密码计算采用国家密码管理委员会办公室指定的密码技术。
The cryptographic computation adopts the cryptographic technique designated by the National Cipher Management Committee Office.
进而讨论了密码计算任务分割策略,资源分配和负载平衡问题。
The task dividing policy, resource allocation and load balance for the model are then discussed.
此特性让这三种关键的安全技术能够利用 ACF提供的硬件密码计算加速设施。
This feature enables these key security technologies to exploit the hardware cryptographic acceleration facility provided by the ACF.
密码常被用来控制对计算机的访问。
Secret passwords are often used to control access to computers.
在上面的测试用例中,提供一个已经通过身份验证的用户,需要用有效的数据填充users表,以便计算加密的密码。
In the test case above, featuring an authenticated user, there is a need to populate the USERS table with a valid entry to compute the encrypted password.
为了避免错误和维持计算机的正常运行,我们应该在哪里更改密码?以什么顺序?
In what order and where will we have to change passwords to prevent failure and maintain uptime?
从密码来计算消息摘要是比较简单的,但以消息摘要为基础来计算密码却是不可行的。
It is easier to compute a message digest from a password and computationally infeasible to compute the password based on its message digest.
下列代码的第一部分将展示一个简单的密码输入和确认程序,它将计算输入密码的完整时间。
The first section of code below shows how to set up a simple password entry and confirmation program that takes into account the full timing of password entry.
计算:量子密码理论上是无法破解的。
尽管加密的密码可以单独计算,而且只在fixture中直接使用,但是视图中使用的模板替换和部分工作是相似的,这会简化我们的任务。
Although the encrypted password could be calculated separately and just used directly in the fixtures, the template substitution used in views and partials works similarly, simplifying our task.
Salting这种技术可以用于生成随机数,并将该随机数用于计算密码的哈希。
Salting is a technique in which a random number is generated in order to compute the hash for the password.
但是有可能通过rainbow表去攻击密码的hash值:预先计算出来的数量庞大的hash值,涵盖所有可能的字符组合。
But it is possible to attack the hashed value of your password using rainbow tables: enormous, pre-computed hash values for every possible combination of characters.
这个计算机黑客突然碰壁了,因这家公司实行了用密码保存公司纪录的政策。
The hacker came smack up against the company's policy of keeping its records in code.
完成这些设置之后,就应该能够登录到远程计算机,系统不会提示输入密码。
With these Settings, you should be able to log onto the remote machine without prompting for the password.
此外,拥有此角色的域控制器也是某些管理工具的目标,它还可以更新用户帐户密码和计算机帐户密码。
The domain controller that owns this role is also targeted by certain administration tools and updates to user account and computer account passwords.
另外有趣的是人们使用数字作为密码是因为数字在计算机键盘上的位置。
Another interesting way people use Numbers as passwords is by how they are arranged on the computer keypad.
除非你完全信任某个网站,否则不要按照其要求输入你的计算机密码、社会保障号码或是信用卡信息。
Unless you have absolute confidence in the site that is asking for it, never give up your computer password, your social security number or your credit card information.
在这种情况下,服务器b会将其服务器用户ID和密码发送到服务器a。服务器a将随后验证该密码,并确保该用户ID对其计算单元具有管理权限。
In this case, server B will sends its server user id and password to server A. server a will then validate that password and ensure that the user id has administrative authority to its cell.
一天晚上,亚力克输入计算机密码然后操作联网计算机。
One night, Aleck fed in the password and then operated the networking computer.
很多计算机拥有密码去防止拥有者以外的任何人操控他们。
Many computers have secret codes to prevent anyone but their owners from operating them.
用户然后可以访问参与此受信任网络的其他计算机上的服务,而不会再次提示用户ID和密码。
Users can then access services on other machines that participate in this trusted network without again being prompted for a user ID and password.
通常通过盗用密码和其他的数据,给计算机开一个“后门”,然后这台电脑就可以被外人操纵。
It is typically used to steal passwords and other data, or to open a "back door" to a computer so that it can be taken over by outsiders.
这个神秘的“纠缠”性质,在通信领域具有深远的应用潜力,如量子密码学,量子计算和量子隐态传输。
This mysterious property, known as entanglement, has far reaching application potential in information fields such as quantum cryptography, quantum computation and quantum teleportation.
这个神秘的“纠缠”性质,在通信领域具有深远的应用潜力,如量子密码学 ,量子计算和量子隐态传输 。
This mysterious property, known as “entanglement”, has far reaching application potential in information fields such as quantum cryptography, quantum computation and quantum teleportation.
“匿名”随后发现,巴尔与他的一些同事竟然犯了计算机安全的大忌:对多个账号使用相同密码。
Barr and some of his colleagues, Anonymous then discovered, had committed computer security's biggest sin: They used the same password on multiple accounts.
SSH的主要优点之一是,通过将您的公钥复制到一台远程计算机,您可以绕过正常的登录和密码交换。
One of the main benefits of SSH is that you can bypass the normal login and password exchange by copying your public key to a remote machine.
如果不交换您的公钥,那么使用SSH在多台计算机中运行相应的命令时,您必须为每台计算机输入您的密码。
When using SSH to run commands across multiple machines without exchanging your public key, you need to type in your password for each machine.
如果你对云计算不感冒的话,你可以让它将你的书签密码保存在你自己的服务器上。
If you're not down with the cloud, you can even tell this extension to store your stuff on your own server.
通过使用以下配置设置,可信主机上的用户就可以登录远程计算机,不需要提供密码。
Using the following config settings, a user on a trusted host can log onto the remote machine without providing the password.
现在让我们给一台计算机分派任务,来破解该密码。
应用推荐