from Wiktionary, Creative Commons Attribution/Share-Alike License

  • adj. Not trusted.


from Wiktionary, Creative Commons Attribution/Share-Alike License

un- +‎ trusted


  • The image constraint token is a flag in a video signal that instructs receivers, DVD players and other high-definition sources to "down-rez" their output to a low-definition signal when connecting to an "untrusted" screen or other sink.

    Boing Boing: May 21, 2006 - May 27, 2006 Archives

  • Education on the risk of installing random apps from "untrusted" sources is key for all smartphone users, but especially for the consumer user, Totzke says.

    Computerworld News

  • It authenticates computers and data center servers against "untrusted" computers, optionally enabling end-to-end encryption of data in motion.

    Latest News from .NET Developer's Journal

  • When going into the Buzz mobile site, there's a flurry of Web 'untrusted' warnings that have to be acknowledged.

    All About Symbian - News

  • The SRA 1200 also supports some degree of secure access from "untrusted" machines, by being able to provide one-time PADs (single-use passwords, basically) SMSd or texted to a user's cell phone.

    InformationWeek - All Stories And Blogs

  • By blocking what Android refers to as "untrusted" apps, it reduces the flexibility of the platform.

    InformationWeek - All Stories And Blogs

  • Chrome OS will include Native Client, the Google add-on that verifies and executes "untrusted" native code inside the Chrome browser, and in the past, Google has said that Native Client will be an "important part" of the browser-based operating system.

    The Register

  • Do the 'untrusted' ppa's fix security vulnerabilities?

    Wilders Security Forums

  • This requirement focuses on five tenets, including best practices for firewall and router configurations; processes to prohibit network traffic from "untrusted" environments that are not explicitly allowed; restricting connections between publicly-available services and systems storing cardholder data; preventing direct public access to systems storing cardholder data; and concealing internal addressing schemes from the Internet.

    Enterprise Strategies

  • A VPN for remote access allows a user to create a secure connection through an 'untrusted' network, such as the Internet, between a mobile user and a corporate network.

    MSDN Blogs


Log in or sign up to get involved in the conversation. It's quick and easy.