• 很多计算机病毒蠕虫特洛伊木马的设计利用口令

    Many computer viruses, worms, and Trojan horses are designed to exploit weak passwords.

    youdao

  • 不法分子利用部分用户贪图方便设置口令漏洞银行卡密码进行破解。

    Illegal element USES partial user covet to go to the lavatory the flaw that installs weak countersign, to the bank card password undertakes defeating solving.

    youdao

  • 默认用户ID(如db2admin)安装db 2UDB使用口令(或者根本没有)可能系统置于风险中。

    Installing db2 UDB with the default user IDs (for example, db2admin) and providing a weak password (or none at all) can put your system at risk.

    youdao

  • EKE协议基于口令密钥交换协议通过使用对称密钥加密体制公钥加密体制,能够很好地抵抗离线字典攻击

    EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption.

    youdao

  • EKE协议基于口令密钥交换协议通过使用对称密钥加密体制公钥加密体制,能够很好地抵抗离线字典攻击

    EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定