faux – -Translation – Keybot Dictionary

Spacer TTN Translation Network TTN TTN Login Deutsch Français Spacer Help
Source Languages Target Languages
Keybot 27 Results  www.priv.gc.ca
  Fiche d'information : C...  
Le « détournement de domaine », toutefois, représente une forme d’attaque moins connue. Cela suppose la manipulation directe du DNS et le remplacement de l’adresse IP du site Web visé par l’adresse IP du faux site.
Now suppose a criminal wants to steal someone's account information. He sets up a counterfeit web site that looks just like that of a bank or other sensitive web site, duplicating the layout, colours, logos, seals, and so on. The criminal now needs to convince people to visit the web site and divulge sensitive information such as account numbers, passwords, etc.
  Fiche d'information : C...  
Soulignons que ce type d’attaque est possible même si la victime est dirigée vers un site sécuritaire (c’est-à-dire un site protégé par protocole SSL) étant donné que l’attaquant peut imiter les sites Web et produire de faux certificats SSL.
Note that this type of attack is possible even if the victim finds that he is directed to a secure site (that is, one with SSL protection) since the attacker can spoof web sites and produce fake SSL certificates. Because the fake certificates will appear legitimate, it is very difficult to detect whether the site is legitimate or not. Double-clicking on the lock icon will display the SSL certificate, showing who the certificate was issued to, who it was issued by and how long it is valid. To distinguish an impostor from the genuine article, you should carefully scan the security certificate for a reference to either "a self-issued certificate" or "an unknown certificate authority."
  ARCHIVÉ - L’identité, l...  
Dans ce courriel, on incite la personne à visiter un site Web dont l’apparence porte à croire qu’il s’agit en effet du site de la banque. Sur ce faux site, on demande à la personne de saisir ses mots de passe et ses numéros de compte.
Individuals who download updates to their computer anti-virus programs want to be assured that the source of the download is legitimate, so that they don’t unwittingly download software from a fraudulent web site that will damage their computer files or rifle through those files to identify passwords and account numbers. Individuals who receive correspondence from a government agency want to be assured that the correspondence does not come from a fraudster. In short, individuals have legitimate needs to require authentication by the organizations that they deal with before they provide their own identity credentials.
  Fiche d'information : L...  
Un trio de faux intervieweurs prétendant mener un sondage sur les habitudes de fréquentation des théâtres a convaincu pratiquement toutes les personnes rencontrées dans la rue de leur fournir des renseignements personnels essentiels.
A research project by cyber security specialists in Britain is a case in point. A trio of phoney interviewers claiming to be conducting a survey on theatre-going habits convinced virtually everyone who stopped to talk to them on a street corner to reveal vital personal information. Nine of every 10 people who took part in the bogus questionnaire provided their names, dates of birth, and mother’s maiden names – the kind of information that could be used to break into bank accounts or open new ones.
  Le vol d'identité et vous  
En 2008, le Bureau de la concurrence du Canada a reçu plus de 15 000 plaintes au sujet de fraudes par marketing de masse commises par courrier, par téléphone ou par Internet. Les plaintes visaient de faux organismes de charité, des prêts frauduleux et de fausses offres de voyages – autant de façons pour les profiteurs d’exploiter les renseignements personnels des gens.
Identity thieves have a knack for spotting opportunity. In 2008, the Competition Bureau of Canada received more than 15,000 complaints about mass marketing fraud perpetrated through the mail, by phone or over the Internet. Complaints involved fake charities, loan scams, and phony vacation offers – all ways for hucksters to exploit people’s personal information.
  Aide-mémoire - Trousse ...  
Une femme habitait avec sa fille de 15 ans dans une maison voisine de celle où habitait une autre fille. Les deux filles se sont chicanées. La mère a ouvert un faux compte sur un site de réseautage social, en utilisant le visage et le nom d’un garçon de l’école.
Here’s an example: A woman had a 15-year-old daughter. They lived next to another teenager. The two girls got in a fight and the woman opened a fake account on a social networking site, using the face and name of a boy at the school.
  ARCHIVÉ - 10 grands con...  
Ils peuvent voler vos renseignements personnels à partir de l’autre bout du monde. De nos jours, vous devez déchiqueter vos documents, protéger votre ordinateur, prendre garde aux courriels frauduleux, vous méfier du faux-semblant, et plus encore.
Fraudsters have become extremely devious and technologically savvy. From the other side of the planet, they can steal your personal information. These days, you need to shred documents, protect your computer, watch out for fraudulent e-mails, be on guard against pretexting and much more.
  Fiche d'information : L...  
Dans d'autres cas, les documents sont volés dans les portefeuilles, les boîtes aux lettres, les poubelles ou les bacs de recyclage. Parfois, les fraudeurs se présentent à des organisations sous un faux nom afin d’obtenir des renseignements personnels.
Identity thieves steal personal information in many different ways. Dishonest employees sometimes obtain personal data from organizations where personal or financial information is stored. Hackers have also tapped into databases to steal personal information. In other cases, fraud artists steal wallets or take documents from mailboxes, dumpsters or recycling bins. Sometimes they impersonate someone to trick organizations into providing that person’s information. They can also illicitly gather information about victims online or trick people into revealing personal information with spam e-mails designed to look like they come from legitimate organizations such as banks.
  Comment savoir si vos a...  
