大多数人在管理他们的互联网身份时,都需要应付一份长长的用户名和密码清单。
Most people identify themselves online by juggling a long list of user names and passwords.
大多数人在管理他们的互联网身份时,都需要应付一份长长的用户名和密码清单。
Most people identify themselves online by juggling a long list user names and passwords.
从进入银行帐户、到登陆电子邮件信箱、网页等等,密码清单越来越长。
From a personal identification number to access your bank account to secret codes for your email, webpage, and other on-line affiliations, your list keeps growing.
清单10提供了我们在这个安全领域中使用的一些密码以及它们的摘要。
Listing 10 provides some of the passwords we use in this security realm and their digests.
同时还假设已经下载了一个用户名和密码的清单到这个数据库中,并且当用户每次试图登陆到这个应用软件时,这个应用软件都会对它进行验证。
Also assume that a list of user names and passwords are preloaded into the database, and that the application verifies against this data every time a user attempts to log in to the application.
参见清单2中以这种方式设置用户名和密码属性的示例。
See the Listing 2 example of setting the username and password properties in the context.
考虑清单11中所示的示例密码。
请记住,如果您尚未与这台远程主机交换您的公钥,那么清单1中的序列需要您输入一个密码。
Bear in mind that the sequence in Listing 1 requires you to enter a password if you haven't already exchanged your public key with the remote host.
清单6将添加第一个基本的击键力度相关的检查子例程:密码输入总时间。
Listing 6 adds subroutines for the first basic keystroke dynamics-related check: total time of password entry.
清单2中的回调旨在支持使用同一个公开-私有密匙对进行签名和解密,因此将在两种情况下进行检查并对任意一种情况返回相同的密码。
The callback in Listing 2 is designed to support both signing and decrypting using the same private-public key pair, so it checks for both cases and returns the same password in either case.
清单4中的脚本会生成这样的登录密码属性报告。
Listing 4 contains a script that will generate such a report on login password attributes.
您可能会注意到,在清单2 中密码是明文形式的。
You may notice in Listing 2 that the password is declared in clear text.
清单5展示了回调类的实际实现,用于明文形式的密码。
Listing 5 shows the actual implementation of the callback class, as used for the plain-text password.
目前,清单4中的脚本说明在重新设置或更改密码之后如何自动地通过电子邮件通知用户。
For now, the script contained in Listing 4 should give you some ideas on how to automatically notify users via E-mail once their password has been reset or changed.
清单2中的脚本创建一个用户并设置初始密码,但是将新密码通知给用户是个手工任务。
The script contained in Listing 2 creates a user with the initial password set, though the method of informing the user of their new password is a manual one.
这将导致应用程序中断运行。对于这种情况,请使用清单1中所示的命令(以及预定义密码)帮助应用程序重新恢复正常。
In this case, use the command shown in Listing 1 (followed by the predefined password) to get the application to resume working correctly.
清单4显示为对一个用户的项目目录进行密码检查向httpd . conf增加的代码,而不是将其放入一个. htaccess文件并依赖于AllowOverrides。
Listing 4 shows the additions to httpd.conf to enable password checking for a user's project directory, rather than putting in a.htaccess file and relying on AllowOverrides.
Authenticator是一个抽象类,所以需要从它派生出子类,并实现 getPasswordAuthentication()方法来存储用户名和密码(见清单13)。
The Authenticator class is abstract, so you'll need to subclass it and implement the getPasswordAuthentication() method to store the username and password (see Listing 13).
清单8显示了配置为域控制器的Samba服务器的密码数据库。
Listing 8 shows the password database from a Samba server configured as a domain controller.
清单2中的代码根据ServiceClient选项设置用户名和密码,意味着这些是针对使用该服务的所有操作定义的,即使它们只用于单个操作。
The Listing 2 code sets the username and password on the ServiceClient options, meaning these are defined for all operations using that service even though they're only used by a single operation.
在下一个示例中(见清单2),创建用户foxtrot和初始密码并修改登录属性。
In the next example (see Listing 2), a user called foxtrot is created with a initial password and login attribute changes.
清单4显示了printpassword子例程,该子例程用于输出密码键和计时以供参考。
Listing 4 shows the printPassword subroutine, which is used to print out the password keys and timings for reference.
清单7中的程序使用pwd模块来访问密码数据库。
The program in Listing 7 USES the PWD module to access the password database.
清单7显示了 hasNonPrintable子例程,它可以针对 @nonPrintable数组中的一个预期前缀检查密码。
Listing 7 shows the hasNonPrintable subroutine used to check a password for one of the expected prefixes in the @nonPrintable array.
清单2演示如何在属性映射中为WS - Security处理设置用户名和密码。
Listing 2 shows how you can set the username and password for WS-Security handling in this property map.
清单3内所示的auth . ini文件现在包含了一个用户记录;这个记录包含了用户名和密码。
The example auth.ini file shown in Listing 3 now contains a record for the user; this record contains both the user name and password.
现在,为了创建BlogPost对象,使用清单2 中的代码提供用户名、密码、URL和blogID。
Now, to create a BlogPost object, supply the username, password, URL and blog ID using Listing 2.
在Evernote上我有一个清单,上面是我所有应用和服务的用户名和密码。
I keep a list of all the usernames and passwords I use, for any and all services and applications, inside an Evernote note.
如果缓存返回null,LDAP身份验证提供者将把用户名(在步骤6中提取的)和密码传递给清单5中配置的authenticatorbean。
If the cache returned null, the LDAP authentication provider passes the username (extracted in Step 6) and password to the authenticator bean configured in Listing 5.
使用sec_master(密码为passw0rd)登录后,运行清单4中的脚本(您可以复制并粘贴)。
Run the script in Listing 4 (you can copy and paste) after you have signed in as sec_master (password is passw0rd).
应用推荐