nabertherm.com
as primary domain
Con nuestros hornos de fundición con calefacción eléctrica o de gas, hornos de fundición a la cera perdida, hornos de noyos y tratamiento térmico, instalaciones de revenido totalmente automáticas para aluminio o acero, sin duda, cubrimos de forma profesional las necesidades del sector de la fundición.
www.bowa-medical.com
Show text
Show cached source
Open source URL
It means that someone is taking advantage of another person to make money or get some other benefit out of them. Abusers can use many ways to force others to act against their will, for example to sell sex, beg,
steal
or work on poor conditions.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
ihmiskauppa.fi
as primary domain
Människohandel är ett allvarligt brott där människor utnyttjas för att genom dem uppnå ekonomisk eller annan vinning. Med hjälp av olika metoder kan en människa förmås att handla mot sin egen vilja, till exempel att sälja sex, tigga, stjäla eller arbeta enligt dåliga villkor.
3 Hits
www.billetterie.losc.fr
Show text
Show cached source
Open source URL
AI has become a huge topic in the last year. The predictions that machines will
steal
our jobs is a relevant subject for just about anyone. This article explains how Pearl, “the world’s first artificial intelligence ad awards jury president” still has a thing or two to learn about creativity, but doesn’t mean she can’t learn.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
censhare.com
as primary domain
Künstliche Intelligenz wurde letztes Jahr ein großes Thema. Die Vorhersage, dass Maschinen uns unsere Arbeitsplätze stehlen werden, ist eigentlich für jeden ein wichtiges Thema. In diesem Artikel wird erklärt, wie Pearl, „der weltweit erste Jurypräsident für Preisverleihungen im Bereich Werbung mit künstlicher Intelligenz“, noch ein oder zwei Dinge über Kreativität lernen muss, was aber nicht bedeutet, dass er nicht lernen könnte.
3 Hits
www.changfengcn.com
Show text
Show cached source
Open source URL
Good bots monitor and improve content on the Internet, like those used by Google in order to improve search and organization of content on the Internet, while bad bots those who
steal
content from sites, create spam or carrying out attacks with the aim of bringing down websites.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
hotelmedena.com
as primary domain
Gute Bots überwachen und verbessern Inhalte im Internet, wie wie jene die Google verwendet, um die Suche und Organisation des Inhalt im Internet zu verbessern, während die schlechte Bots sind diejenigen, die Inhalte des Websites stehlen, erstellen Spam oder durchführen die Angriffen mit dem Ziel der Website abzureißen. Die Forschung hat gezeigt, dass schlechte Bots den Werbetreibende 7 Milliarden Dollar kosten.
5 Hits
maps.google.com.ph
Show text
Show cached source
Open source URL
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to
steal
the content of forms that you complete on web pages.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
maps.google.com.ph
as primary domain
على سبيل المثال، نستخدم ملفي تعريف ارتباط اسمهما "SID" و"HSID" يتضمنان سجلات موقعة رقمية ومشفرة لمعرّف حساب Google للمستخدم وآخر وقت تم فيه تسجيل الدخول إلى هذا الحساب. ويتيح لنا الجمع بين ملفي تعريف الارتباط التصدي لأنواع متعددة من الهجوم مثل محاولات سرقة محتوى النماذج التي تكملها في صفحات الويب.
2 Hits
agropolisfondation.optimytool.com
Show text
Show cached source
Open source URL
Production of David Mamet's 1975 play American Buffalo, which centres around four men and their plot to
steal
a priceless coin collection from a wealthy man who has previously swindled one of them. It will tour to 8 venues across Wales during September/October 2012.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
arts.wales
as primary domain
Cynhyrchiad o ddrama 1975 David Mamet, American Buffalo, sy'n adrodd stori 4 dyn a'u cynllwyn i ddwyn gemwaith oddi wrth ddyn cyfoethog a dwyllasai un ohonynt. Â ar daith i 8 lleoliad ledled Cymru ym Medi/Hydref 2012.