Notez tout ce qui ne semble pas correspondre à ce que vous connaissez à son sujet et posez-lui des questions. Par exemple, si vous savez qu’un ami a deux frères aînés mais que son profil en mentionne un seul, il pourrait s’agir d’un faux profil.
You’ve probably heard the expression “The devil’s in the details”. Look at your friend’s profile closely. Take note of anything you see that doesn’t fit with what you already know about your friend, and ask about it. For instance, if you know a friend has two big brothers, but online she mentions having only one, you may have stumbled onto a fake profile.
  ARCHIVÉ - L’identité, l...  
Aussi, des fraudeurs (par une ruse qu’on appelle le faux-semblant) peuvent parfois se faire passer pour d’autres et appeler des établissements financiers afin d’obtenir d’eux des renseignements personnels sur une personne qui leur permettent ensuite de voler l’identité de cette personne.
To reduce the risk of identity theft, individuals require security measures. The degree of security provided by these measures varies. A credit card provides some security in that the legitimate owner’s signature is set out on the back of the card. When an individual signs a credit slip, the sales clerk compares the signature on the card with the signature on the strip. A Social Insurance Number alone is an identifier without any protection, since anyone can use the number. A card containing the Social Insurance Number provides a degree of authenticity, but there is still no obvious way of ensuring that the person holding the card and using the number is in fact its legitimate owner. A card provided by a trusted source and containing a photograph of the owner would provide greater security.
  Build a Privacy Plan fo...  
Faux
No
  Fiche d'information : L...  
Un trio de faux intervieweurs prétendant mener un sondage sur les habitudes de fréquentation des théâtres a convaincu pratiquement toutes les personnes rencontrées dans la rue de leur fournir des renseignements personnels essentiels.
A research project by cyber security specialists in Britain is a case in point. A trio of phoney interviewers claiming to be conducting a survey on theatre-going habits convinced virtually everyone who stopped to talk to them on a street corner to reveal vital personal information. Nine of every 10 people who took part in the bogus questionnaire provided their names, dates of birth, and mother’s maiden names – the kind of information that could be used to break into bank accounts or open new ones.
  Votre entente de contri...  
des renseignements faux ou trompeurs fournis au CPVP dans le cadre ou en vertu de l’entente de contribution;
Paragraph 8.2 sets out the remedies that the Office of the Privacy Commissioner may exercise if an event of default has occurred.
  Fiche d'information : L...  
Dans une forme extrême de fraude d’identité, les fraudeurs se font passer pour le propriétaire d’une maison et produisent de faux documents qu’ils utilisent pour vendre la maison ou obtenir une deuxième hypothèque, à l’insu du vrai propriétaire.
In an extreme form of identity theft, crooks pose as homeowners and forge phoney documents that they use to either sell a home or obtain a second mortgage – completely unbeknownst to the real owner.
  Fiche d'information : C...  
Le « détournement de domaine », toutefois, représente une forme d’attaque moins connue. Cela suppose la manipulation directe du DNS et le remplacement de l’adresse IP du site Web visé par l’adresse IP du faux site.
Now suppose a criminal wants to steal someone's account information. He sets up a counterfeit web site that looks just like that of a bank or other sensitive web site, duplicating the layout, colours, logos, seals, and so on. The criminal now needs to convince people to visit the web site and divulge sensitive information such as account numbers, passwords, etc.
  ARCHIVÉ - Semaine de la...  
Ne développez pas un faux sentiment de sécurité : Bon nombre de personnes croient que le fait de bloquer l’accès aux fournisseurs de services de courriel Internet peut assurer la protection contre les menaces à la sécurité.
Don’t gain a false sense of security: Many believe that blocking access to Internet email service providers can provide protection against security threats. Truth be told, the established providers have a lot riding on their security and have invested heavily in their security. It’s one thing if you’re blocking access to help limit employees’ ability to waste time reading personal email. But don’t think it increases your network’s security.
  Fiche d'information : C...  
Soulignons que ce type d’attaque est possible même si la victime est dirigée vers un site sécuritaire (c’est-à-dire un site protégé par protocole SSL) étant donné que l’attaquant peut imiter les sites Web et produire de faux certificats SSL.
Note that this type of attack is possible even if the victim finds that he is directed to a secure site (that is, one with SSL protection) since the attacker can spoof web sites and produce fake SSL certificates. Because the fake certificates will appear legitimate, it is very difficult to detect whether the site is legitimate or not. Double-clicking on the lock icon will display the SSL certificate, showing who the certificate was issued to, who it was issued by and how long it is valid. To distinguish an impostor from the genuine article, you should carefully scan the security certificate for a reference to either "a self-issued certificate" or "an unknown certificate authority."
  Fiche d'information : C...  
Soulignons que ce type d’attaque est possible même si la victime est dirigée vers un site sécuritaire (c’est-à-dire un site protégé par protocole SSL) étant donné que l’attaquant peut imiter les sites Web et produire de faux certificats SSL.
Note that this type of attack is possible even if the victim finds that he is directed to a secure site (that is, one with SSL protection) since the attacker can spoof web sites and produce fake SSL certificates. Because the fake certificates will appear legitimate, it is very difficult to detect whether the site is legitimate or not. Double-clicking on the lock icon will display the SSL certificate, showing who the certificate was issued to, who it was issued by and how long it is valid. To distinguish an impostor from the genuine article, you should carefully scan the security certificate for a reference to either "a self-issued certificate" or "an unknown certificate authority."