加密还可防止未经授权的用户访问用户数据。
Encryption can also protect a user's data from being accessed by unauthorized users.
创建安全域,以防止未经授权的用户访问应用程序。
Create a security realm to secure an application from unauthorized party access.
以防止未经授权的用户访问,相机及摄录机所保护的密码。
To prevent unauthorized user to access, the camera and video are protected by password.
or a文件中空白的密码允许未经授权的用户控制侦听服务器。
A blank password on the listener. ora file allows unauthorized users to control the listener service.
未经授权的用户可能获取用于数字签名的唯一信息,并冒充发件人。
It is possible for unauthorized users to obtain the unique information that is used for digital signatures and attempt to impersonate a sender.
访问一个未经授权的用户能成功访问只有经过授权的管理员才能使用的控制权吗?
Access Can an unauthorized user successfully access a control that only the administrators are authorized to use?
一旦发现未经授权的用户,苹果可以重写设备并远程存储用户的敏感数据。
Once an unauthorized user is identified, Apple could wipe the device and remotely store the user's "sensitive data.
不是每个系统黑客最初将提供未经授权的用户提供完整的访问目标系统。
Not every system hack will initially provide an unauthorized user with full access to the targeted system.
一旦发现未经授权的用户,苹果可以重写设备并远程存储用户的敏感数据。
Once an unauthorized user is identified, Apple could wipe the device and remotely store the user's "sensitive data."
缺点在于,如果联合被破坏,很少有防护措施来防止未经授权的用户获得对受控信息的访问。
The disadvantage is that if the federation is corrupted, few safeguards prevent an unauthorized user from gaining access to controlled information.
安全管理保护网络用户资源与设备以及网络管理系统本身不被未经授权的用户访问。
Security management protects network user resources and devices and the network management system itself is not accessed by unauthorized users.
您可以使用加密来保护用户的机密信息(如密码),并使未经授权的用户无法读取凭据。
You can use encryption to protect user secrets (for example, passwords) and to make credentials unreadable by unauthorized users.
在某些具体情况下,可以通过比较电子设备当前用户与授权用户的身份来探测未经授权的用户。
In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identities of authorized users of the electronic device.
而且,它会加密它的数据存储,所以实际上可以安全地将信息保存在客户机,而不会被未经授权的用户看到。
And it encrypts its data store, so I can actually keep information on my client that is securely held, and can't be viewed by unauthorized users.
小心请不要在生产环境中使用此过程允许未经授权的用户访问用户数据。这样做可能会违反贵公司的隐私和安全政策。
Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.
更准确地说,安全性是一个过程,它应用多种技术来防止未经授权的用户(通常称为入侵者)对内容进行未经授权的访问。
More precisely, security is the process of applying various techniques to prevent unauthorized parties, known as intruders, from gaining unauthorized access.
USB库是一个不言自明的名字软件程序-它可以让你的密码保护您的USB闪存驱动器,以防止未经授权的用户访问其内容。
USB Vault is a software program with a pretty self-explanatory name - it lets you password-protect your USB flash drives, in order to prevent unauthorized users from accessing its contents.
如果未经授权的用户知道了您的纯文本块结构的任何信息,他们就可以利用该信息来解密已知的密码文本块,并有可能重新获得您的密钥。
If unauthorized users know anything about the structure of a block of your plain text, they can use that information to decipher the known cipher text block and possibly recover your key.
这一点可以通过使用 X. 509 V3格式发布的数字证书来完成(当然要假定供应商对证书由完全的控制,未经授权的用户不可能有该证书)。
This can be done via a digital certificate published in X.509 V3 format (assuming, of course, the vendor has complete control of the certificate and unauthorized people don't have it).
US B端口拦截器是一种小型便携的软件工具,使您能够阻止US B端口访问未经授权的用户,正如其名称所暗示的,通过用密码保护它。
USB port Blocker is a small-sized and portable software utility that enables you to block USB port access to unauthorized users, as the name implies, by protecting it with a password.
大部分计算机用户都非常熟悉MicrosoftWindows环境,这上面提供了各种屏幕保护程序,它们可以用来在用户离开计算机时保护数据不被那些未经授权的用户访问。
Most computer users are familiar with a Microsoft Windows environment and with the variety of screensavers available to prevent unauthorized access to the data on the computer when unattended.
此外,我们雇佣了保安和使用了电子安全多项措施,以防止在未经授权下访问用户的信息。
In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.
这可确保用户无法访问未经授权的数据。
在CSRF攻击中,从Web站点信任的用户处传播未经授权的命令。
In CSRF attacks, unauthorized commands are transmitted from a user that the Web site trusts.
所以,有这样的可能性:用户虽然通过了身份验证可以登录到一个系统,但是未经过授权,不准做任何事情。
It is possible that through authentication, a user can log in to a system but, through authorization, not be allowed to do anything.
还有一种可能是用户虽然具有了某种程度的授权,却并未经过身份验证。
It is also possible to have a certain level of authorization for users that have not been authenticated.
加密与认证和授权没有直接的关系,但是,在保护传输中的或静止的数据不受未经授权用户访问的时候,它也是一个重要的方面。
Encryption is not directly related to authentication and authorization but is an important aspect of protecting data, during transit or at rest, from unauthorized users.
加密与认证和授权没有直接的关系,但是,在保护传输中的或静止的数据不受未经授权用户访问的时候,它也是一个重要的方面。
Encryption is not directly related to authentication and authorization but is an important aspect of protecting data, during transit or at rest, from unauthorized users.
应用推荐