Public networks - and even private networks without security keys - often are not.
公共网络——乃至没有安全密匙的私人网络——通常并不安全。
The SOAP runtime may access a keystore to retrieve security keys and certificates as needed.
SOAP运行时可以访问keystore以检索所需的安全性密钥和证书。
The ssh-agent program ACTS like a gatekeeper, securely providing access to security keys as needed.
ssh - agent程序如同一个看门人,它根据需要安全地提供对安全密钥的访问。
It can also capture portraits, write data to MIFARE contactless CARDS, and manage card security keys.
它还能捕捉画像,将数据写入MIFARE非接触智能卡以及管理卡片的安全钥匙。
High security keys are often generated by hardware that usually helps prevent export of the keys for security reasons.
安全性高的密钥通常由硬件生成,出于安全考虑,硬件通常禁止导出这些密钥。
In addition, it's a good idea to change security keys every once in a while, and you can schedule a cron job to remind you of that as well.
此外,每隔一段时间修改一次安全密钥也是个好主意,也可以调度一个cron作业来提醒自己及时更改安全密钥。
The TCS requires control over the allocation and release of key system resources, including database records, communication sockets, security keys, etc.
TCS要求控制关键系统资源的分配和释放,包括数据库记录、通信套接字、安全密钥,等等。
An error occurred while accessing your security information. Please contact your administrator to request another token for recovering your security keys.
访问安全信息时出错。请与管理员联系,申请另外一个恢复安全密钥的令牌。
Low security keys are often generated by software-based CSPs and exported to a file so they can be checked into source code management systems during project development.
安全性低的密钥通常由基于软件的csp生成并导出到文件,以便项目开发期间可以将它们登记到源代码管理系统中。
These keys are configured to allow for easy rotation for security purposes or if they are compromised for any reason.
这些密钥为了安全目的被配置成可允许轻易地交替,或者它们有可能由于某种原因而泄露。
These keys can be a concatenation of multiple columns, and often identifiers like Social Security Numbers, employee IDs, ISBNs, or part IDs are used in these roles.
这些键可以是多个列的并置,通常象“社会保障号”、雇员标识、ISBN或部件标识这样的标识用于这些角色中。
He reviews images from security cameras, some of which are wireless, and then locks an office with keys using a wireless ID system that records who enters where and when.
他可以从一些无线的安全电视摄像机中看回访图像,或用无线id系统将办公室上锁,该系统可记录进入人员及其去向与时间。
When generating keys for use with transport security, two issues arise.
当生成使用传输安全性的密钥时,会出现两个问题。
Be aware that configuring the automatic acceptance of new keys is a potential security risk.
注意,配置对新密钥的自动接受可能具有安全风险。
Many in Vietnam worry that China is being handed the keys not just to their country's natural resources but also to sensitive strategic areas, threatening the nation's security.
越南很多人担心中国不仅手握他们国家自然资源的钥匙,而且掌握敏感的战略领域,威胁着国家的安全。
Computer experts at the University of California in San Diego set out to show how easily keys could be copied from a digital image to highlight the potential security risk of leaving keys on display.
为了强调钥匙曝光的对安全造成的潜在危险,圣地亚哥加利福尼亚大学的计算机专家打算证明通过数码照片配制钥匙轻而易举。
Encryption keys are a crucial aspect of information security in the delivery of assured communications to military personnel.
加密密钥是信息安全的关键环节,保障军事人员的通信传递。
The scratch-and-win specialist marks the keys with printed codes and covers them with a special scratch-off layer (thermochromatic or other security inks could be used).
刮奖专家以印好的编码作为标记,并在上面覆盖一层可以挂掉的特殊涂层(可以使用热变色油墨或其他安全油墨)。
Prior to the message being sent onto the wire from the client, WS-Security used asymmetric keys to digitally sign and encrypt the message.
从客户端将消息发送到网络之前,WS-Security使用了非对称密钥对消息进行数字签名和加密。
When the message was received at the application server, WS-Security used the asymmetric keys to verify the digital signature and decrypt the message.
在应用服务器收到消息时,WS - Security使用了非对称密钥验证数字签名并对消息解密。
The security mechanism behind the two pairs of keys is called the Open Authentication (OAuth) protocol (see Resources).
两对密钥背后的安全机制被称为开放式验证(OAuth)协议(见 参考资料)。
WS-SecureConversation: Describes how to manage and authenticate message exchanges between parties, including security context exchange and establishing and deriving session keys.
WS - SecureConversation:描述如何管理和认证各方之间的消息交换,包括安全上下文交换以及建立和继承会话密钥。
Of course, if you use per-user and per-instance SSH keys, then Pageant can only provide the key for the second and subsequent connections to each instance - but that's the cost of tighter security.
当然,如果对于每个用户和每个实例使用不同的ssh密钥,Pageant只能为对每个实例的第二次和后续连接提供密钥,但这是实现更高的安全性要付出的代价。
What Job Security Really Means (And Who Has It)Job security means ownership. It means possessing the deed to a steady income, NOT borrowing the keys from an employer.
工作保障真正意味着什么(和谁拥有它)
First, I'll construct and modify an associated array whose keys (or indecies) are employee social security numbers.
首先,我将构建并修改一个两个数组,其关键字(或indecies)是员工的社会安全号。
You can import public keys created by other Encryption Expert security servers.
您可以导入由其他EncryptionExpert安全服务器创建的公共密匙。
These results show that WS-Security symmetric encryption with client-generated keys is nearly as fast as WS-SecureConversation, especially for larger messages.
这些结果表明使用客户端生成的密钥进行WS - Security对称加密几乎和WS - SecureConversation一样快,特别是对于较大的消息。
Ontrary to any rumors, the security architecture is the same around the world and RIM truly has no ability to provide its customers' encryption keys.
与传闻恰好相反,RIM的安全结构在世界各地同样安全,而且RIM不会向任何人泄露顾客的加密密匙。
Security credentials for web services security in the form of JCEKS key stores or the private keys or public certificates required for the specified cryptographic operations.
用于Web服务安全的JCEKS密钥存储库形式的安全凭据或指定加密操作所需的私钥或公开证书。
Security credentials for web services security in the form of JCEKS key stores or the private keys or public certificates required for the specified cryptographic operations.
用于Web服务安全的JCEKS密钥存储库形式的安全凭据或指定加密操作所需的私钥或公开证书。
应用推荐