自订验证,取得使用者认证然后手动设定使用者识别。
Custom authentication, where you manage getting user credentials and setting the user identity manually.
NET应用程序来说,预设网路认证是登入使用者或被模拟使用者的使用者认证。
Net applications, the default network credentials are the user credentials of the logged-in user, or the user being impersonated.
它提供用于验证使用者认证,建立和修改成员资格使用者,以及管理使用者设定(例如,密码和电子邮件地址)的功能。
It provides functionality for validating user credentials, creating and modifying membership users, and managing user Settings such as passwords and email addresses.
如果攻击者可以篡改认证硬件,则可能将伪造的数字数据直接发射到设备中。
If an attacker can tamper with the authentication hardware, it might be possible to inject falsified digital data directly into the device.
Kripanidhi的提议包含五种认证:实践者(作为个体的团队成员)、领导者、培训师、教练、布道者(现有的,或是刚刚出现的思想家)。
Kripanidhi proposes five certifications: Practitioner (an individual team member), leader, Trainer, Coach and Evangelist (existing and emerging thought leaders).
SSL客户端认证:这是最安全的,但是对购物者来说在浏览器上安装认证是比较麻烦的。
SSL client side authentication: This is the most secure, but it is cumbersome for shoppers to install on their browsers.
如果应聘者拥有认证,则表明他们拥有执行该工作所需的一定的技能和知识水平。
If applicants have certifications, it shows that they have some level of skill and knowledge needed to perform the job.
但是,对投资者和木材等产品的国际认证的税收减免正成为新的商业刺激政策。
But tax breaks for investors and international certification for products such as timber are helping create new business incentives.
另一方面,上下文接受者需要它的密钥来解密来自发起者的服务票证,通过这种方式认证发起者。
The context acceptor, on the other hand, requires its secret key to decrypt the service ticket received from the initiator, thus authenticating the initiator.
尽管电子认证系统的批评者们已经长时间担心攻击的可能性,这还是第一次“在自然环境中”发生这种攻击。
While critics of the CA system have long feared that such an attack could be possible, this is the first time such an attack has been seen "in the wild".
如果系统认证仅基于指纹,则攻击者可以在仔细搜集了系统已认证用户的指纹后适当地构造一只假手。
If a system authenticates based solely on fingerprints, an attacker could reasonably construct a fake hand after carefully gathering fingerprints of an authorized user of the system.
于是,思科改变了中层管理的工作性质,设立专门的认证机制,并按照新方案实施管理者培训。
So Cisco changed the nature of the job and created its own certification program to train managers based on this new approach.
这些提要中有些是公共可访问和可搜索的;另外一些只对经过成功身份认证的提要所有者可用。
Some of these feeds are publicly accessible and searchable; others are only available to the feed owner after successful authentication.
官方认证的世界上最高寿命者——一名巴西妇女,就在她115岁生日的前几周去世。
A Brazilian woman officially recognised as the world's oldest person has died just weeks from her 115th birthday.
他们也会创建认证,开发者必须通过应用的拷贝进行发布。
They also create the certificate that the developer has to distribute with each copy of the application.
根据数据库认证遵循标准购物流程的购物者,而根据LDAP服务器认证使用工具的管理员。
Shoppers going through the standard shopping flow are authenticated against the database, whereas administrators using the tooling are authenticated against the LDAP server.
购物者错误进入了非法站点并且提供了认证信息。
A shopper mistypes and enters the illegitimate site and provides confidential information.
这也简化了认证验证消费者的证书和鉴权如,消费者是否有权执行服务?
This also facilitates enforcement of authentication validate a consumer's credentials and entitlements e.g. does the consumer have the entitlements to execute a service?
最终,一个全面的解决方案将让域名所有者确认由给定的证书认证机构(CA)颁发的名字和机器号码是合法的。
Finally, a comprehensive solution would let domain owners confirm that the names and machine numbers issued by a given CA are kosher.
通过要求表单提交包含有效的认证密钥,然后才能处理,可以使攻击者更难伪造其他用户提交的表单。
By requiring that a form submission contains a valid authorization key before processing, you make it much more difficult for someone to forge a form submission for another user.
官方认证的世界上最高寿命者——一名巴西妇女,就在她115岁生日的前几周去世。
Brazilian woman officially recognised as the world's oldest person has died just weeks from her 115th birthday.
美国专利局拒绝评估认证永动装置,除非设计者们能制造出可用的模型。
The U.S. patent office refuses to assess claims for perpetual motion devices unless the inventors can produce working models.
单独计算登录数通过强制攻击者保持可计帐的、被认证及被授权,从而解决了许多密码破解问题。
Accounting logs alone solve many password cracking problems by forcing an attacker to be held accountable, authenticated and authorized.
它希望借助消费者对森林管理委员会认证的食品的需求,来促使伐木公司采用认证系统。
The hope was that consumer demand for FSC-certified wood products would force logging companies to adopt the scheme.
虽然除了那些顶尖高手之外,IP相关认证确实给攻击者设置了足够的障碍,但它也并非近乎完美。
While IP-related authentication certainly raises the bar high enough to keep out all except those of significant skill, it's not something you should ever consider likely to be perfect.
反过来,浏览器制造者和操作系统(OS)的设计人员---有些浏览者咨询证书认证机构的内部目录而其它人则翻动操作系统中嵌入的目录---毅然正式同意证书认证机构(CA)。
CAs are, in turn, signed off on by browser makers and operating-system (OS) designers—some browsers consult an internal list of CAs and others turn to a list embedded in the OS.
这个体系的设计和能源之星认证很类似,有了能源星级认证,消费者不需要在复杂产品规格中苦苦比较就能挑选到合适的节能设备。
The system is designed to be similar to the energy Star ratings, which let consumers pick out an energy-efficient appliance without wading through complicated specs.
这个体系的设计和能源之星认证很类似,有了能源星级认证,消费者不需要在复杂产品规格中苦苦比较就能挑选到合适的节能设备。
The system is designed to be similar to the energy Star ratings, which let consumers pick out an energy-efficient appliance without wading through complicated specs.
应用推荐