steal – Übersetzung – Keybot-Wörterbuch

Spacer TTN Translation Network TTN TTN Login Français English Spacer Help
Ausgangssprachen Zielsprachen
Keybot      6'737 Ergebnisse   1'991 Domänen   Seite 7
  5 Treffer www.recettemunicipale.gov.tn  
  11 Treffer www.google.com.sg  
Michel steals and gets caught by the police. After the jail, his mother dies and he learns to steal professionally.
Michel vole et se fait prendre. Après la prison, sa mère meurt et pour se remettre au travail, il prend des cours chez un professionel.
  16 Treffer www.surt.org  
Just like burglars and thieves, cyber criminals have many different ways to steal personal information and money. Just as you wouldn’t give a burglar the key to your house, make sure to protect yourself from fraud and online identity theft.
À l'instar des cambrioleurs et des voleurs, les cybercriminels font preuve d'imagination pour dérober des informations personnelles et de l'argent. Tout comme vous ne donneriez pas la clé de votre maison à un cambrioleur, veillez à vous protéger contre la fraude et l'usurpation d'identité en ligne. À cette fin, il est utile de connaître les astuces auxquelles ont souvent recours les pirates informatiques. Voici quelques conseils simples.
Wie Einbrecher und Diebe kennen auch Cyberkriminelle viele verschiedene Möglichkeiten, um personenbezogene Daten und Geld zu stehlen. Genauso wenig, wie Sie einem Einbrecher Ihren Haustürschlüssel anvertrauen würden, dürfen Sie online Betrug oder Identitätsdiebstahl zulassen. Informieren Sie sich über die häufig eingesetzten Tricks der Kriminellen, um sich vor Online-Betrug und Identitätsdiebstahl zu schützen. Wir haben ein paar einfache Tipps für Sie.
Al igual que los ladrones, los piratas informáticos tienen muchas formas diferentes de robar dinero e información. Del mismo modo que no le darías la llave de tu casa a un ladrón, debes asegurarte de protegerte contra el fraude y el robo de identidad online. Descubre los trucos habituales que utilizan los piratas informáticos para que puedas protegerte del fraude online y del robo de información. A continuación te indicamos algunas sugerencias sencillas.
Come i ladri, i criminali informatici conoscono tanti modi diversi per rubare informazioni personali e denaro. Così come non daresti la chiave di casa tua a un ladro, assicurati di proteggerti dalle frodi e dal furto d'identità online. È bene conoscere i trucchi comuni adottati dai criminali informatici per proteggerti dalle frodi e dal furto d'identità online. In questa sezione vengono forniti alcuni semplici suggerimenti.
As the price for copper surpasses $4.00 a pound, many companies face threats from thieves who steal bulk copper. Wire that is energized has not deterred some criminals. Often sites for theft have baseline security measures in place.
Ci spiace, ma questo articolo è disponibile soltanto in Inglese Americano. Per ragioni di convenienza del visitatore, il contenuto è mostrato sotto nella lingua alternativa. Puoi cliccare sul link per cambiare la lingua attiva.As the price for copper surpasses $4.00 a pound, many companies face threats from thieves who steal bulk copper. Wire that is energized has not deterred some criminals. Often sites for theft have baseline security measures in place. But it is still a challenge to find a...
  4 Treffer www.teara.govt.nz  
Sometimes patupaiarehe would put people under a spell and steal them away. They made love to beautiful women, and some people thought their children were the redheads called urukehu. To keep them away, people would paint themselves with smelly mixtures, or cook food, because patupaiarehe hated the smell.
He rite te mākutu me te kāhaki a te patupaiarehe i ngā tāngata. Ka aitia e rātou ngā wāhine ātaahua kia puta he tamariki urukehu. Hei ārai i a rātou, ka pani ngā tāngata i a rātou ki te hinu haunga, ka tunu kai rānei i te mea he anuanu ki te patupaiarehe te haunga o te kai. He pērā anō mō te rā me te mura o te ahi, ka wehi te patupaiarehe.
  www.unwomen.org  
“At night there is no security. We leave our leftover vegetables and go. Then men come and cut open the bags and steal kaukau, potatoes, bananas and coconut. In the morning we come and see. We bring our complaints to the police station, but the police do not help us.”