2 Hits
www.rrq.gouv.qc.ca
Show text
Show cached source
Open source URL
As you can see, unless you leave your PAC or your other information where other people can see it, the various steps for authenticating put in place by the Régie make it difficult, in fact impossible, to
steal
your identity.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
rrq.gouv.qc.ca
as primary domain
Comme on le voit, à moins qu'on ne laisse son CAP et ses autres renseignements personnels en terrain découvert, les différents stades d'authentification mis en place par la Régie rendent difficile, voire impossible, l'usurpation de votre identité.
explore.nature.ca
Show text
Show cached source
Open source URL
Harvest enough plant material to make it through the long winter. While harvesting, watch out for predators or other pikas that want to
steal
your haypile away! As a pika, you need to prepare for winter by harvesting and haying plant material.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
explore.nature.ca
as primary domain
Devenez un pika! Récoltez suffisamment de végétaux pour l'hiver. Mais attention aux prédateurs et aux autres pikas qui pourraient voler vos provisions ! Pour vous préparer à l'hiver, vous devez cueillir et accumuler suffisamment de végétaux. Choisissez des plantes très variées. Pendant la récolte, vous prendrez une pause-déjeuner au milieu de ces herbes grasses. Mais attention aux prédateurs et aux compétiteurs!
9 Hits
sus.ziti.uni-heidelberg.de
Show text
Show cached source
Open source URL
*The “Dirty Dozen” Companies That
Steal
Wages
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
radiobilingue.org
as primary domain
*Las “doce tramposas” compañías que acostumbran robar salarios
11 Hits
personal-backup.rathlev-home.de
Show text
Show cached source
Open source URL
SBU detained a Russian citizen, who tried to
steal
the Ukrainian military plane
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
liveuamap.com
as primary domain
СБУ задержала россиянина, который пытался похитить украинской военный самолет
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
liveuamap.com
as primary domain
СБУ затримала росіянина, який намагався викрасти українській військовий літак
www.eurobats.org
Show text
Show cached source
Open source URL
Cycle uphill with the Citybike Uphill Team, steal the calves, strengthen the health and receive great prices!
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
citybikewien.at
as primary domain
Viel mehr als nur ein guter Job! Betriebselektriker gesucht! Raum Liestal
5 Hits
maps.google.co.th
Show text
Show cached source
Open source URL
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to
steal
the content of forms that you complete on web pages.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
maps.google.co.th
as primary domain
ตัวอย่างเช่น เราใช้คุกกี้ที่เรียกว่า "SID" และ "HSID" ซึ่งบันทึกรหัสบัญชี Google ของผู้ใช้และเวลาที่ลงชื่อเข้าใช้ล่าสุดโดยมีการลงลายมือชื่อและเข้ารหัสแบบดิจิทัล การใช้คุกกี้ทั้งสองแบบนี้ร่วมกันทำให้เราสามารถบล็อกการโจมตีประเภทต่างๆ ได้ เช่น ความพยายามขโมยเนื้อหาในรูปแบบต่างๆ ที่คุณกรอกไว้บนหน้าเว็บ
editions.louvre.fr
Show text
Show cached source
Open source URL
This new collection of “Detective” game-books begins with two titles on the Louvre. A wrongdoer is threatening to
steal
a masterpiece from the museum. The curator of the museum is calling on young visitors to help him find the masterpiece and put it out of harm’s way.
Compare text pages
Compare HTM pages
Open source URL
Open target URL
Define
editions.louvre.fr
as primary domain
Cette nouvelle collection de livrets-jeux « enquête au musée » s’ouvre par deux titres consacrés au musée du Louvre. Un malfaiteur menace le musée de dérober une œuvre célèbre. Le directeur du musée demande aux jeunes visiteurs de l’aider à trouver cette œuvre pour la mettre à l’abri.
1
2
3
4
5
6
7
8
9
10