未经授权使用他人注册商标是违法的。
Unauthorized use of the registered trademarks of others is illegal.
密码是管理员用于对付未经授权使用系统资源的第一道防线。
Passwords are the administrator's first line of defense against unauthorized use of system resources.
未经授权使用此等图像乃侵犯版权的行为,版权持有人可追讨权益及赔偿。
If one violates the copyright created by the copyright notice, he may only be enjoined from future violations.
严禁未经授权使用本网站材料,未经授权使用可能违反版权、商标、专利等法律。
Unauthorized use of the materials on the Site may violate copyright, trademark, patent and other laws and is prohibited.
透过任何途径,未经授权使用或企图未经授权使用本网站﹑用户帐户﹑连接本网站的电脑系统或网络。
Gain or make or attempt to gain or make unauthorized access to or unauthorized use of the Site, user accounts, computer systems or networks connected to the Site through any means.
另外,意美公司有权要求特许经营商,就其未经授权使用商标的行为对意美公司造成的损失进行赔偿。
In addition, the beauty of a franchisor shall have the right to require the company, the unauthorized use of trademark on the beauty of the compensation.
苹果的专利申请表明,这项技术可能不仅仅被用于限制其手机的未经授权使用,还会用于在手机被盗时关闭手机。
Apple's patent application suggests it may use the technology not just to limit "unauthorized" USES of its phones but also shut down the phone if and when it has been stolen.
苹果的专利申请表明,这项技术可能不仅仅被用于限制其手机的未经授权使用,还会用于在手机被盗时关闭手机。
"Apple's patent application suggests it may use the technology not just to limit" unauthorized "USES of its phones but also shut down the phone if and when it has been stolen."
US B拦截器是一个强大的和直接的软件,为您提供了防止数据泄漏和阻止未经授权使用计算机设备的可靠手段。
USB Blocker is a robust and straightforward piece of software that provides you with a reliable means of preventing data leaks and blocking the unauthorized use of computer equipment.
然而,无论我们是否决定使该用户离开《滑翔中国》,我们都不承担因用户未经授权使用或非法使用本网站而产生的责任。
Nevertheless, whether we decide to forbid the user's right or not, we are not in the position to take the responsibility of the user's illegal use of the website hereafter.
据法新社报道,巴西里约热内卢天主教会日前将好莱坞哥伦比亚电影公司告上法庭,称该公司出品的灾难巨作《2012》未经授权使用了里约热内卢基督像的形象,并要求得到一定数目的赔偿。
Rio de Janeiro's Catholic Church is suing Hollywood for using unauthorized images of Rio's famous giant Christ statue in its disaster movie blockbuster "2012," AFP reported.
访问一个未经授权的用户能成功访问只有经过授权的管理员才能使用的控制权吗?
Access Can an unauthorized user successfully access a control that only the administrators are authorized to use?
这样,如果你丢了手机,可以避免未经授权的使用该通讯录。
In this way, if you lose your smartphone, you can prevent unauthorized use by locking it.
可能需要使用访问控制来保护事件负载免受未经授权的访问。
It may be necessary to secure event payloads from unauthorized access using access control.
这一点可以通过使用 X. 509 V3格式发布的数字证书来完成(当然要假定供应商对证书由完全的控制,未经授权的用户不可能有该证书)。
This can be done via a digital certificate published in X.509 V3 format (assuming, of course, the vendor has complete control of the certificate and unauthorized people don't have it).
小心请不要在生产环境中使用此过程允许未经授权的用户访问用户数据。这样做可能会违反贵公司的隐私和安全政策。
Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.
典型的解决方案是使用一个目录,使该目录的权限根本不允许未经授权的程序添加或者删除文件。
The typical solution is to use a directory for which the permissions don't allow unprivileged programs to add or remove files at all.
此外,我们雇佣了保安和使用了电子安全多项措施,以防止在未经授权下访问用户的信息。
In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.
过去,内容所有者通常采用识别技术来判断未经授权的内容使用,并主动出击,追讨责任。
In the past, content owners have used identification methods as a means of identifying unauthorized content for the sake of calling out the attack dogs and sending take-down notices.
SQL注入这种技术使攻击者可以利用应用程序中未仔细检查的输入机会来执行未经授权的SQL命令,而应用程序的本意是使用该输入来构造动态sql查询。
SQL injection is a technique which enables an attacker to execute unauthorized SQL commands by taking advantage of non-scrutinized input opportunities in applications that build dynamic SQL queries.
网站应采取合理的步骤保护个人资料,使其免受未经授权的取得和使用。
Sites should take reasonable steps to protect personal data from unauthorized access.
所有的实践和流程,都是为了确保数据在未经授权的情况下不被个人或第三方使用或访问。
All practices and processes are designed to ensure that data is not used or accessed by an individual or third party without authorization.
您可以使用另一个未经授权处理任务的用户身份登录,以确保不管是否应该在To -do列表中显示任务,非授权访问都可以正常运行。
You will log on as another user not authorized to work on the task to make sure unauthorized access is also working as it should and not show the task in the user's To-Do list.
您同意立刻通知美乐棵任何对您密码未经授权的使用。
You agree to immediately notify Scotts Miracle-Gro of any unauthorized use of your password.
堆栈步旨在防止引诱攻击;在这种攻击中,受信程度较低的代码调用高度信任的代码,并使用高度信任的代码执行未经授权的操作。
The stack walk is designed to help prevent luring attacks, in which less-trusted code calls highly trusted code and USES it to perform unauthorized actions.
大家谁知道使用您的计算机,并限制未经授权的访问。
Know everyone who USES your computer and limit unauthorised access.
大家谁知道使用您的计算机,并限制未经授权的访问。
Know everyone who USES your computer and limit unauthorised access.
应用推荐