« Le marché n’est pas vraiment sûr » estime Janet Osi, une vendeuse qui travaille sur le marché de Gerehu. « La sécurité n’est pas assurée la nuit. Le soir, nous laissons sur place les légumes non vendus. Dès notre départ, des hommes viennent couper nos sacs pour voler leur contenu : kaukaus, pommes de terre, bananes et noix de coco. Le matin, nous n’avons plus qu’à constater les dégâts. Nous allons régulièrement porter plainte au commissariat de police, mais les forces de l’ordre ne nous aident pas ».
“El mercado no es muy seguro”, dice Janet Osi, vendedora en el mercado Geheru. “Por la noche no hay seguridad; dejamos las verduras y nos vamos. Los hombres llegan entonces, rompen las bolsas y roban los camotes, las papas, las bananas y los cocos. En la mañana llegamos, vemos lo que ha pasado, hacemos la denuncia ante la policía, pero ellos no nos prestan ayuda”.
  www.soroptimist.org  
Is also known as the author of jokes to people and pets, and can ride a horse at night, in the village streets (Roccalberti), place his hand pierced on the mouth of a dormant (Vitoio), steal or disrupt laundry may also cause the evil eye, especially to children, through their clothes hung to dry.
È peraltro noto anche come autore di scherzi alle persone ed agli animali domestici; può cavalcare una cavalla, di notte, per le strade del paese (Roccalberti), appoggiare la sua mano bucata sulla bocca di un dormiente (Vitoio), rubare o scompigliare il bucato; può anche arrecare il malocchio, soprattutto ai bambini, attraverso i loro indumenti appesi ad asciugare.
  pepsicoprivacypolicy.com  
The Hammond Security Wall Box (SWB) Series boasts a simple but strong design. Constructed of heavy duty formed steal with premium smooth powder coating the SWB is ideal for mounting CCTV power distribution equipment.
La conception du boîtier mural de sécurité de Hammond (SWB) est simple mais robuste. En tôle d'acier robuste et protégé par un revêtement lisse en poudre de première qualité, le boîtier est idéal pour le montage de l'équipement de distribution électrique de caméras de télévision en circuit fermé. Porte à charnière verrouillable offerte en option, plusieurs alvéoles défonçables pour conduits, panneau intérieur offert en option et homologation UL.
  empire-massage.lviv.ua  
The threats for safety may come both from outside (from persons, who are planning to get to the object's territory illegally and to steal or damage the property) and from the inner side (personnel). There is also a possibility of collusion between people who work on the object and people from the outside.
Draudi drošībai var nākt gan no ārpuses (no tiem, kuru nolūks ir nelikumīgi iekļūt objekta teritorijā un izdarīt zādzību vai iekārtu bojājumu), gan no iepkšpuses (no personāla). Tāpat ir iespējams arī slepenas vienošanas variants, starp būvlaukumā strādajošiem cilvēkiem un cilvēkiem, kas iekļūt tajā no ārpuses.
  numismatics.org  
TENAX FULL COVER is a non-woven fabric permeable to water, air and fertilizers, but prevents the growth of weeds wich would otherwise steal nourishment from cutivations. Ideal for flowerbeds or as a substrate for a driveways.
TENAX FULL COVER è un tessuto-non tessuto permeabile, consente il passaggio di aria, acqua e fertilizzanti, ma impedisce la crescita delle erbacce che altrimenti toglierebbero nutrimento alle piante coltivate. Ideale per aiuole o come sottofondo per vialetti, necessita di copertura con ghiaia o corteccia.
  www.chastel-marechal.com  
From electrically or gas heated melting furnaces, dewaxing furnaces or core drying furnaces to fully automatic annealing plants for aluminum or steal, Nabertherm covers professionally all applications for the foundry industry.
Con nuestros hornos de fundición con calefacción eléctrica o de gas, hornos de fundición a la cera perdida, hornos de noyos y tratamiento térmico, instalaciones de revenido totalmente automáticas para aluminio o acero, sin duda, cubrimos de forma profesional las necesidades del sector de la fundición.
Dai forni fusori riscaldati elettricamente o a gas ai forni per microfusione cera persa, dagli essiccatori fino al trattamento termico compresi gli impianti di bonifica completamente automatizzati per alluminio o acciaio: siamo in grado di coprire in modo professionale tutte le necessità dell’industria fondiaria.
Από ηλεκτρικά ή με αέριο λειτουργούντες κλιβάνους τήξης ή κλιβάνους ξήρανσης πυρήνων μέχρι κλιβάνους θερμικής επεξεργασίας και πλήρως αυτόματες εγκαταστάσεις επιβελτίωσης αλουμινίου ή χάλυβα θα βρείτε τα πάντα για τις ανάγκες της βιομηχανίας χύτευσης.
