为了您的安全,请勿篡改这些系统。
恐怖份子与黑客通过篡改华尔街电脑交易系统制造金融混乱,可以吗?
Could terrorists or hackers cause financial chaos by tampering with Wall Street's computerised trading systems?
如果希望保证通过消息系统发送的文档在传递过程中没有被破坏或篡改,那么就要用到数字签名。
In the case of digital signatures, you might want to be sure that when you send a document through a messaging system it has not been corrupted or tampered with in the process.
这样的帐户信息通常正是基于网络(或者甚至是终端机)登录某台服务器的的同名帐户,而且往往能用来接管整个系统或是篡改网页。
Such account information is often precisely the same used for web-based (or even terminal) logins on a server, and can be used to take over entire systems or deface web pages.
世行集团采用各种技术来保护系统中存留的信息,以防丢失、误用、越权使用或泄漏、篡改和破坏。
The World Bank Group employs a range of technologies to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.
这个会话显式地配置了根目录变更限制,从而避免恶意活动或篡改系统的行为。
The session has explicitly chroot jail configured to avoid malicious activity or tampering with the system. Following are few handy IBM SONAS CLI commands.
当您安装在您的系统软件和验证,它没有被篡改。
When you are installing software on your system, verify that it hasn't been tampered with.
首先,鉴于许多Android设备的系统被厂商人为篡改,导致系统功能不完整,因此谷歌执行了由来已久以来的“反分割”措施,以此告诫运营商和厂商,不要在修改程序上做得太过火。
By enforcing its long held "anti-fragmentation" measures, it is telling carriers and manufacturers that they can't get too crazy with their modifications.
优化后的系统快捷方便,防篡改能力得到增强,有效地保证了通信的安全。
The optimized system is quick and convenient, and the capacity to prevent tampering is improved, which guarantee the communication security effectively.
进入计算机系统进行监测,以确定不正当访问,篡改或改变由内部员工的业务数据。
Access to computer systems should be monitored to identify the improper access, tampering or altering business data by internal employees.
理论分析和实验数据表明,该方案在保证系统安全性的同时,有效地提高了篡改定位的精度。
Theory analysis and experimental results demonstrate that the proposed scheme improves the accuracy of tamper localization as well as ensure the security.
把混沌系统的初值敏感性和易碎水印对篡改的易碎性结合起来,提出一种基于混沌迭代的易碎水印产生方案。
A kind of fragile watermark based on chaotic map is proposed, which combines the initial condition sensitivity of chaotic system with this watermark fragility.
该系统实现了电子文档的防篡改功能、身份认证功能和不可否认功能。
The system can prevent documents from being illegal modification, identity authentication and non - repudiation.
攻击者利用网络技术,非法入侵他人计算机系统,窃取信息、篡改数据,给企业造成巨大损失。
Attackers use network technology, illegally intrude computer system, steal information, tamper data, and bring heavy losses to enterprises.
系统可对79个免接触RFID电子锁起到控制作用,从而支持多种所选项也能防止被篡改。
The system works with the 79 contactless RFID electronic lock, which offers multiple locking options and is tamper-resistant.
提出一种基于图像特征和公钥密码系统的易损水印算法,在图像认证中能够定位图像被篡改的位置。
A new invisible watermarking technique which could localize tampered areas for image authentication was proposed, based on image feature and public key cryptography.
我很确定计算机化的系统很适用于这种情况,自动分配桌子的能力,篡改时机等。
I'm sure the computerised system has a lot going for it: the ability to automatically allocate tables, juggle timings and so on.
在数据加密系统中,通常利用混沌模型迭代产生的序列作为密钥,以保障数据安全,防止非法篡改和窃取。
In the data encryption systems, chaotic sequences can be used as the secret key to guarantee the safety of data and prohibit the juggle and steal unlawfully towards the data we sent.
在恶意主机环境下,主机可以对软件系统进行逆向工程或者肆意的篡改,其安全性、完整性与可用性都受到了很大的威胁。
Reverse engineering has become possible or distorted wilfully for software system in malicious host surroundings, the security, integrity and availability of software system are threatened.
在恶意主机环境下,软件系统可以被逆向工程或被篡改,其机密性、完整性与可用性受到威胁。
In malicious host surroundings, a software can be reverse engineered and also can be tampered with.
加密文件系统是保护用户敏感数据的一种有效手段,传统的加密文件系统对用户数据的保护并不是非常可靠且存在被篡改的可能性。
Protecting sensitive data through traditional encrypted filesystem isn′t reliable, and can be tampered, so based on TCP and the core of Linux2.
这就需要对安装程序中的“系统检查”步骤尤其关注了,而且要确保没有任何丢失的或被篡改的文件。
In this case, pay special attention to the 'System Checks' step of the installer and make sure that there are no missing or modified files.
这就需要对安装程序中的“系统检查”步骤尤其关注了,而且要确保没有任何丢失的或被篡改的文件。
In this case, pay special attention to the 'System Checks' step of the installer and make sure that there are no missing or modified files.
应用推荐