检查密码的传入连接现在是可选的。
Checking of passwords for incoming connections is now optional.
只有当用户登录到CM时才需要检查密码。
这个模块将检查密码是否遵循了良好的密码设置习惯。
This module will test a password to see if it follows good password practices.
密码策略的组成部分之一是检查密码到期日期和访问限制。
One part of a password policy is to interrogate password expiry and restriction for review.
也许程序会检查密码以认证用户,或者对数据加密以将它隐藏等等。
Perhaps the program checks passwords to authenticate users, or encrypts data to keep it hidden, and so on.
对于High、Medium和Low安全级别,检查密码、用户和组定义。
Checking password, user, and group definitions for High, Medium, and Low security levels.
运行的时候,TAI检查密码,通过用户注册中心验证密码是否属于信任用户。
At run time, the TAI examines the password and validates with the user registry that the password belongs to the trusted user.
在检查密码时,会对比用户提供的密码的散列签名和数据库中存储的签名。
Password validation is done by comparing the hash signatures of the password provided by the user with the signature stored in the database.
例如,当一个用户登录时,我们根据存储在数据库中的密码和用户标识副本检查密码和用户标识。
For example, when a user logs on we check the password and userid against a stored copy in our database.
而且通过检查持有密码区的页面,当用户提交它们的信息时,我们同样可以检查密码数据将被发送到哪里。
Besides checking the page hosting the password field, we can also check where password data is going to be sent when users submit their information.
清单7显示了 hasNonPrintable子例程,它可以针对 @nonPrintable数组中的一个预期前缀检查密码。
Listing 7 shows the hasNonPrintable subroutine used to check a password for one of the expected prefixes in the @nonPrintable array.
GoogleChrome阻拦了这种狡猾的攻击,再一次使用same - origin策略,检查密码数据被提交到哪个页面。
Google Chrome defends against this subtle attack by checking the page to which the password data is submitted, once again using the same-origin policy.
无意义介导的衰变检查是否存在过早的无意义密码子。
Nonsense-mediated decay checks for the presence of premature nonsense codons.
您需要为这个方法传入三个参数,即ID文件、密码和用于检查更改的服务器。
You pass to this method the ID file, password, and server on which to check for changes.
在这里,它只是针对固定值检查提供的用户名和密码,但它可以轻松使用一个数据库查询或其他机制替代。
In this case, it just checks the supplied username and password against fixed values, but it could easily use a database lookup or other mechanism instead.
它只是检查名称和密码是否与数据库匹配。
It simply checks if the name and password match up to the database.
即使用户采用公共密钥或基于主机的身份验证,也会执行这个密码检查。
This password check is done even if the user is following the public key or host-based authentication.
清单6将添加第一个基本的击键力度相关的检查子例程:密码输入总时间。
Listing 6 adds subroutines for the first basic keystroke dynamics-related check: total time of password entry.
当用户登录并输入用户名和密码时,会检查这些文件。
These files are checked when a user logs in and enters a username and password.
在进入以后,他们可以检查文件系统,查看个人信息,比如密码。
Upon entry, they scan your file system for personal information, such as passwords.
在经过简单的检查确保两个密码长度相等之后,将在整个密码中匹配各个键——例如,确保两个密码中的第五个字符是零。
After a simple check to ensure the two passwords are of equal length, each key is then matched in the entire password - ensuring that the fifth character is a zero in both passwords, for example.
默认的身份验证器仅仅检查用户名和密码是否相同。
The default authenticator simply verifies that the username and password are identical.
检查用户ID和密码,并进行相应的修改。
密码规则用于控制对主体密码的单项限制或检查项。
A password rule governs a single restriction or checks on the principal's password.
清单4显示为对一个用户的项目目录进行密码检查向httpd . conf增加的代码,而不是将其放入一个. htaccess文件并依赖于AllowOverrides。
Listing 4 shows the additions to httpd.conf to enable password checking for a user's project directory, rather than putting in a.htaccess file and relying on AllowOverrides.
最初,表单只是检查用户名和密码,如果正确无误则创建一个loginToken。
Originally, it simply checked the username and password and created a loginToken if they were correct.
因此,如果您自己管理安全设置(例如通过编辑文件、设置密码规则等等),那么AIXPert安全检查不起作用。
So, if you've started locking down security yourself-for example, by editing files, setting password rules, and so on-the AIXPert security check won't work.
我要做的只是了解如何使用ActiveDirectoryServer检查用户名和密码,创建一个类来扩展这个接口,并添加执行身份验证的代码。
All I had to do was find out how to check the username and password using Active Directory Server, create a class to extend this interface, and add the code to perform the authentication.
它从前面生成的passfile文件读取用户名和密码,然后通过检查 /etc/passwd 确认这是有效的账户。
It reads the user and password from the file passfile, (generated earlier in this demonstration) it then checks this is a valid account by checking /etc/passwd.
对root密码的更严格的检查。
应用推荐