Kezdve a villamos- vagy gázfűtésű olvasztó kemencével a viasz kiolvasztó vagy magszárító kemencéken keresztül egészen az alumínium vagy acél kezelésére alkalmas teljesen automatikus nemesítő berendezésekig professzionális módon lefedjük az öntőipar feladatait.
Profesjonalnie spełniany potrzeby przemysłu odlewniczego – od pieców elektrycznych i gazowych do wytapiania, poprzez piece do odlewania metodą wosku traconego, piece do suszenia rdzeni, aż do pieców do obróbki cieplnej, łącznie z pełni automatycznymi urządzeniami do uszlachetniania aluminium i stali.
Elektrikli veya gaz ısıtmalı ergitme fırınından tutun, vaks eritme fırınından veya çekirdek kurutma fırınından, aluminyum veya çelik için tam otomatik suverme sistemi dahil ısıl işleme varana kadar, dökümcülük endüstrisiyle ilgili hizmetleri profesyonel anlayışla yerine getiriyoruz.
  5 Treffer maps.google.com.gh  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
على سبيل المثال، نستخدم ملفي تعريف ارتباط اسمهما "SID" و"HSID" يتضمنان سجلات موقعة رقمية ومشفرة لمعرّف حساب Google للمستخدم وآخر وقت تم فيه تسجيل الدخول إلى هذا الحساب. ويتيح لنا الجمع بين ملفي تعريف الارتباط التصدي لأنواع متعددة من الهجوم مثل محاولات سرقة محتوى النماذج التي تكملها في صفحات الويب.
  5 Treffer maps.google.com.ng  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
على سبيل المثال، نستخدم ملفي تعريف ارتباط اسمهما "SID" و"HSID" يتضمنان سجلات موقعة رقمية ومشفرة لمعرّف حساب Google للمستخدم وآخر وقت تم فيه تسجيل الدخول إلى هذا الحساب. ويتيح لنا الجمع بين ملفي تعريف الارتباط التصدي لأنواع متعددة من الهجوم مثل محاولات سرقة محتوى النماذج التي تكملها في صفحات الويب.
  3 Treffer www.billetterie.losc.fr  
AI has become a huge topic in the last year. The predictions that machines will steal our jobs is a relevant subject for just about anyone. This article explains how Pearl, “the world’s first artificial intelligence ad awards jury president” still has a thing or two to learn about creativity, but doesn’t mean she can’t learn.
Künstliche Intelligenz wurde letztes Jahr ein großes Thema. Die Vorhersage, dass Maschinen uns unsere Arbeitsplätze stehlen werden, ist eigentlich für jeden ein wichtiges Thema. In diesem Artikel wird erklärt, wie Pearl, „der weltweit erste Jurypräsident für Preisverleihungen im Bereich Werbung mit künstlicher Intelligenz“, noch ein oder zwei Dinge über Kreativität lernen muss, was aber nicht bedeutet, dass er nicht lernen könnte.
  21 Treffer www.pensezcybersecurite.gc.ca  
But criminals behind escrow scams create fake escrow sites intended to spoof -- or look identical to -- the real thing. Before you know it, you're making a payment to a criminal out to steal your money.
Les criminels gèrent parfois des sites de services d'entiercement frauduleux. Ils subtiliseront votre argent et s'enfuiront ensuite. Les sites légitimes d'entiercement font le paiement à la place du client pour assurer les achats importants. Cependant, les criminels qui procèdent aux escroqueries par des sites d'entiercement créent de faux sites dans le seul et unique but de duper le client. Ces sites paraissent identiques aux originaux. Sans le savoir, le client « autorise » un criminel à lui voler son argent.
  5 Treffer maps.google.co.th  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
ตัวอย่างเช่น เราใช้คุกกี้ที่เรียกว่า "SID" และ "HSID" ซึ่งบันทึกรหัสบัญชี Google ของผู้ใช้และเวลาที่ลงชื่อเข้าใช้ล่าสุดโดยมีการลงลายมือชื่อและเข้ารหัสแบบดิจิทัล การใช้คุกกี้ทั้งสองแบบนี้ร่วมกันทำให้เราสามารถบล็อกการโจมตีประเภทต่างๆ ได้ เช่น ความพยายามขโมยเนื้อหาในรูปแบบต่างๆ ที่คุณกรอกไว้บนหน้าเว็บ
  maps.google.co.nz  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
على سبيل المثال، نستخدم ملفي تعريف ارتباط اسمهما "SID" و"HSID" يتضمنان سجلات موقعة رقمية ومشفرة لمعرّف حساب Google للمستخدم وآخر وقت تم فيه تسجيل الدخول إلى هذا الحساب. ويتيح لنا الجمع بين ملفي تعريف الارتباط التصدي لأنواع متعددة من الهجوم مثل محاولات سرقة محتوى النماذج التي تكملها في صفحات الويب.
