• We then initiated active user loads of 500, 800, and 1,000 users on the server to assess whether or not port encryption affected CPU utilization.

    我们然后服务器启动500、8001,000位用户活动用户负载评估端口加密是否会影响cpu利用率

    youdao

  • All values in a specific column of a database table are encrypted with the same password provided by the user, the same encryption algorithm, and the same cipher mode.

    一个数据库某个特定中的所有用户提供相同密码、相同的加密算法相同的加密方式进行加密。

    youdao

  • Authentication in DB2 does not only involve encrypting user names and passwords but also allows for encryption of data as it travels across the network between the clients and the server.

    DB 2中的身份验证不仅涉及用户密码进行加密允许客户机服务器之间通过网络传输数据进行加密

    youdao

  • You can also provide user id and password information for database authentication, and you can select the encryption method for the password.

    可以提供用户ID密码信息用于数据库身份验证,可以选择密码加密方法

    youdao

  • DATA_ENCRYPT_CMP - This specifies that the server accepts encrypted server authentication schemes and the encryption of user data.

    DATA_ENCRYPT _ CMP——指定服务器接受加密SERVER身份验证模式用户数据加密

    youdao

  • Lets you provide an encryption of the stored user IDs and passwords.

    使能够存储用户ID密码进行加密

    youdao

  • Simply run each cell with a different operating system user ID, different encryption keys, and different administrative passwords.

    直接使用不同操作系统用户ID、不同的加密密钥不同的管理密码运行每个计算单元即可。

    youdao

  • You can't just use encryption; you must have a certificate of identification, and if the user doesn't recognize the authority that signed your certificate, dire warnings are presented.

    不能使用加密必须一个身份证书如果用户不信任签署证书机构,浏览器就会发出警告

    youdao

  • Defense in-depth is all about having redundant security measures in place — not only encryption but also smart handling of user-supplied data.

    深层防御多余安全方法妥善保管——不仅包括加密包括用户提供数据智能处理

    youdao

  • EnSTratus offers enterprise cloud encryption, key management, a user management for the cloud, and many other solutions.

    EnSTratus提供了企业加密密钥管理一个用户管理其他结局方案。

    youdao

  • Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.

    LotusNotes服务实例包括Domino安全模型(Security Model),可以进行用户身份验证访问控制加密

    youdao

  • WebSphere Application Server encrypts various user tokens (including the LTPA cookie) using what are known as the LTPA encryption keys.

    WebSphereApplicationServer使用LTPA加密密钥加密各种用户令牌(包括LTPAcookie)。

    youdao

  • WS-Security allows the user to use a variety of security elements, such as user names, signature and encryption mechanisms and security tokens.

    WS - Security允许用户使用多种安全性元素比如用户签名加密机制以及安全令牌

    youdao

  • The following KDC log entry indicates that a user named johan requested for an TGT from IP address 9.182.192.36 on Jul 07 02:05:17 with encryption list {16 23 18 3 1 17} with the wrong password.

    下面kdc日志表明来自IP地址9.182.192.36johan用户请求一个TGT,请求的时间是Jul07 02:05:17,加密列表是{1623183117},但是使用错误的密码。

    youdao

  • As shown above, su can also be controlled so that Encryption Expert will prevent even the root user from accessing guard points by pretending to be some user.

    如上可以控制su从而使EncryptionExpert甚至可以阻止伪装其他用户用户访问保护

    youdao

  • There's an incremental impact of port encryption on end-user response time.

    端口加密最终用户响应时间影响随用户数增大而增大。

    youdao

  • Easy: use the identical method of encryption on any incoming user-supplied password and compare the result to your stored password.

    一个比较容易方法是:对用户提供的任何传入密码使用相同加密方法,结果存储密码比较

    youdao

  • User defined encryption format is adopted for the outputted file to ensure the safety of your design file data .

    用户定义加密格式通过输出文件确保安全设计档案资料

    youdao

  • How will Disk Encryption recognize me as an authenticated user?

    如何磁盘加密识别经过身份验证的用户吗?

    youdao

  • For PE permissions, the user can do any changes in PE, to prevent others into your PE, encryption!

    PE权限极高用户可以PE里面任何改动以防其他人进入的PE,建议加密

    youdao

  • While this does not protect data from a root compromise that can monitor the user inputting the password, it can provide protection for a lost device without file system encryption.

    并不保护数据以防可以监听用户输入密码权限入侵,可以丢失没有文件系统加密设备提供保护

    youdao

  • Encryption of sensitive user data on mobile device using AES-256.

    移动设备敏感数据加密用户使用AES- 256。

    youdao

  • For simple applications not requiring role-based access control and implementing only a single encryption key, a single user exit could be used for all encryption and decryption functions.

    对于需要基于角色访问控制并且实现加密密钥简单应用程序那么可以一个用户出口用于所有加密解密函数

    youdao

  • Several encryption methods mentioned above, the location of data encryption is gradually close to the user, the protection ability is gradually enhanced.

    以上所述几种加密方式数据加密的位置用户逐步靠近防护能力也是逐步提升的。

    youdao

  • But whole-disk encryption is far less secure if the user selects an easy-to-guess password.

    假如用户选了一个容易猜到密码整盘加密也不十分安全

    youdao

  • Service team to confirm the encryption card, a positioning card, the set-top box and the user installation sales list information corresponding to.

    服务队伍确认加密定位卡、机顶盒用户销售安装单上信息对应

    youdao

  • EnSTratus holds encryption keys and manages user access from its own SaaS solution, shielding data housed in the public cloud from unauthorized access.

    EnSTratus持有密钥管理用户获得属于SaaS解决方案保护储存于中的数据不受到认证用户的读取。

    youdao

  • Specify schema binding and encryption for stored procedures, triggers, user-defined functions, and views.

    指定存储过程触发器用户定义函数视图加密模型绑定

    youdao

  • User ID authentication, data encryption and digital signature are the three common technologies for data protection.

    采用的数据保护技术用户身份鉴别、计算机数据加密技术、数字签名技术等。

    youdao

  • User ID authentication, data encryption and digital signature are the three common technologies for data protection.

    采用的数据保护技术用户身份鉴别、计算机数据加密技术、数字签名技术等。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定