• 高人关于硬盘保护资料最好源代码

    Which skilled are known where the information on the hard drive protection, preferably the source code.

    youdao

  • 调查者中,除去正不断增多远程用户只有27%的人表示他们的公司目前使用硬盘加密技术保护企业终端敏感数据

    Yet, regardless of the growth in remote users, just 27% of respondents say their companies currently use hard disk encryption to protect sensitive data on corporate endpoints.

    youdao

  • 业务需要数据冗余保护,以免受单个硬盘故障的威胁。

    Businesses need data redundancy to protect against individual hard-drive failures.

    youdao

  • 东芝新型硬盘丢弃转卖打印机时就不必担心,因为数据已经在拔掉插座时就保护好了。

    But with one of Toshiba's new drives, you can junk or re-purpose a printer without worry-the data is secured when the plug is pulled.

    youdao

  • 硬盘上的信息一套复杂加密系统保护

    Information is protected by sophisticated encryption system.

    youdao

  • 美军才意识到他们保护usb硬盘数据安全,找出能够跟踪这些设备方法并且确保重要信息未经授权的员工访问

    The US Army realized they had to secure USB drives, find a way to keep track of the devices, and ensure that the information could not be accessed by unauthorized personnel.

    youdao

  • 第二点呢,知道怎么开始备份,包括哪些软件可以保护的的硬盘

    The second is knowing where to get started, including what software will provide you with the best bang for your backup buck.

    youdao

  • 取消加入保护硬盘工作

    FIX: Cancelling while adding protected drive not working.

    youdao

  • Passware KitForensicversion 9.5可以短短分钟内恢复BitLocker功能保护的的硬盘驱动器的加密密钥

    Passware Kit Forensic version 9.5 can recover encryption keys for hard drives protected with BitLocker in just a few minutes.

    youdao

  • 管制武器保护正面旨在单元一个硬盘影响导管然后进一步保护试点

    The control arms protect from the front and are designed to snap off in a hard impact, the ducts then further protect the pilot.

    youdao

  • 给出一些常用加密解密方法跟踪技术,内容包括硬盘加密、软盘加密以及磁盘软件加密与保护技术。

    The paper gives some practical methods of encryption and decryption as well as preventive trace, including hard disk encryption, floppy disk encryption, disk file encryption and protection.

    youdao

  • 移动中恶劣情况下,无论系统运行还是关闭时保护硬盘数据

    Protects the hard drive, and your data, from the rough reality of mobility, whether the system is on or off.

    youdao

  • 硬盘动态保护进行了详细剖析结合实际应用给出主要程序

    This paper analyses the dynamic written protection of hard disk in detail, and the main program sections combined the applications are given.

    youdao

  • 所有数据存储这两个保护胶囊使用-VDR2200硬盘在S。

    All data is stored in both the protective capsule and on the hard disk in the S-VDR2200.

    youdao

  • 利用API函数VB设计了一种硬盘软件,其使用方便运行可靠,有自动修复能力,可有效地保护版权

    A new harddisk software lock designed by VB with API function. It is running safely and conveniency, with capability for restoring automatous, so it protects copyright validly.

    youdao

  • 我们产品提供实时保护阻止恶意软件复制硬盘驱动器

    Our products provide real-time protection that will block that malware from being copied to the hard drive.

    youdao

  • 可以保护所有硬盘驱动器

    You can also use it to protect your entire hard drive.

    youdao

  • 整个软件主要包括硬盘保护程序硬盘保护解锁程序。

    The software chiefly consists of the major programme of hard-disk-writing protection and its programme of unlocker.

    youdao

  • 采取网络硬盘还原实现硬盘数据保护网络拷,达到了减少维护工作量目的。

    Moreover, to lower maintenance efforts, the technique of network harddisk recovery card is adopted in implementing data protection, copy and recovery based on networks.

    youdao

  • 论述了硬盘引导记录CMOS参数备份恢复程序设计方法硬盘保护实现

    The master boot record of hard disk, the programming method for the copying and restoring CMOS parameters, and realizing the writing protection of hard disk is represented.

    youdao

  • VC的,一个读取硬盘序列号CPU序列号DLL大家可以利用来为自己软件提供保护机制

    VC written by a reader drives and CPU serial number sequence, the DLL, you can use it for its own software to provide protection...

    youdao

  • 同时根据硬盘数据结构采取一些技术手段保护硬盘中的系统工作数据,使硬盘中的数据免受病毒侵害他破坏。

    At the same time, on the basis of data structure, we can use some technology methods to protect the system working data in order to avoid being destroyed by virus or others.

    youdao

  • 同时根据硬盘数据结构采取一些技术手段保护硬盘中的系统工作数据,使硬盘中的数据免受病毒侵害他破坏。

    At the same time, on the basis of data structure, we can use some technology methods to protect the system working data in order to avoid being destroyed by virus or others.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定