  4 Treffer www.google.com.lb  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
على سبيل المثال، نستخدم ملفي تعريف ارتباط اسمهما "SID" و"HSID" يتضمنان سجلات موقعة رقمية ومشفرة لمعرّف حساب Google للمستخدم وآخر وقت تم فيه تسجيل الدخول إلى هذا الحساب. ويتيح لنا الجمع بين ملفي تعريف الارتباط التصدي لأنواع متعددة من الهجوم مثل محاولات سرقة محتوى النماذج التي تكملها في صفحات الويب.
  5 Treffer www.google.com.eg  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
على سبيل المثال، نستخدم ملفي تعريف ارتباط اسمهما "SID" و"HSID" يتضمنان سجلات موقعة رقمية ومشفرة لمعرّف حساب Google للمستخدم وآخر وقت تم فيه تسجيل الدخول إلى هذا الحساب. ويتيح لنا الجمع بين ملفي تعريف الارتباط التصدي لأنواع متعددة من الهجوم مثل محاولات سرقة محتوى النماذج التي تكملها في صفحات الويب.
  7 Treffer www.google.hu  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
Például az „SID” és a „HSID” nevű cookie-kat használjuk a felhasználó Google Fiókjához tartozó azonosító digitálisan aláírt és titkosított adatainak és a legutóbbi bejelentkezési időpont tárolására. Ennek a két cookie-nak a segítségével számos támadást meg tudunk akadályozni, például a weboldalakon kitöltött űrlapok tartalmának ellopására irányuló kísérleteket is.
  4 Treffer www.google.com.sa  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
على سبيل المثال، نستخدم ملفي تعريف ارتباط اسمهما "SID" و"HSID" يتضمنان سجلات موقعة رقمية ومشفرة لمعرّف حساب Google للمستخدم وآخر وقت تم فيه تسجيل الدخول إلى هذا الحساب. ويتيح لنا الجمع بين ملفي تعريف الارتباط التصدي لأنواع متعددة من الهجوم مثل محاولات سرقة محتوى النماذج التي تكملها في صفحات الويب.
  3 Treffer www.changfengcn.com  
Good bots monitor and improve content on the Internet, like those used by Google in order to improve search and organization of content on the Internet, while bad bots those who steal content from sites, create spam or carrying out attacks with the aim of bringing down websites.
Gute Bots überwachen und verbessern Inhalte im Internet, wie wie jene die Google verwendet, um die Suche und Organisation des Inhalt im Internet zu verbessern, während die schlechte Bots sind diejenigen, die Inhalte des Websites stehlen, erstellen Spam oder durchführen die Angriffen mit dem Ziel der Website abzureißen. Die Forschung hat gezeigt, dass schlechte Bots den Werbetreibende 7 Milliarden Dollar kosten.
  explore.nature.ca  
Harvest enough plant material to make it through the long winter. While harvesting, watch out for predators or other pikas that want to steal your haypile away! As a pika, you need to prepare for winter by harvesting and haying plant material.
Devenez un pika! Récoltez suffisamment de végétaux pour l'hiver. Mais attention aux prédateurs et aux autres pikas qui pourraient voler vos provisions ! Pour vous préparer à l'hiver, vous devez cueillir et accumuler suffisamment de végétaux. Choisissez des plantes très variées. Pendant la récolte, vous prendrez une pause-déjeuner au milieu de ces herbes grasses. Mais attention aux prédateurs et aux compétiteurs!
  7 Treffer present4d.com  
Keyloggers is a kind of trackware that writes all keys that you press on your keyboard to a special file and sends them to remote hacker. Keyloggers are particularly used to steal usernames, passwords, email addresses, credit card numbers, etc.
Клавиатурные шпионы - это тип программного обеспечения по слежению, которое записывает все вариации наборов клавиш на Вашем компьютере в специальный файл и отправляет его третьим лицами (т.е. хакерам). Клавиатурные шпионы в особенности используются для организации кражи имен пользователей, паролей, адресов электронной почты, номеров кредитных карт и т.д. True Sword удаляет огромное количество клавиатурных шпионов. Для еще лучшей защиты Вашего ПК от данного вредоносного ПО, используйте Stronghold Antivirus, который блокирует ВСЕ типы клавиатурных шпионов, как известные, так и неизвестные.
