固件:永久记录程序,例如,只读存储器。
软硬件的键盘记录程序是非常难以避免的威胁。
Hardware and software keyloggers are great threats which are very difficult to avoid.
商务电话的有效使用举例,以及话务结果记录程序。
Demonstrate the effective use of the telephone in business and the procedures of record keeping of call results.
用你的键盘键入任何文字,而键盘记录程序猎人运行。
Use your keyboard to type any text while Keylogger Hunter is running.
记录装置,记录方法,记录程序,以及程序记录介质。
Recording device, recording method, recording program, and program recording medium.
在照片的内容是用来记录程序,决定和研讨会的结果。
The content of photographs is used to document the proceedings , decisions and results from workshop.
是否接受由于货物装卸操作造成损坏的报告和记录程序?
Has a procedure for reporting and recording damage from cargo operations been agreed?
流程的所有通路都将调用审核记录程序来记录流程的始末。
On all paths through the process, the audit logger is invoked to record the start and end of the process.
看到键盘记录程序文件-它必须不包含文字,你还有打字。
See the keylogger file - it must not contain the text you have typed.
每个日志记录程序都可以配置自己的优先级和输出处理程序。
Each of these loggers can be configured with its own priority and output handler.
中和高达九成的按键记录程序,剥夺了他们的资料,对压键。
Neutralizes up to 90% of keyloggers, depriving them of information about the pressed keys.
非常容易使用,并没有更多的复杂性,例如传统的反按键记录程序。
Very Easy to use, and no More Complexity like Conventional Anti keyloggers.
查看以下示例,该示例显示了在运行一些SQL查询时使用的记录程序。
Take the following example, which shows a logger being used while running some SQL queries.
当用启输入口令时,按键记录程序或木马病毒被禁用并防止记录击键。
Keystroke loggers or Trojan viruses are disabled and prevented from recording keystrokes as users input their passwords.
例如,安全性日志记录程序可以在将日志写入目的地之前对消息进行加密。
For example, the security logger can encrypt a message before it is written to the destination.
S60官方视屏记录程序,我也没有测试过,不过是官方的,应该没问题。
S60 official screen recording procedures, and I have not tested, but it is official, should be no problem.
一旦选定日志记录程序并建立起日志级别之后,就可以开始构建日志消息了。
Once you've chosen the logger and established the logging level, you can start building your log message.
有记录程序表明在处理不合要求产品时的控制,相关责任和相关权威部门吗?
Does a documented procedure exist indicating control and related responsibilities and authorities for dealing with nonconforming product?
在所有程序按键记录程序,有多少方法获得的资料,钥匙,你的新闻是有限的。
In all program keyloggers, the number of methods for getting information about keys you press is limited.
但是复杂不仅仅是数学问题:副作用还使得测试、理解、分析和记录程序的行为更加困难。
But the complications go beyond the math: Side effects make it harder to test, understand, analyze, and document a program's behavior.
禁用键盘记录程序亨特和任何类型的文本再次-它将出现在键盘记录程序文件。
Disable keylogger Hunter and type any text again - it will appear in the keylogger file.
如果这个数字较大,则提醒审计日志记录程序没有足够的时间进行处理,队列过大。
If this number were large, it would suggest that the audit logger was not getting enough time to work and the queue was allowed to build up.
所有服务器和客户端之间传输的数据未加密,这意味着您容易受到击键记录程序。
All data transferred between the server and client is unencrypted, which means you're susceptible to keystroke loggers.
钩基于键盘记录程序是最普遍的类型的按键记录程序,因为这种方法很容易到实现的。
Hook based keylogger is the most prevailing type of keyloggers, since this method is very easy-to-realize.
或者你可以两者都做,日志记录程序访问这两个日志分析和更可读的格式到另一个日志。
Or you can do both, logging accesses to both a log for a program to analyze and to another log in a more human-readable format.
信息分发系统,该信息分发系统中应用的终端设备,记录程序的记录介质以及环路连接避免方法。
Information distribution system, terminal apparatus used in such system, recording medium on which program is recorded, and loop connection avoidance method.
有些网站在没有信息记录程序的情况下无法正常运行,所以,在沙箱中运行浏览器会是一个好方法。
Some sites will not work properly without cookies, so it's a good idea to run your browser in a sandbox such as Sandboxie, which insulates it from the rest of your computer.
主要目的的按键记录程序是背诵想要的资料,并告知“有兴趣”,对每一个符号,你进入,而打字。
The main purpose of the keyloggers is to memorize desired information and to inform the "interested party" about each symbol you enter while typing.
为了避免这个问题,应用程序应该具有一组专用的日志记录程序,它们都进行了独特的分类,如清单3所示。
To avoid this problem, an application should have a set of specialized loggers with distinct categories, as Listing 3 illustrates.
该技术使用一个自动机来记录程序加密和解密的方法,并且使用瘦虚拟机来完成对加密过的程序解释执行。
This technology employed an automata to record encrypt and decrypt ways. Furthermore, the thin virtual machine was responsible for interpretation and execution of these encrypted programs.
应用推荐