Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
You'll be back on the whitelist by the time you finish working for me.
But then it's like, okay, where does the whitelist come from?
Developing a system to maintain this whitelist will take some time.
Wouldn't it be better if the user himself could decide which whitelist to use?
And how some companies are moving from a blacklist to a whitelist model.
The whitelist should be updated periodically after it is created.
That way I don't have my whitelist growing forever.
But we do tend to sort of accumulate sites in that whitelist.
Without the whitelist addition, the device will not work.
In this case, ensure www.learningcurve.gov.uk is included in the whitelist.
If an organization keeps a whitelist of software, only titles on the list will be accepted for use.
A whitelist might have to be extremely long to encompass all of the possible legitimate ways.
But the programmer can set up a whitelist for known friendly sites, which would be easy.
Any mail that originates from someone not on the whitelist will be blocked.
There should be no need for a whitelist.
The operator of the whitelist may remove a server from the list if complaints are received.
It can be configured using either a blacklist or a whitelist.
In a locked-down environment, only applications on a company's whitelist are allowed to execute.
The service is free, but a $29/year Pro version lets you create a whitelist so not just anyone can send files to your account.
And then there's the possibility of somebody just bribing their way onto that third party's permanent whitelist.
A national whitelist that listed all permitted sites would also be unworkable.
The opposite is a whitelist, which means only items on the list are let through whatever gate is being used.
Furthermore, malicious software which has been included on the whitelist can still be executed.
An additional opt-in whitelist service aimed at users under 12 years is provided by O2.
It uses a blacklist and a whitelist to determine if the program should be allowed Internet access.