在创建用户时,要求输入密码等信息。
While creating a user, you will be asked for information such as password.
这类恶意软件能够对计算机操作系统和嵌入式设备进行隐蔽探测,记录网络内部结构、口令密码等信息。
This kind of malicious software can hide the computer operating system and embedded devices, recording the internal structure of the network, password password and other information.
只需运行install.php,填写好服务器、数据库、用户名、密码等信息,然后提交即可。
Just run the install. PHP, to fill a good server, database, user name, password and other information, you can then submit.
Be ta版火狐4包含火狐同步特性,以致于您浏览的历史记录、书签、标签和密码等信息将在您的移动和桌面设备之间同步。
Features of Firefox 4 Beta include Firefox sync, so that browsing history, bookmarks, tabs, and passwords are synced across your mobile and desktop devices.
要求登录者输入仅账号拥有者才知道的好友信息等能有效地减少未获授权的登录,即使账户密码不幸被泄露。
The requirement to enter information that only users would know - such as the identity of their friends - can help stop unauthorised access should their passwords somehow become compromised.
通过重新配置分配与OS 相关的参数,比如IP、主机名、密码等网络信息。
Reconfiguration needed to assign OS-specific parameters like network information: IP, hostname, passwords, etc.
该文件包含如下信息,如使用的是什么类型的数据库、用户名和密码等,以及所有必须的资源文件,如POJO所用的.hbm文件。
This file holds information like what type of database is being used, username, password, etc., as well as any necessary resource files, such as.hbm files for POJOs.
通过使用这种技术,攻击者可以获得诸如密码、信用卡号以及用户输入的任意信息等敏感数据,如图2 所示。
Using this technique, the attacker can gain sensitive data such as passwords, credit card numbers, and any arbitrary information the user inputs as shown in Figure 2.
通过使用这种技术,攻击者可以获得诸如密码、信用卡号以及用户输入的任意信息等敏感数据,如图2所示。
Using this technique, the attacker can gain sensitive data such as passwords, credit card Numbers, and any arbitrary information the user inputs as shown in Figure 2.
它通常用于为你的计算机进行独特的识别并安全地储存类似用户身份、密码、偏好和在线概况等信息。
It is normally used to assign a unique identification to your computer and securely store information such as user IDs, passwords, preferences, and online profiles.
恶意用户能够使用PaddingOracle (PO)攻击方式来解密cookie,加密状态及认证密码等关键信息。
Using a Padding Oracle (PO) attack a malicious user can access encrypted data such as cookies, state, membership password, etc.
有时,受侵电脑会被进一步用于其他欺诈活动,例如网络钓鱼攻击,这种攻击往往会说服用户透露银行密码等敏感信息。
Compromised computers are sometimes used to further other scams, such as "phishing" attacks that try to persuade users to reveal sensitive information such as bank passwords.
这些隐藏的信息可以使普通文本、密码文本或图像等。
This hidden information can be plain text, cipher text, or even images.
如今在计算机网络环境下信息的机密性、安全性、完整性、可用性等特性,都需要采用密码技术来解决。
Nowadays, in the computer network environment, all the confidentiality, security, integrality, usability and nonrepudiation of the information must be resolved by encrypting technology.
使用这个存储信用卡信息,密码等完全安全。
Use this to store credit card information, passwords etc. Completely safe.
为了帮助限制对数据源的访问,必须保护诸如用户ID、密码和数据源名称等连接信息的安全。
To help limit access to your data source, you must secure connection information such as user ID, password, and data source name.
因为该工作人员有刘女士老公的电话、姓名、家庭住址等信息,可以很容易地将信用卡激活、然后设置密码消费。
Because the staff Mrs Lau husband's phone number, name, home address, and other information, can easily be activated credit card, and then set a password consumption.
“遗物守护者”、“财产锁定”和“死亡开关”等公司都提供加密空间,让人们保存他们的密码以及其他信息。
Legacy Locker, Asset Lock and Deathswitch are among the firms offering 20 encrypted space for people to store their passwords and other information.
密码技术是解决信息网络安全的关键技术,信息网络安全中的身份认证,传输和存储信息的加密保护、信息完整性和不可否认性等,都需要运用密码技术来解决。
It is the identification? The encryption protection of transmission and storage? Integrality and undeniability in information network security that need to use password technology to be solved.
SSL协议采用了对称加密、非对称加密、信息摘要、数字签名、数字证书等密码学技术。
SSL protocol USES symmetric encryption, asymmetric encryption, message digest, digital signature, digital certificate and other cryptographic techniques.
信息安全技术主要包括以加密技术为代表的密码技术、密钥管理技术、数据库加密技术等。
Information security, encrypt technique is representation, includes secret key technique, database encrypt technique, and so on.
本酒店管理系统有登记、订房、退房、查看房间信息、查看客人信息、管理员密码修改等主要功能,根据需要可以添加新房间。
By this system, you can check in, book room, inquire about the room information or guest's information and change the password. You can add new room if you want.
量子密码通信是一个迅速成长的领域,它涉及到许多学科,如量子力学、量子光学、信息论、密码学以及通信技术等。
Quantum cryptography communication is a rapidly growing field, it involves many subjects, such as quantum mechanics, quantum optics, information theory, cryptography and communication technology.
有些被截获的邮件中甚至含有用户名、密码以及公司内部网络细节等信息。
Some of the intercepted correspondence contained user names, passwords, and details of corporate networks.
有些被截获的邮件中甚至含有用户名、密码以及公司内部网络细节等信息。
Some of the intercepted correspondence contained user names, passwords, and details of corporate networks.
应用推荐