版权属于群创所有。禁止任何未经授权的使用。
The copyright belongs to Innolux. Any unauthorized use is prohibited.
这样,如果你丢了手机,可以避免未经授权的使用该通讯录。
In this way, if you lose your smartphone, you can prevent unauthorized use by locking it.
您同意立刻通知美乐棵任何对您密码未经授权的使用。
You agree to immediately notify Scotts Miracle-Gro of any unauthorized use of your password.
版权属于华兴达光电科技所有。禁止任何未经授权的使用。
The copyright belongs to HXD. Any unauthorized use is prohibited.
您务必要避免不小心将记录顺序内容公开给未经授权的使用者。
You should ensure that you do not accidentally expose the contents of the record sequence to an unauthorized user.
同时乙方应赔偿甲方因这类未经授权的使用而遭受的任何损失和损害。
Party B shall also indemnify Party a against any loss or damage which Party a suffers as a result of any such unauthorized USES.
自动锁定手机SIM卡改变一次检测,以防止未经授权的使用,使手机不值钱的小偷。
Automatically lock your phone once a SIM change is detected to prevent unauthorized use and to make the phone worthless to the thief.
为了控制这种未经授权的使用技术,一些法律,如专利法,版权法等被起草在世界各地。
To control this unauthorized use of technology several laws like patent laws, copyright laws etc were drafted all around the world.
通过选择删除选项,您可以远程删除敏感数据从您的手机,如联系人,短信,画廊,日历和安全存储,以保护它免遭未经授权的使用。
By choosing the delete option, you can remotely delete sensitive data from your phone, such as Contacts, SMS, Gallery, Calendar and Secure Storage to protect it from unauthorized usage.
访问一个未经授权的用户能成功访问只有经过授权的管理员才能使用的控制权吗?
Access Can an unauthorized user successfully access a control that only the administrators are authorized to use?
可能需要使用访问控制来保护事件负载免受未经授权的访问。
It may be necessary to secure event payloads from unauthorized access using access control.
这一点可以通过使用 X. 509 V3格式发布的数字证书来完成(当然要假定供应商对证书由完全的控制,未经授权的用户不可能有该证书)。
This can be done via a digital certificate published in X.509 V3 format (assuming, of course, the vendor has complete control of the certificate and unauthorized people don't have it).
小心请不要在生产环境中使用此过程允许未经授权的用户访问用户数据。这样做可能会违反贵公司的隐私和安全政策。
Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.
典型的解决方案是使用一个目录,使该目录的权限根本不允许未经授权的程序添加或者删除文件。
The typical solution is to use a directory for which the permissions don't allow unprivileged programs to add or remove files at all.
密码是管理员用于对付未经授权使用系统资源的第一道防线。
Passwords are the administrator's first line of defense against unauthorized use of system resources.
此外,我们雇佣了保安和使用了电子安全多项措施,以防止在未经授权下访问用户的信息。
In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.
未经授权使用他人注册商标是违法的。
Unauthorized use of the registered trademarks of others is illegal.
苹果的专利申请表明,这项技术可能不仅仅被用于限制其手机的未经授权使用,还会用于在手机被盗时关闭手机。
Apple's patent application suggests it may use the technology not just to limit "unauthorized" USES of its phones but also shut down the phone if and when it has been stolen.
苹果的专利申请表明,这项技术可能不仅仅被用于限制其手机的未经授权使用,还会用于在手机被盗时关闭手机。
"Apple's patent application suggests it may use the technology not just to limit" unauthorized "USES of its phones but also shut down the phone if and when it has been stolen."
SQL注入这种技术使攻击者可以利用应用程序中未仔细检查的输入机会来执行未经授权的SQL命令,而应用程序的本意是使用该输入来构造动态sql查询。
SQL injection is a technique which enables an attacker to execute unauthorized SQL commands by taking advantage of non-scrutinized input opportunities in applications that build dynamic SQL queries.
过去,内容所有者通常采用识别技术来判断未经授权的内容使用,并主动出击,追讨责任。
In the past, content owners have used identification methods as a means of identifying unauthorized content for the sake of calling out the attack dogs and sending take-down notices.
网站应采取合理的步骤保护个人资料,使其免受未经授权的取得和使用。
Sites should take reasonable steps to protect personal data from unauthorized access.
据法新社报道,巴西里约热内卢天主教会日前将好莱坞哥伦比亚电影公司告上法庭,称该公司出品的灾难巨作《2012》未经授权使用了里约热内卢基督像的形象,并要求得到一定数目的赔偿。
Rio de Janeiro's Catholic Church is suing Hollywood for using unauthorized images of Rio's famous giant Christ statue in its disaster movie blockbuster "2012," AFP reported.
所有的实践和流程,都是为了确保数据在未经授权的情况下不被个人或第三方使用或访问。
All practices and processes are designed to ensure that data is not used or accessed by an individual or third party without authorization.
您可以使用另一个未经授权处理任务的用户身份登录,以确保不管是否应该在To -do列表中显示任务,非授权访问都可以正常运行。
You will log on as another user not authorized to work on the task to make sure unauthorized access is also working as it should and not show the task in the user's To-Do list.
我们将尽合理努力防止我们或存储服务提供商所持有的您的个人信息未经授权被访问、使用和披露、变更或销毁。
We will use reasonable endeavours to protect your personal information that is held by us or a Storage Provider from unauthorised access, use and disclosure, alteration or destruction.
公司将采取一切可行措施确保个人信息的安全,避免他人未经授权或意外获得或以其它方式使用该等个人信息。
The Company will take all practicable steps to ensure security of the personal data and to avoid unauthorized or accidental access, or other use.
大家谁知道使用您的计算机,并限制未经授权的访问。
Know everyone who USES your computer and limit unauthorised access.
透过任何途径,未经授权使用或企图未经授权使用本网站﹑用户帐户﹑连接本网站的电脑系统或网络。
Gain or make or attempt to gain or make unauthorized access to or unauthorized use of the Site, user accounts, computer systems or networks connected to the Site through any means.
透过任何途径,未经授权使用或企图未经授权使用本网站﹑用户帐户﹑连接本网站的电脑系统或网络。
Gain or make or attempt to gain or make unauthorized access to or unauthorized use of the Site, user accounts, computer systems or networks connected to the Site through any means.
应用推荐