• 为了安全请勿篡改这些系统

    For your safety, never tamper with these systems.

    youdao

  • 恐怖份子黑客通过篡改华尔街电脑交易系统制造金融混乱,可以吗?

    Could terrorists or hackers cause financial chaos by tampering with Wall Street's computerised trading systems?

    youdao

  • 如果希望保证通过消息系统发送文档在传递过程没有破坏篡改那么就要用到数字签名

    In the case of digital signatures, you might want to be sure that when you send a document through a messaging system it has not been corrupted or tampered with in the process.

    youdao

  • 这样帐户信息通常正是基于网络(或者甚至是终端机)登录某台服务器的的同名帐户,而且往往能用接管整个系统或是篡改网页

    Such account information is often precisely the same used for web-based (or even terminal) logins on a server, and can be used to take over entire systems or deface web pages.

    youdao

  • 世行集团采用各种技术保护系统存留信息,以防丢失、误用越权使用泄漏篡改破坏

    The World Bank Group employs a range of technologies to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.

    youdao

  • 这个会话显式地配置了目录变更限制,从而避免恶意活动篡改系统行为

    The session has explicitly chroot jail configured to avoid malicious activity or tampering with the system. Following are few handy IBM SONAS CLI commands.

    youdao

  • 安装系统软件验证没有篡改

    When you are installing software on your system, verify that it hasn't been tampered with.

    youdao

  • 首先,鉴于许多Android设备的系统厂商人为篡改,导致系统功能不完整,因此谷歌执行了由来已久以来的“反分割”措施,以此告诫运营商厂商,不要修改程序上做太过火。

    By enforcing its long held "anti-fragmentation" measures, it is telling carriers and manufacturers that they can't get too crazy with their modifications.

    youdao

  • 优化后的系统快捷方便篡改能力得到增强,有效地保证通信安全

    The optimized system is quick and convenient, and the capacity to prevent tampering is improved, which guarantee the communication security effectively.

    youdao

  • 进入计算机系统进行监测,确定正当访问篡改改变内部员工业务数据

    Access to computer systems should be monitored to identify the improper access, tampering or altering business data by internal employees.

    youdao

  • 理论分析实验数据表明方案保证系统安全性同时,有效地提高篡改定位精度

    Theory analysis and experimental results demonstrate that the proposed scheme improves the accuracy of tamper localization as well as ensure the security.

    youdao

  • 混沌系统初值敏感性和易水印篡改易碎性结合起来,提出基于混沌迭代的易碎水印产生方案。

    A kind of fragile watermark based on chaotic map is proposed, which combines the initial condition sensitivity of chaotic system with this watermark fragility.

    youdao

  • 系统实现了电子文档篡改功能、身份认证功能不可否认功能。

    The system can prevent documents from being illegal modification, identity authentication and non - repudiation.

    youdao

  • 攻击者利用网络技术非法入侵他人计算机系统窃取信息篡改数据企业造成巨大损失。

    Attackers use network technology, illegally intrude computer system, steal information, tamper data, and bring heavy losses to enterprises.

    youdao

  • 系统79个免接触RFID电子起到控制作用从而支持多种选项能防止篡改

    The system works with the 79 contactless RFID electronic lock, which offers multiple locking options and is tamper-resistant.

    youdao

  • 提出基于图像特征公钥密码系统的易损水印算法,图像认证能够定位图像被篡改的位置。

    A new invisible watermarking technique which could localize tampered areas for image authentication was proposed, based on image feature and public key cryptography.

    youdao

  • 确定计算机化的系统适用于这种情况,自动分配桌子能力篡改时机

    I'm sure the computerised system has a lot going for it: the ability to automatically allocate tables, juggle timings and so on.

    youdao

  • 数据加密系统中,通常利用混沌模型迭代产生序列作为密钥保障数据安全防止非法篡改窃取

    In the data encryption systems, chaotic sequences can be used as the secret key to guarantee the safety of data and prohibit the juggle and steal unlawfully towards the data we sent.

    youdao

  • 恶意主机环境下,主机可以软件系统进行逆向工程或者肆意篡改安全性完整性可用性都受到了很大的威胁

    Reverse engineering has become possible or distorted wilfully for software system in malicious host surroundings, the security, integrity and availability of software system are threatened.

    youdao

  • 恶意主机环境下软件系统可以逆向工程篡改,其机密性、完整性与可用性受到威胁。

    In malicious host surroundings, a software can be reverse engineered and also can be tampered with.

    youdao

  • 加密文件系统保护用户敏感数据一种有效手段,传统的加密文件系统用户数据的保护并不是非常可靠且存在篡改可能性。

    Protecting sensitive data through traditional encrypted filesystem isn′t reliable, and can be tampered, so based on TCP and the core of Linux2.

    youdao

  • 就需要安装程序中的系统检查步骤尤其关注了,而且确保没有任何丢失篡改文件

    In this case, pay special attention to the 'System Checks' step of the installer and make sure that there are no missing or modified files.

    youdao

  • 就需要安装程序中的系统检查步骤尤其关注了,而且确保没有任何丢失篡改文件

    In this case, pay special attention to the 'System Checks' step of the installer and make sure that there are no missing or modified files.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定