  21 Treffer www.getcybersafe.gc.ca  
But criminals behind escrow scams create fake escrow sites intended to spoof -- or look identical to -- the real thing. Before you know it, you're making a payment to a criminal out to steal your money.
Les criminels gèrent parfois des sites de services d'entiercement frauduleux. Ils subtiliseront votre argent et s'enfuiront ensuite. Les sites légitimes d'entiercement font le paiement à la place du client pour assurer les achats importants. Cependant, les criminels qui procèdent aux escroqueries par des sites d'entiercement créent de faux sites dans le seul et unique but de duper le client. Ces sites paraissent identiques aux originaux. Sans le savoir, le client « autorise » un criminel à lui voler son argent.
  www.bowa-medical.com  
It means that someone is taking advantage of another person to make money or get some other benefit out of them. Abusers can use many ways to force others to act against their will, for example to sell sex, beg, steal or work on poor conditions.
Människohandel är ett allvarligt brott där människor utnyttjas för att genom dem uppnå ekonomisk eller annan vinning. Med hjälp av olika metoder kan en människa förmås att handla mot sin egen vilja, till exempel att sälja sex, tigga, stjäla eller arbeta enligt dåliga villkor.
  designmotivators.com  
Increase the chances of a stolen vehicle being recovered before thieves damage it or steal its cargo. In addition, you can discuss insurance conditions with your insurance company. You might discover that you are eligible for lower insurance rates with an immobilizer installed in your vehicle.
Aumente a probabilidade de recuperar um veículo roubado antes que os ladrões o danifiquem ou roubem a carga. Além disso, pode discutir condições de seguro com a sua companhia de seguros. Pode descobrir que é elegível para tarifas de seguro mais baixas com um imobilizador instalado no seu veículo.
  5 Treffer maps.google.ie  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
على سبيل المثال، نستخدم ملفي تعريف ارتباط اسمهما "SID" و"HSID" يتضمنان سجلات موقعة رقمية ومشفرة لمعرّف حساب Google للمستخدم وآخر وقت تم فيه تسجيل الدخول إلى هذا الحساب. ويتيح لنا الجمع بين ملفي تعريف الارتباط التصدي لأنواع متعددة من الهجوم مثل محاولات سرقة محتوى النماذج التي تكملها في صفحات الويب.
  6 Treffer www.asianlii.org  
For example: In two cases where M and N separately steal assets and which have the same other details, but M steals an asset at the value of 55 million dong, and N steals an asset at the value of 195 million dong, the Judge shall apply Point e of Article 138 of the Penal Code to M and N but decide a heavier penalty to N than M.
Ví dụ: Cùng phạm tội trộm cắp tài sản, nếu trong hai vụ án có cùng các tình tiết khác như nhau, nhưng trong vụ án thứ nhất M trộm cắp tài sản có giá trị 55 triệu đồng, còn trong vụ án thứ hai N trộm cắp tài sản có giá trị 195 triệu đồng, thì tuy cùng áp dụng điểm e khoản 2 Điều 138 BLHS để xử phạt các bị cáo, song cần phải quyết định hình phạt đối với N nặng hơn M.
  2 Treffer agropolisfondation.optimytool.com  
Production of David Mamet's 1975 play American Buffalo, which centres around four men and their plot to steal a priceless coin collection from a wealthy man who has previously swindled one of them. It will tour to 8 venues across Wales during September/October 2012.
Cynhyrchiad o ddrama 1975 David Mamet, American Buffalo, sy'n adrodd stori 4 dyn a'u cynllwyn i ddwyn gemwaith oddi wrth ddyn cyfoethog a dwyllasai un ohonynt. Â ar daith i 8 lleoliad ledled Cymru ym Medi/Hydref 2012.
  2 Treffer kb.adguard.com  
Current Yandex policy is to warn their users about any certificate that is not recognized by the browser. This is not unsubstantiated, because sometimes malicious apps can inject their own certificates and use this to harm the system and steal private data.
И Adguard, и Яндекс очень серьезно подходят к вопросу безопасности пользователя в сети. Текущая политика Яндекса предписывает предупреждать пользователей о любом сертификате безопасности, не распознаваемом браузером. Это не всегда необосновано, так как иногда вредоносные программы действительно могут вставлять свои сертификаты, наносить вред системе и красть личные данные.
