尽管在创建签名时要使用证书的私有部分,但是采用一些工程的方法或类似的技术也可以窃取密码。
While the private portion of the certificate is used to create the signature, the password could also be stolen using social engineering or other similar techniques.
他们还采用各种技术,例如行动授权环节,密码和多保险的指挥控制环节,来减少意外或未经授权发射的可能性。
They also devised technologies—permissive action links, go codes, and redundant command-control links—that minimized the chance of accidental or unauthorized launches.
即使数据不是敏感数据或个人数据,在云中传输和操纵数据时也应该用密码技术加以保护。
Even if the data is not sensitive or personal, it should be secured with cryptography when transported to and from, and manipulated in, the cloud.
生物认证是一种方便的技术,因为人们不会象忘记密码或象丢失物理标记那样真正忘记他们的认证信息。
Biometric authentication is a convenient technology, because people can't really forget their authentication information like a password or lose it like a physical token.
由于僵尸网络病毒必须与主服务器通信来获得命令或返回数据——比如,密码和信用卡号码,通过侦测此过程该技术便能发挥作用。
It works by detecting when a botnet virus is communicating with its master servers, as it must do to get its commands or to send back data — say, your passwords and credit card Numbers.
黑客可以利用密码分析技术或恶意的实例资源破解密码算法。
Hackers can take advantage of the advances in cryptanalysis or malicious instance resources to render cryptographic algorithms insecure.
为了确保安全,可以结合使用rsync与加密技术,确保在没有正确的密码或加密密钥的情况下无法读取远程文件。
For security, you can combine this functionality with an encryption phase to ensure that the remote file is unreadable without the correct passphrase or cryptographic key.
国外有关电子商务的安全技术,虽然其结构或加密技术等都不错,但受到了外国密码政策的限制,因此强度普遍不够。
Abroad one-commerce security technology, although its structure or encryption technology is good, but is limited by the foreign password policy, so the strength of the common enough.
描述信息技术保全政策和程序,对密码保护和识别滥用不当访问,篡改或改变业务数据的程序。
Describe the it security policies and procedures for password protection and to identify the abuse of improper access, tampering or the altering of business data.
技术人员还必须通过设备端口初始设置的身份验证或密码才可以进行操作。
The technician still has to go through whatever authentication or possible encryption that has been setup in the device for access.
技术人员还必须通过设备端口初始设置的身份验证或密码才可以进行操作。
The technician still has to go through whatever authentication or possible encryption that has been setup in the device for access.
应用推荐