首先,PAGCOR从未被法律赋予权力以规范和授权网络/互联网游戏。
To begin with, PAGCOR has never been vested by law with the authority to regulate and license online/internet gaming.
他们可能还想限制进出其系统的网络流量,以便只有来自可信源的流量才可以进入其系统,以及只有授权的流量才可以出去。
They might also want to restrict the network traffic in and out of their system, so that only the traffic from trusted sources can enter their system and only authorized traffic can go out.
在配置安全环境时,您必须确保所有组件都能为网络通信提供相应的身份验证、授权和加密。
When configuring a secure environment, you must make sure that every component provides for appropriate authentication, authorization, and encryption of network traffic.
它允许网络访问服务器(NAS)执行对用户的验证、授权和记帐。
It allows a network access server (NAS) to perform authentication, authorization, and accounting for users.
这种方法的问题在于,它迫使我们将授权策略嵌入物理网络。
The problem with this is that it forces us to embed the authorization policy into the physical network.
务必考虑系统的每个层次的可能访问路径,同时还要考虑授权如何与其他安全功能(如网络级别的保护)集成。
It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.
一旦获同步光纤网络(SONET)授权,将显著减少用户网络延迟或等待的时间,确保大型信息文件安全。
Once in place on authorized Synchronous Optical Networks (SONET), users will experience significantly less network delay, or latency, common to securing large information files.
授权电脑是指纹识别的、唯一可以通过加密的通信通道对网络上关键资产进行访问的设备。
Authorized computers are 'fingerprinted' and are the only devices allowed to communicate across an encrypted communications channel to critical assets on the network.
在通过网络运行的软件或软件解决方案中,身份验证、授权、私密性、完整性和不可否认性是主要的安全组件。
Authentication, authorization, privacy, integrity, and non-reputation are the major security components of software or a software-based solution working over the network.
由于模型访问或错误url而产生的未授权URL可能会导致网络错误。
A network error could result from an unauthorized URL due to model access or an incorrect URL.
完整性:只有授权用户有权通过网络修改消息/数据。
Integrity: Only an authorized user is permitted to modify the messages/data over the network.
亚历山大旋即又指出,按照法律授权,他手下的网络战士与专家只负责保护军事网络。
Alexander also is quick to point out that his cyber warriors and experts are legally authorized to protect only military networks.
因此,内部网络固然可信,但应该有一个限度,即使是在内部网络上,身份验证和授权也很关键。
So the internal network is trusted, but only up to a point, and even on the internal network authentication and authorization are essential.
在联合网络模型中,受信任的联合中的每个合作伙伴被授权访问共享资源。
In the federated network model, each partner in a trusted federation is granted access to the Shared resources.
当然,现在很多商家接受电话口头授权和网络电子授权,就是常说的离线交易(CNP)。
Also, many merchants now accept verbal authorizations via telephone and electronic authorization using the Internet, known as a card not present transaction (CNP).
而且可以通过网络访问,所以无论何时何地都能访问,你们也可以访问这些工具啊,软件啊,还有一些,授权访问的小诀窍。
It is Internet accessible so you can access it most anywhere anytime and you can also access tools and software and tricks that the staff have made available.
通常为了进行网络访问授权和身份验证、内容筛选或通过缓存更好地利用网络带宽而进行此活动。
This activity is usually performed for network access authorization and authentication, content filtering, or to better utilize network bandwidth through caching.
巴黎——英国议会周四批准了一项计划,决定对数字媒体盗版进行打击,方法就是授权中断累犯们的网络连接。
PARIS - the British Parliament on Thursday approved plans to crack down on digital media piracy by authorizing the suspension of repeat offenders' Internet connections.
该网络可以是本地的,或者可能包括通过互联网协议链接的远程用户和其它授权人员。
The nets can be local, or may include links through Internet Protocol to distant users and other authorized personnel.
缺省的,使用受限环境,为应用程序授权对网络和本地机的有限的访问。
By default, a restricted environment is employed, granting an application limited access to the network and the local machine.
网络攻击、未经授权的设备,以及错误的或者不正确配置的主机,都可能导致在您的网络中出现潜在的问题。
Network hacks, unauthorized equipment, and bad or misconfigured hosts can all lead to potential problems on your network.
结果,StrongPoint利用Uniloc公司的物理硬件识别(PDR)为授权系统和通信网络提供了严密的认证。
As a result, StrongPoint provides impenetrable authentication using Uniloc's Physical Device Recognition (PDR) technology to grant access to authorized systems and communications networks.
结果,StrongPoint利用Uniloc公司的物理硬件识别(PDR)为授权系统和通信网络提供了严密的认证。
As a result StrongPoint provides impenetrable authentication using Uniloc's Physical Device Recognition (PDR) technology to grant access to authorized systems and communications networks.
Velocity的Windows服务目前运行在低授权的网络服务帐户下。
The Velocity Windows service now runs under the lower-privileged Network service account.
此参数在运行时向用户授权的时候指示远程AccessManager服务器的网络位置。
This parameter indicates the network location of the remote Access Manager server when authorizing users at run time.
只要用户授权,Flex应用程序就能在客户端上缓存任意大小的数据,这在接下来的会话频繁请求相同的数据时减少网络数据的往返。
With the user's permission, a Flex application can cache unlimited data on the client side, which reduces network round trips if the same data is requested again in the same or future sessions.
IT旧的安全模型是在企业网络周围建立一刻巨大的微尘,只让受信任的、已授权的员工穿越守卫严密的吊桥墙进入众所周知的城堡。
The old security model was for it to build a big mote around the corporate network and only let trusted, authorized employees come across the well-guarded drawbridge and into the proverbial castle.
理想情况下,他应该只需要证明自己的身份一次,然后就能够访问所有已经得到授权的网络资源。
Ideally she should only need to identify herself once and then be provided with access to all authorized network resources.
理想情况下,他应该只需要证明自己的身份一次,然后就能够访问所有已经得到授权的网络资源。
Ideally she should only need to identify herself once and then be provided with access to all authorized network resources.
应用推荐