该示例将X.509二进制安全令牌的另外一个用户名令牌。
The example adds an X. 509 binary security token in addition to a username security token.
一旦消息被签名,X . 509证书本身就作为二进制安全性令牌包含进soap头了。
Once the message has been signed, the X.509 certificate itself is included in the SOAP header as a binary security token.
为了满足这个需求,设置Web服务安全性(WS-Security)来提供消费应用程序(Consuming Application)的 X.509证书作为 Web 服务请求中的二进制安全性令牌。
To address this need, WS-Security was set up to provide the Consuming Application's X.509 certificate as a binary security token within web services requests.
如果这些数据碰巧是文本,您只需将它们放到CDATA区域中,但真正的二进制数据需要以一种安全且可恢复的方式编码。
If the data happens to be text, you can dump it into a CDATA section and be done with it, but true binary data needs to be encoded in a safe and recoverable manner.
消息摘要是安全的单向哈希函数,它可以接受任意大小的输入数据,并输出固定长度的二进制哈希值。
Message digests are secure one-way hash functions that take arbitrary-sized data and output a fixed-length binary hash value.
这个安全令牌是一个客户机证书,采用 base64二进制编码形式。
This security token is the client certificate, in base64 binary-encoded form.
服务器在崩溃后再次启动时,XFS代码会查看日志,了解情况,把那些不完整的数据块填上二进制零以预防安全性问题。
When the server started up again after the crash, the XFS code would look at the journal, realize the situation, and fill those incomplete data blocks with binary zeros as a security precaution.
在大多数内容或访问实现中,安全性是以二进制的方式设置的——用户要么能够看到内容要么不能看到内容。
In most content or access implementations, security is set in a binary fashion — users either see the content or they don't.
其他性能包括高安全性、基于标准的加密技术、可同时单向和双向加密的加密密码、文本、数字和二进制文件。
Other features include high-security, standards-based encryption techniques, both for unidirectional and bidirectional encryption to encrypt passwords, texts, numbers and binaries.
近来的Axis21.5.2版本就是一个例子:二进制发布版缺失一个安全性处理所必需的JAR文件,因此没有一种简单的方法能使它同rampart一起工作。
The recent Axis2 1.5.2 release is an example: the binary distribution is missing a JAR file required for security handling, so there's no easy way to make it work with Rampart.
同时,一些PHP的扩展不是线程安全的,特别是如果他们执行一些外部二进制。
Also, some of PHP's extensions are not thread safe, especially if they execute some external binary.
注意,标志(token)是隐性二进制数据,只有底层安全性机制才需要能够解释它们。
Note that the tokens are opaque binary data, and only the underlying security mechanism needs to be able to interpret them.
将该安全模式在计算机病毒检测中进行了应用,实现了一个简单的基于二进制编码的计算机病毒检测模拟系统。
The security model carried on an application in the detection of computer virus, for this purpose, we also developed a simple simulation program based on binary coding.
由混沌映射驱动得到的伪随机二进制序列应确保有足够的比特安全性。
Sufficient bit security is necessary for pseudorandom binary sequences drived by chaotic maps.
然而大量使用的商业软件是以二进制代码形式存在的,这使得以源代码为分析对象的软件代码安全分析技术无能为力。
Nowadays, there are many analysis technologies and methods based on the source codes which have done well to enhance the software code security.
二进制搜索算法虽然识别效率比较高,但是泄露信息比较多,安全性比较差。
The identification of the binary search algorithm is more efficient. This algorithm exposes information and has poor security.
你可以选择重新启动服务器,并执行其他安全扫描,看看你能清理受感染的所有启动脚本和二进制文件。
You may optionally reboot the server and perform another security scan to see if you were able to clean up all startup scripts and infected binaries.
你可以选择重新启动服务器,并执行其他安全扫描,看看你能清理受感染的所有启动脚本和二进制文件。
You may optionally reboot the server and perform another security scan to see if you were able to clean up all startup scripts and infected binaries.
应用推荐