Sentences with phrase «including server logs»

Not exact matches

Among the data that can be transmitted to remote servers include the voice call recordings in Skype and Wechat, Chrome browser history logs, text messages sent in Skype and Facebook messenger, and photos.
Arsenal FC Blog and its authorized agents automatically receive and record certain «traffic data» on their server logs from your browser including your IP address, Arsenal FC Blog cookie information, and the page you requested.
MomLifeTV automatically receives and records information on our server logs from your browser, including your IP address, our cookie information, the page you request and how long and often you watch our show.
Easier approaches, he said, include an order to extract them from the server or network when the user logs in — which has been done before — or installing a keylogger at the client.
Each time someone visits the site, our web server logs a number of details — if they are available — including the IP address of the visitor's computer and / or Internet service provider, the domain name and country of origin of that computer, its operating system, and the type of web browser being used.
(When the security company Finjan seized a server being used to store botnet data, they found 1.4 gigabytes of material from compromised machines in the United States, the European Union, India, Canada, and Turkey, including patient data from health - care providers as well as the usual acres of business databases and email logs.
I'm sure it's a passable entry in the series if you're willing to plug into their servers (required for the majority of the features, including teambuilder — why would I have to log onto their servers when all I want is to start a single - player dynasty???).
Information gathered through cookies and Web server logs may include the date and time of visits, the pages viewed, time spent at our Website, and the Websites visited just before and just after our Website.
As further explained below, we may use cookies, pixel trackers, server logs, and other Internet technology for purposes such as measuring the effectiveness of the Services, emails we send you, and any advertising campaigns, as well as to target meaningful content and ads (including through emails).
Information gathered through cookies and Web server logs may include the date and time of visits, the pages viewed, time spent at our Web site, and the Web sites visited just before and just after our Web site.
Site users are prohibited from violating or attempting to violate the security of this Site, including without limitation: (1) accessing data not intended for such user or logging onto a server or an account which the user is not authorized to access; (2) using this Site for unintended purposes or trying to change the behavior of this Site; (3) attempting to probe, scan or test the vulnerability of a system or network or breach security or authentication measures without proper authorization; (4) attempting to interfere with service to any user, host or network, including without limitation, via means of submitting a virus to this Site, overloading, «flooding,» «spamming,» «mailbombing» or «crashing»; (5) forging any TCP / IP packet header or any part of the header information in any e-mail or newsgroup posting; and (6) forging communications on behalf of this Site (impersonating this site) or to this Site (impersonating a legitimate user).
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
In order to get anything meaningful from the game, including Fight Money, you need to log - in to Capcom's spotty servers.
violate or attempt to violate the security of the Site, including, without limitation: (i) accessing data not intended for you or logging onto a server or an account that you are not authorized to access, (ii) trying to change the behavior of the Site, (iii) attempting to probe, scan, or test the vulnerability of a system or network, or to breach security or authentication measures, (iv) attempting to interfere with service to any user, host, or network, including, without limitation, via means of submitting malware to the Site, overloading, flooding, spamming, mailbombing, or crashing, (v) forging any header or part of the header information in any email or posting, or (vi) impersonating the Michaels website or impersonating another user;
2) The DOJ notice was sent to Automattic at the request of the Norfolk police, asking them to hold wordpress logs on the server farm in California covering the 22 / 23rd Nov for three blogs including mine for a period of 90 days.
A few examples of personal information frequently held by third parties include medical, psychological, and counselling records, financial records, emails and electronic appointment calendars that are stored on third - party computer servers, and web server and ISP logs that reveal the web sites we have visited.
Furthermore, IT staff want web server logs to include ip addresses so that they can ban malicious traffic.
Log Files When visitors enter and navigate through the pages of our site, our server logs information, including the internet address of the server or computer contacting us, the date and time, the referring site and its URL, as well as the visitor's browser, operating system, and screen resolution.
Log Files When visitors enter and surf through the pages of our site, our server logs information including the internet address of the server or computer contacting us, the date and time, the referring site and its URL, as well as the visitor's browser, operating system, and screen resolution.
Additionally, for systems administration, detecting usage patterns and troubleshooting purposes, our web servers automatically log standard access information including browser type, access times / open mail, URL requested, and referral URL.
Enable this to include debug information in the various Plex Media Server logs.
The firm stated that the Wireless Update app was collecting large sets of personal data including call logs, contacts, and text messages, which it then forwarded to a server in China.
Unfortunately, their privacy policy also reveals that they do in fact keep logs of some information, including times when a user is connected to the service, their choice of servers and total amounts of data transferred.
This software was collecting sensitive personal information from users including location data, text messages, and call logs, and sending it to servers in China.
Performed log analysis and event correlation of various security and enterprise network equipment to include intrusion detection systems, firewalls, servers and workstations, HBSS and antivirus.
FISERV ISS, Senior Database Manager (Denver, CO) 10/2000 — 8/2008 • Provide production database administration for Fortune 500 firm • Perform 24/7 on - call support of Oracle and SQL Server databases varying in size (800 GB to 4 GB) • Oversee backup and recovery using RMAN • Responsible for daily production maintenance of Oracle and SQL Server databases including log checking, space management and database tuning • Maintain the Oracle Data Guard Standby databases by syncing up the database with production • Perform 90 - day restores of multiple Oracle and SQL Server databases • Actively train coworkers in database restoration • Convert Oracle non-ASM databases to ASM databases, perform upgrades • Establish physical database parameters and review internal Oracle tables • Identify and recover corrupted blocks on Oracle database • Install multiple Oracle ASM and non-ASM databases on both Linux and Windows platforms • Install Oracle 10.2 two node ASM RAC system on Linux Itanium system • Install SQL Server databases on Windows 2000 platform • Develop Oracle Data models for internal applications • Perform SQL tuning using explain plan and Oracle Grid Control • Create multiple Cron UNIX scripting jobs using the Bash Shell • Maintain nightly internal load job application processes • Write multiple internal applications with PL / SQL language
You are allowed to connect with the LovePanky servers by HTTP / HTTPS requests using a web browser, and are prohibited from violating or attempting to violate the security of the Website by, including, without limitation, attempting to breach security or authentication measures without permitted authorization, attempting to access data that is not intended for users by logging into a server or account which the user is not authorized to access, using administrator passwords to access the Website, submitting a virus, overloading, spamming, or crashing the Website.
a b c d e f g h i j k l m n o p q r s t u v w x y z