您要查找的是不是:
- Data whose meaning is concealed from unauthorized users. 对于非授权用户其意义是隐蔽的数据。
- Using this system, common message headers that might be known to an unauthorized user cannot be used to reverse engineer a key. 使用该系统,未经授权的用户有可能知道的公共消息标头将无法用于对密钥进行反向工程。
- In data security, an unauthorized user who tries to gain entry to a computer network by defeating the system's access controls. 在数据安全领域,一种未经授权、又企图躲过系统存取控制程序的检查而进入计算机网络的用户。
- Having successfully logged in to the server using the fran_whitney login ID, the unauthorized user successfully connects to the database as DBA using the integrated login mapping. 在使用fran_whitney登录ID成功登录到服务器之后,未经授权的用户可以使用集成登录映射,以DBA身份成功连接到数据库。
- In data security, the transmission of data to unauthorized users by processes with legitimate access to data. A compiler, for example, could leak a proprietary program whilst it is being compiled. 在数据保密学中,通过合法访问数据的进程将数据传输给未授权的用户的过程。例如,编译程序在编译期间便可能泄漏专用程序。
- This is to prevent unauthorized users from using their servers as mail relays. 这是为了防止未经授权的使用者以他们的伺服器作为邮件转送。
- Protecting the synchronization system from unauthorized users MobiLink synchronization can be secured by a password-based user authentication system. 保护同步系统不被未授权用户访问MobiLink同步可以由基于口令的用户鉴定系统提供保护。
- Keep your Web server computer physically secure so that unauthorized users cannot get to it, turn it off, or take it. 将您的Web服务器计算机放置在安全的场所,这样,未经授权的用户就无法使用它、关闭它或带走它。
- In data security, the transmission of data to unauthorized users by processes with legitimate access to data. 在数据保密学中,通过合法访问数据的进程将数据传输给未授权的用户的过程。
- Using an embedded resource of image type we can protect it thus it can't be changed or copied by unauthorized users. 使用嵌入式资源的图像类型,我们可以保护它因此不能随意变更或复制未经授权的用户。
- That's because these policies are intended to prevent unauthorized users from gaining access to the WLAN resources. 这是因为这些策略都是为了阻止未经授权的用户访问无线局域网资源的。
- It is possible for unauthorized users to obtain the unique information that is used for digital signatures and attempt to impersonate a sender. 未经授权的用户可能获取用于数字签名的唯一信息,并冒充发件人。
- Systems that do not use the NTFS file system create security weaknesses by allowing unauthorized users to modify security policy. 不使用NTFS文件系统的系统会允许未经授权的用户修改安全策略,因而具有安全弱点。
- Keep your Web server physically secure so that unauthorized users cannot gain access to it, turn it off, physically steal it, and so on. 将您的Web服务器放置在安全的场所,使未经授权的用户无法访问它、关闭它、带走它,等等。
- Some of our Discussion Groups are meant for particular purposes and read-only, they do not support posting by unauthorized users. 普通用户在具有只读属性的讨论区是无法发表话题的。
- Public-key encryption uses a private key that must be kept secret from unauthorized users and a public key that can be made public to anyone. 公钥加密使用一个必须对未经授权的用户保密的私钥和一个可以对任何人公开的公钥。
- When you are finished, unmount the virtual image to hide it from spyware, unauthorized users, and network administrators. 当你使用完虚拟硬盘的时候,取消虚拟映像的设置并且隐藏起来以防间谍软件,未经授权的用户和网络管理员的访问窃取。
- It is imperative that sensitive data assets, be it personal or corporate, will not be vulnerable to Cybercrime or compromised by unauthorized users. 灵敏的数据库是很必要的,无论它是个人的还是通用的,它不可以被网络犯罪攻击,也不能被非法用户侵入。
- Security management is responsible for protecting the network from unauthorized users and physical and electronic sabotage. 安全管理是负责保护网络免受未经授权的用户和物理和电子破坏。
- Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. 预防措施有助于阻止未授权用户(也称“入侵者”)访问你的计算机系统任何部分。