  6 Treffer www.pornqualitybbw.com  
According to Egyptian law, dangerous waste material from hospitals must be burnt within the hospital itself, but in reality rubbish collectors steal most of it and recycle the items as new. Often these rubbish collectors are contaminated by the Hepatitis C virus – which is why Egypt has the fastest rate of increase in this virus in the world.
Selon les lois égyptiennes, les déchets hospitaliers dangereux doivent être brûlés dans l'enceinte des hôpitaux, mais en réalité les ramasseurs de poubelles en volent une grande partie pour les recycler en de nouveaux produits. Bien souvent, ces collecteurs de déchets sont ainsi contaminés par le virus de l'hépatite C, ce qui explique pourquoi l'Egypte est le pays où ce virus se propage le plus dans le monde.
  71 Treffer www.rcmp.gc.ca  
For example, scammers may sell a product – often at a very cheap price – just so they can steal your payment card or personal information. They may also take your money and send you a worthless item, or sometimes, nothing at all.
Ainsi, les escrocs peuvent vendre un produit - souvent à un prix ridiculement bas - juste pour s'emparer de vos renseignements personnels et des données de votre carte de paiement. Ils peuvent aussi prendre votre argent et vous envoyer un objet sans valeur, voire ne rien vous envoyer du tout.
  2 Treffer www.rrq.gouv.qc.ca  
As you can see, unless you leave your PAC or your other information where other people can see it, the various steps for authenticating put in place by the Régie make it difficult, in fact impossible, to steal your identity.
Comme on le voit, à moins qu'on ne laisse son CAP et ses autres renseignements personnels en terrain découvert, les différents stades d'authentification mis en place par la Régie rendent difficile, voire impossible, l'usurpation de votre identité.
  finance.nctu.edu.tw  
4. During the call, do not dwell on the “Privacy”. Believe me, the benefits of free exchange of ideas outweigh the risk that someone will steal your ideas. Ideas are cheap, and their expression in life – much more expensive.
4. Під час розмови не зациклюйтеся на «конфіденційності». Повірте, що вигода від вільного обміну думками переважує ризик того, що хто-небудь вкраде ваші ідеї. Ідеї ​​коштують недорого, їх втілення в життя – куди дорожче. Краще, щоб вас представив інвестору гідний довіри людина – він може бути гарантом того, що інвестор вас не обдурить. Перевірте, чи не інвестує чи венчурний фонд в конкуруючі розробки.
  2 Treffer www.seth.pt  
Outwit the evil, old witch and steal the treasures from the gingerbread house with Hansel and Gretel!
Überlisten Sie die böse alte Hexe und stehlen Sie mit Hänsel und Gretel die Schätze aus dem Knusperhaus!
¡Engaña a la bruja y llévate con Hänsel y Gretel el tesoro de la cabaña de los dulces!
  5 Treffer maps.google.co.ug  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
على سبيل المثال، نستخدم ملفي تعريف ارتباط اسمهما "SID" و"HSID" يتضمنان سجلات موقعة رقمية ومشفرة لمعرّف حساب Google للمستخدم وآخر وقت تم فيه تسجيل الدخول إلى هذا الحساب. ويتيح لنا الجمع بين ملفي تعريف الارتباط التصدي لأنواع متعددة من الهجوم مثل محاولات سرقة محتوى النماذج التي تكملها في صفحات الويب.
  9 Treffer sus.ziti.uni-heidelberg.de  
*The “Dirty Dozen” Companies That Steal Wages
*Las “doce tramposas” compañías que acostumbran robar salarios
  www.eurobats.org  
Cycle uphill with the Citybike Uphill Team, steal the calves, strengthen the health and receive great prices!
Viel mehr als nur ein guter Job! Betriebselektriker gesucht! Raum Liestal
  3 Treffer www.google.com.co  
For example, we use cookies called ‘SID’ and ‘HSID’ which contain digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time. The combination of these two cookies allows us to block many types of attack, such as attempts to steal the content of forms that you complete on web pages.
Por ejemplo, utilizamos cookies denominadas "SID" y "HSID" que contienen registros encriptados y firmados de forma digital de la hora de inicio de sesión más reciente y del ID de cuenta de Google de un usuario. La combinación de estas dos cookies nos permite bloquear muchos tipos de ataques como, por ejemplo, intentos de robo del contenido de los formularios que rellenas en páginas web.
Arrow 1 2 3 4 5 6 7 8 9 10 Arrow