在酒店、咖啡馆或酒吧等公共场所使用Wi-Fi会把你的数据暴露在不安全的网络中。
Using Wi-Fi in a public place such as a hotel, cafe or bar can expose your data to a network which is not secure.
下次,当我们想在提供免费WiFi网络的公共场所使用笔记本电脑或智能手机时,请三思而后行或者在使用之前采取安全措施。
Next time, when we want to use our laptops or our smartphones in public places which offer free WiFi networks, please think it twice or take safe measures before using them.
如果它有自己的IP地址,那么我们就可以在网络上使用接入点本身了;这样做的安全性要差一些,但在用于演示方面会更有趣。
If it has its own IP address, we can use the access point itself over the network; this is less secure, but more fun to use for a demo.
除了出版这份手册之外,世卫组织还建立了一个致力于增加头盔使用的专家网络并在其有关道路安全的国家工作中直接支持头盔规划。
In addition to the publication of this manual, WHO has also established a network of experts working to increase helmet use, and supports helmet programmes directly in its country work on road safety.
其它方法使用中央认证中心来发放证书,这些证书保证了网络中从一点到另一点的安全通信。
Other approaches use a central certificate authority to issue certificates that guarantee secure communication from one point to another within a network.
大多数实现多因素身份验证和多层身份验证的解决方案使用相同的底层网络安全机制。
Most of the solutions exercising multifactor as well as multi-layer authentication make use of the same underlying network security mechanism.
本文讨论使用相同的网络安全机制实现多因素或多层身份验证的风险。
This article discusses the risks associated with systems using the same network security mechanism for multifactor or multi-layer authentication.
安全模型仅要求能够在交互中标识每个组件,这可以在网络体系结构级别或通过使用通用应用程序标识实现。
The security model requires only that each of the components can be identified in an interaction, which can be achieved at network architecture level or through use of generic application identities.
尽管多因素身份验证和多层身份验证是有优势的,但是大多数解决方案使用相同的底层网络安全机制实现它们。
Despite its advantages, most of the solutions exercising multifactor as well as multi-layer authentication make use of the same underlying network security mechanisms.
该网络使用安全RF链路,通过出口加密保护联合作战行动。
The network USES a secure RF link, protected through exportable encryption for joint and coalition operations.
SSH是一个强大而安全的网络实用程序,全球有无数用户使用它来完成各种任务。
SSH is a powerful and secure network utility that countless users worldwide use for numerous tasks.
改善的安全以手牵手的方式使用更具分布性的基础设施来通过网络存储数据。
Improved security goes hand in hand with the use of a more distributed infrastructure to store data for retrieval via the Net.
在不安全的环境中,SOAP消息是以纯文本的形式在网络中传输的,因此只要使用探测器,任何人都能够拦截SOAP消息并阅读其内容。
In an unsecure environment SOAP messages are transferred in plain text over the network, so anyone with a sniffer could intercept the SOAP message and read it.
如果您的heartbeat运行在一个安全的网络上,比如例子中的交叉线缆,那么应该使用crc。
If your heartbeat runs over a secure network, such as the crossover cable in the example, you'll want to use CRC.
本文中的解决方案可以让您使用开源工具执行从简单的到更高级而且安全的网络备份,几乎所有Linux发行版本都包含这些工具。
The solutions in this article can help you perform simple to more advanced and secure network backups using open source tools that are part of nearly every Linux distribution.
尽管前者可以通过使用Kerberos (参见参考资料)和类似的网络安全协议完成,但是后者需要特殊的管理调优。
While the former can be accomplished via use of Kerberos (see Resources) and similar network security protocol, the latter requires special administrative tuning.
确实,入侵检测和Snort的使用都超越了Web站点本身,延伸为更广泛的网络安全问题。
It's true that both intrusion detection and Snort usage extends well beyond Web sites and into larger network security issues.
如果您的网络不够安全,但您不是特别多疑,或者不是很关心最小化cpu资源的使用,那么应该使用md5。
If the network is insecure, but you're either not very paranoid or concerned about minimizing CPU resources, use md5.
在使用telnet这样的不安全“明文”协议时,网络上的任何人都可以窃取您的密码和其他敏感信息。
When using an unsecured, "clear text" protocol such as Telnet, anyone on the network can pilfer your passwords and other sensitive information.
Axten还补充,“在未来的几个月,我们仍然建议大家使用时保持警惕,特别在通过不安全的WiFi网络发送或接受信息时。”
He adds, "As always, we advise people to use caution when sending or receiving information over unsecured Wi-Fi networks."
不过,如果它有自己的IP地址,那么我们就可以在网络上使用接入点本身了;这样做的安全性要差一些,但在用于演示方面会更有趣。
However, if it has its own IP address, we can use the access point itself over the network; this is less secure, but more fun to use for a demo.
它们需要一种网关设备,该网关设备可以将安全令牌从客户端希望使用的格式转换为在自已网络中使用的ltpa令牌。
They want a gateway device that can translate security tokens from whatever format the client wants to use into an LTPA token for consumption within their own networks.
某种可能使用IP安全性协议 (IPSEC)的网络级加密形式(例如虚拟专用网 (VPN))是最可取的解决方案,虽然也有其他合理的选择。
Some form of network-level encryption, such as a Virtual Private Network (VPN), perhaps using IP Security Protocol (IPSEC), is the most obvious solution, although there are other reasonable choices.
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
出于性能考虑,最好避免使用反病毒软件——这就意味着为了安全起见,不能将该机器连接到网络。
For performance reasons, antivirus software is best avoided — which means that for security reasons, you can't allow a network connection to the machine.
事实上,大多数情况下一些破坏性网络应用和一些安全性方法会故意使用非标准端口。
In fact, in many cases, subversive network applications and some security methods will deliberately use non-standard ports.
这是一个安全性特性,它防止通过网络恶意使用该应用程序。
This is a security feature that prevents applications being used maliciously over a network or the Internet.
苹果公司建议将两种频段信号分开成为两个命名不同的网络,并且确保使用相同的安全设置(WEP、WPA或WPA2)。
Apple recommends splitting the bands into two separate networks, naming them differently and making sure that both networks use the same type of security (WEP, WPA, or WPA2).
苹果公司建议将两种频段信号分开成为两个命名不同的网络,并且确保使用相同的安全设置(WEP、WPA或WPA2)。
Apple recommends splitting the bands into two separate networks, naming them differently and making sure that both networks use the same type of security (WEP, WPA, or WPA2).
应用推荐