根据国际标准提出了一种基于现货供应商品的二取二安全计算机方案。
According to international standards, a safety computer system with two out of two configuration based on Commercial-Off-The-Shelf is put forward.
分布式异构三取二安全控制单元以传统三取二安全计算机为基础,采用容错设计,具有高安全性,高可靠性的特点。
Distributed heterogeneous TMR (Triple Modular Redundancy) safety control unit, which is based on traditional TMR safety computer, has the character of high security and high reliability.
防火墙为计算机网络提供了基本安全保障。
A firewall provides an essential security blanket for your computer network.
防止这种类型的欺诈不是一件容易的事,一个新的计算机科学领域正在发展以应对安全问题。
The prevention of this type of fraud is no easy task, and a new field of computer science is developing to cope with security issues.
然而我们要认识到,这种攻击并不仅仅存在于计算机和数字安全领域。
Realize, though, that this attack is not reserved strictly for the realm of computer and digital security.
用户可访问安全门户来检查其计算机,扫描的结果可以在门户上获得,也可以通过电子邮件获得。
Users access the security portal to check their computers, and they get the results either on the portal or through email.
尽管有了所有这些努力,但真正的限制计算机安全可能是人类的本性。
For all those efforts, though, the real limits to computer security may lie in human nature.
简介:由于黑客攻击最近在新闻中屡有报导,我们都知道需要认真地对待计算机安全问题。
Summary: With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously.
不过,一名计算机安全专家称,即使是这样大规模的攻击也不一定来自大型或有势力的组织。
However, one computer security expert said that even an attack of this size did not necessarily have to be the work of a large or powerful group.
由于僵尸网络的存在把世界上一些最好的计算机安全专家聚到一起来阻止其带来的潜在破坏。
The existence of the botnet has brought together some of the world’s best computer security experts to prevent potential damage.
通过观念和信息的分享来为计算机安全领域的进步打下基础。
It serves as the foundation for the improvement of computer security worldwide by sharing goals, ideas, and information.
要记住的一点是相信计算机安全一定能通过计算的方法验证。
One point to remember is that trust in computer security must be computationally verifiable.
选择之一是请求计算机安全专家的帮助。
了解计算机安全的社会因素。
“匿名”随后发现,巴尔与他的一些同事竟然犯了计算机安全的大忌:对多个账号使用相同密码。
Barr and some of his colleagues, Anonymous then discovered, had committed computer security's biggest sin: They used the same password on multiple accounts.
这意味着计算机和网络安全专家总会有需求。
That means there will always be a need for computer and network security specialists.
安全软件能使远程计算机被“锁定”,以免考生开启未经批准的窗口。
Remote computers are "locked down" with security software, to prevent unauthorised Windows from being opened.
这家芯片制造企业支付了60%的溢价,表明了对计算机安全的重要性增强,也助长了与这些业务相关交易的投机。
The chipmaker paid a 60 percent premium, underscoring the growing importance of computer security and fueling speculation that related deals may be in the works.
对计算机安全的介绍。
同时还数据对进行了分门别类的管理,类别有销售、安全、计算机、因特网、通信、金融管理和培训等,每个分类又有进一步的子分类。
Data is organized in a number of categories - Sales, Security, Computer, Internet, Communication, Financial Management, Training, etc. -, each category being further organized in sub-categories.
我们建议,在造访地球前请您先给自己的网路设上密码,并且请安装使用人类的安全软件以预防计算机攻击。
We advise protecting your network with passwords and generally adopting humanity's own security measures against any computer-based attacks before visiting Earth.
我早期对计算机安全的兴趣实际上激发了我对计算机科学的最初兴趣,并且从那时起就一直是我关注的焦点。
My early interest in system security is actually what sparked my initial interest in computer science and has been a focus of mine ever since.
许多资深的计算机安全研究人员认为这种战略是“外硬内软”。
“Hard on the outside, with a soft chewy center, ” is the way many veteran computer security researchers think of such strategies.
他们设计了一个系统用来测试计算机的安全网络,在这个系统中,计算机将会模拟人类的各种错误行动,正是这些导致了网络的脆弱。
They have created a system for testing computer-security networks by making computers themselves simulate the sorts of human error that leave networks vulnerable.
大多数计算机安全分析都没有提及针对Twitter的具体攻击来源。
Most computer security analysts did not cite a specific source of the attack on Twitter.
1月28日Kerviel就滥用职权、违反计算机安全条例及伪造文件开始接受正式调查。
On January 28th Mr Kerviel was placed under formal investigation for abuse of trust, breaching computer security and falsifying documents.
“神经装置正以极快的速度进行革新,未来前景巨大,”华盛顿大学的计算机安全专家TadayoshiKohno说。
“Neural devices are innovating at an extremely rapid rate and hold tremendous promise for the future,” said computer security expert Tadayoshi Kohno of the University of Washington.
计算机安全技术公司McAfee已经发布了最新的恶意网站地图报告。
McAfee, the computer security company, has released its latest "Mapping the Mal Web" report.
我们能够明确配置ubuntu确保儿童使用计算机的安全。
We can definitely configure Ubuntu to make the computer a safer tool for our children to use.
出于安全考虑,请确保不能从远程计算机执行管理活动。
Ensure that administrative activities can not be performed from remote machines, for security reasons.
应用推荐