用户名及密码经常存储于各自的应用程序中,但不能在常规基础上进行改变并且也不安全。
User names and passwords are often stored with each application, but cannot change on a regular basis and are not secure.
如果安全性设置激活了,您必须提供一个用户名及密码。
If security Settings are enabled, you must provide a user name and password.
诺顿有一个称作“诺顿身份安全”的特性。该特性允许用户将所有用户名及密码进行云储存,而不是储存在个人电脑里。
Norton has a feature called Norton Identity Safe which allows you to store all your usernames and passwords in the cloud, rather than on your PC for better security.
它没有依赖于简单数据库方法的用户名及密码的依赖,而是提供可扩充的文档模式。
It does not have the user name and password dependencies of the simple database approach and provides an extensible and documented schema.
TCP端口可能必须要改变,从而避免与安装在开发人员机器上的其他应用程序发生冲突;用户及密码可以从任意客户机上使用 SQL语句来改变。
The TCP port may have to be changed so it won't conflict with other applications installed on the developer's machine; the user and password can be changed by SQL statements from any client.
当使用文件传输协议传送文件时,该协议发送未经解密的必需帐户名及密码。
When using standard FTP to transfer files, the protocol sends the necessary account name and password without encryption.
记住要用实际的值替换该清单及后面其他清单中的用户名和密码。
Remember to replace the dummy user name and password in this listing, and all subsequent ones, with actual values.
健壮的密码,让软件保持更新及适当地修补,并且当添加了每个软件困扰时了解它的影响,是最终用户添加保护层的小方法。
Strong passwords, keeping software up-to-date and properly patched, and knowing the impact of each piece of the software puzzle as it is added are small ways the end user can add layers of protection.
设想一个包含用户名域、密码域及登录按钮的简单登录表单。
Imagine a simple log-in form where you have a username field, a password field and a login button.
至少,要允许用户以一种安全的方式设置数据库登录及密码,从而使其中的材料不会对外公开。
At the very least, you want to allow the user to set the database login and password in a way that is secure so that material isn't externally visible.
单独计算登录数通过强制攻击者保持可计帐的、被认证及被授权,从而解决了许多密码破解问题。
Accounting logs alone solve many password cracking problems by forcing an attacker to be held accountable, authenticated and authorized.
然后,填上其他账号的电邮地址及密码,并选择你信息出现的位置。
Then, simply provide the email address and password for your other account and choose where you want the messages to appear.
恶意用户能够使用PaddingOracle (PO)攻击方式来解密cookie,加密状态及认证密码等关键信息。
Using a Padding Oracle (PO) attack a malicious user can access encrypted data such as cookies, state, membership password, etc.
该代码通常会将任何登录到此web站点的用户的ID及密码信息传递到攻击者的Web站点。
This code basically passes the user ID and password information of any user logging into the Web site along to the Web site of the attacker.
输入具有manager角色的用户代码及密码(图9)。
Enter the user code with the manager role and its password (Figure 9).
输入具有manager角色的用户代码及密码。
密码设置在8个字符及以上,字符间用空格或下划线。
Choose passwords of eight characters or more. Separate short words with Spaces or underscores.
Kerberos领域(及windows域)将使用以计算机密码的形式提供的保密信息跟踪加入其中的计算机。
A Kerberos realm (and Windows domain) tracks computers joined to them using a Shared secret in the form of the computer's password.
可以肯定的是,任何数据库配置(例如,数据库名称、数据库用户用及密码)都应该是可配置的。
Certainly, any database configurations (for example, the database name, database user name, and password) should be configurable.
电脑会把针对不同网站的多个用户名及密码存储起来,指纹扫描装置校验了用户的身份后,电脑马上自动把用户名、密码填进去。
Multiple user names and passwords for different websites are stored by the computer, which fills them in automatically once the user's identity has been verified with a finger-scan.
这一密码列表刊登在了网站上,黑客及网络安全研究人员可自由下载。
The list was briefly posted on the Web, and hackers and security researchers downloaded it.
除了INI文件名和用户名及密码之外,代码与之前用INI文件内的记录进行身份验证的代码相同。
Aside from the name of the INI file and the user name and password, the code is identical to that used to authenticate a user using the records in an INI file.
神秘:画家在他的作品中隐藏的密码和谜语在丹.布朗的书及2006年的电影《达芬奇密码》中得到解释
Mystery: The codes and riddles that the artist hid in his work were illustrated in the Dan Brown book and 2006 film 'The Da Vinci Code'
WS - Security构建于成熟的密码学以及xml加密及签名的行业标准基础上,为Web服务应用程序提供了一整套的安全特性。
WS-Security provides a comprehensive set of security features for web service applications, building on established industry standards for cryptography and for XML encryption and signing.
作为Sasha,使用您登录及退出时相同的拉下菜单(默认的密码与用户的ID相同,因此密码也是Sasha,直到它被改变时)。
Using the same drop-down menu that you used to log out, log in as Sasha (passwords default to the same value as the user ID, thus the password is also Sasha until it is changed).
以防止未经授权的用户访问,相机及摄录机所保护的密码。
To prevent unauthorized user to access, the camera and video are protected by password.
在中国建设银行申请的“陆港通龙卡”待卡及密码制成后,中国建设银行会通知阁下到指定网点领取。
When the Cross Border Long Card and Password which you have applied with CCB are ready, you will be informed to collect them at the designated CCB location.
这些服务器的机器名称、分配的IP地址、掩码及管理员密码都在这张表上。
Here is the list that comes with all assigned machine names, associated IP addresses, subnet masks, and admin passwords for these guys.
您必须先以个人登录编号及密码登录网站方可下订单及使用各种业务管理功能。
In order to place an order or utilize the business management functions on the Site, you must log on with your ID number and password.
不要随意根据提示输入银行卡帐号及密码,除了转账及汇款时会需要用到密码,正规网站的兑奖是不会要用户银行卡密码的。
Don't follow the prompts to enter the bank card number and password, but will need to use passwords transfers and remittances, the site of the formal awarding is not to the user's bank card password.
应用推荐