我们使用安全技术和程序来保护个人资料,以防止未经授权的资料存取、使用或公开。
We use a variety of security technologies and procedures to help protect your personal information from unauthorized access, use, or disclosure.
下次,当我们想在提供免费WiFi网络的公共场所使用笔记本电脑或智能手机时,请三思而后行或者在使用之前采取安全措施。
Next time, when we want to use our laptops or our smartphones in public places which offer free WiFi networks, please think it twice or take safe measures before using them.
根据我们的安全惯例,停止使用那些产品是正确的。
Those products have rightly been stopped in accordance with our safety routines.
如果它有自己的IP地址,那么我们就可以在网络上使用接入点本身了;这样做的安全性要差一些,但在用于演示方面会更有趣。
If it has its own IP address, we can use the access point itself over the network; this is less secure, but more fun to use for a demo.
为了安全,您只能使用我们的新篮子。
安全起见,研究人员建议,我们应该比以前更少使用电脑,或者在睡觉前尽可能地把屏幕亮度调低。
To be on the safe side, the researchers suggest that we should use computers less than before, or turn down our screens as much as possible before sleeping.
为了安全起见,我们开始使用呼吸器和手套将它们分批装袋。
We are starting to unbag them in batches, using respirators and gloves, for safety.
清单10提供了我们在这个安全领域中使用的一些密码以及它们的摘要。
Listing 10 provides some of the passwords we use in this security realm and their digests.
为了定义这类身份用户,我们可以使用安全身份限定符。
For defining such run as users, we shall use the security identity qualifier.
它为我们提供了一个不用管理的、安全的、复制的存储,我们可以使用它来灵活地将应用程序数据部署到很多不同的客户机和设备上。
It provides us with a no-administration, secure, replicated store that we can use to deploy application data flexibly, to many different kinds of clients and devices.
我们使用其保证数据的安全,尤其是传输或存储数据时,以及在数据容易被窥探的时候。
We use them to keep data safe, especially when transferring or storing data, times when data is particularly susceptible to prying eyes.
在此示例中,我们使用了传输级别的安全,因为密码是明文形式的。
In the sample, we used transport-level security because the password was in clear text.
以这种方式进行擦除在类型系统中引入了缺陷,这些缺陷限制我们使用泛型类型的安全性。
Erasing in this manner introduces holes in the type system that limit how we can safely use generic types.
我们使用尖端技术(生物统计、移动银行)来确保账户安全,并且接近人们生活工作的地方。
We use cutting-edge technology (biometrics, mobile Banks) to ensure accounts are secure and accessible where people live and work.
很多研究与事实告诉我们,这些年以来我们家里购买的以及正在使用的商品并不像我们想的那么安全可靠。
We are now being alerted through research and case studies that many items we have bought and used in our homes over the years are not as safe as we may once have thought.
我们可以使用肉类温度计,安全肉类温度图表可以作为你烹调肉类的指南。
Use a meat thermometer and this chart of safe meat temperatures to guide you.
在本文后面,我们将使用更安全的方法,不仅修改端口号,而且完全隐藏它。
Further along in the article, you'll use even safer methods to not only change the port number but to completely hide it.
我们对每个要映射的安全角色使用一个role元素。
由于安全的原因,我们建议不要使用实例所有者帐户作为fenced用户帐户。
For security reasons, we recommend that you do not use the instance owner account for the fenced user account.
我们使用security - constraint标记配置资源集合的安全权限。
We use the security-constraint tag to configure security permissions for resource collections.
我们使用SSH是因为它支持安全加密地访问远程Linux服务器,以及支持访问单一应用程序数据库。
We used SSH because it provides secure encrypted access to a remote Linux server, which provides access to a single application database.
我们让该参数为null,这样允许JSSE使用缺省的—并且安全的!
We'll leave this parameter null, allowing JSSE to use the default — and secure!
我们接着使用它将安全上下文传播到在AppServerRemoteNode上运行的示例应用程序。
This in turn enabled us to propagate the security context to the example application running on AppServerRemoteNode.
答:我们强烈建议所有的WebSphereApplicationServer用户使用全局安全。
Answer: we strongly recommend that all WebSphere Application Server users enable global security.
我们能够明确配置ubuntu确保儿童使用计算机的安全。
We can definitely configure Ubuntu to make the computer a safer tool for our children to use.
我们使用以下安全性配置运行各测试。
The tests were run using each of the following security configurations.
我们还展示了如何使用SSL建立绑定和链接安全性。
We also showed how to use SSL to set up bind and link security.
在我们的示例中,人工任务没有使用安全性,并允许任何人请求或执行任务。
In our example, the human task does not use security and allows anyone to claim or work on the task.
共同的思路是我们为消息传递实现的安全模型需要与我们使用消息传递的方式保持同步。
The common thread is that the security models we implement for messaging need to keep pace with the ways in which we use messaging.
共同的思路是我们为消息传递实现的安全模型需要与我们使用消息传递的方式保持同步。
The common thread is that the security models we implement for messaging need to keep pace with the ways in which we use messaging.
应用推荐