充当策略强制点,以抵御未经授权的访问。
Acting as a Policy Enforcement Point, to protect against unauthorized access.
密码保护,确保没有任何未经授权的访问的。
Password protection to ensure no unauthorized access to the software.
而对于黑客或欺诈者防止未经授权的访问也是挑战。
It is also the challenge of preventing unauthorized access from hackers and fraudsters.
保护系统上的信息不受未经授权的访问一直都是一个关键任务。
Protecting information on a system is always a critical task from unauthorized access.
在不使用时,应锁好车门,以避免未经授权的访问。
When not in use, doors should be locked to avoid unauthorized access.
大家谁知道使用您的计算机,并限制未经授权的访问。
Know everyone who USES your computer and limit unauthorised access.
密码保护允许您隐藏您的敏感数据免遭未经授权的访问。
Password protection allows you to hide your sensitive data from unauthorized access.
可能需要使用访问控制来保护事件负载免受未经授权的访问。
It may be necessary to secure event payloads from unauthorized access using access control.
该网站的安全必须得到足够的,以发现或防止未经授权的访问。
The security of the site must be adequate to detect or prevent unauthorized access.
我应该采取什么措施,以避免未经授权的访问到我的网上帐户?
What precautions should I take to avoid unauthorised access to my accounts online?
于节目的访问可以使用密码,以防止未经授权的访问受到限制。
The access to the program can be restricted with a password in order to prevent unauthorized access.
authorize方法设计用于保护服务层中的方法免受未经授权的访问。
The authorize methods are designed to protect the methods in a service layer from unauthorized access.
未经授权的访问——获得对Web服务或其数据的未经授权的访问。
Unauthorized access — Gaining unauthorized access to a Web service or its data.
这里有5个简单的步骤,以帮助您确保您的无线网络免遭未经授权的访问。
Here are 5 quick steps to help you secure your wireless network from unauthorized access.
这有助于确保您的财务信息是受保护的网站通过另一个阻止未经授权的访问。
This can help to ensure your financial information is protected and blocked from unauthorised access via another website.
如果机器左侧分钟闲置超过20时,系统会自动登出,以防止任何未经授权的访问。
If the machine is left idle for more than 20 minutes, the system will automatically logoff itself to prevent any unauthorised access.
为了帮助保护您的帐户对未经授权的访问,我们可能需要另一种方法来验证您的身份。
To help protect your account against unauthorized access, we may need an alternate way to verify your identity.
因此类未经授权的访问或变更导致您可能直接或间接遭受或发生损失的,我们不承担责任。
We will not be liable for any losses that you may suffer or incur directly or indirectly as a result of such unauthorised access or alteration.
除了认证问题外,能够对数据库服务器的安全形成威胁的还包括对敏感信息未经授权的访问。
In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.
这些专业人员专门处理安全问题,能够提供不同寻常的建议来保护数据避免未经授权的访问。
Dedicated to security matters, these professionals can offer unconventional advice for securing data from unauthorized access.
该方案可确保您的机密数据全面的数据安全上的USB闪存驱动器和未经授权的访问保护他们。
The program ensures comprehensive data security of your confidential data on your USB flash drives and protects them from unauthorized access.
我们使用各种制度、安全技术和程序等措施来保护您的个人信息不被未经授权的访问、使用或泄漏。
We use a variety of systems and security technologies and procedures to protect your personal information from unauthorized access, use or disclosure.
现在你可以收集你的重要和秘密保存在一个隐藏的内容使用密码来限制未经授权的访问被锁定,所有。
Now you can collect all of your important and secret content in a hidden depository, locked with a password to restrict it from unauthorized access.
不幸的是,它们的可移植性也使得它们容易受到未经授权的访问,而这又使得它们不能安全敏感文件存储。
Unfortunately, their portability also makes them vulnerable against unauthorized access, which in turn makes them unsafe for sensitive file storage.
安全设置无法应用到文件夹。为了防止对此文件夹进行未经授权的访问,您应该手动验证此文件夹的安全设置。
Security settings could not be applied to the folder. To prevent unauthorized access to the folder, you should manually verify the security settings for the folder.
我们已为合理的保护您 的个人信息,以使其免于意外损失或未经授权的访问,使用,修改或披露而实施措施。
We have implemented measures designed to reasonably secure your personal information from accidental loss and from unauthorized access, use, alteration and disclosure.
而在最后一层则可执行那些用来防止未经授权的访问点以及其它无线设备配置的MAC地址过滤和基站发现策略。
MAC address filtering and base station discovery policies that prevent the deployment of unauthorized access points and other wireless devices can be enforced at the final layer.
而在最后一层则可执行那些用来防止未经授权的访问点以及其它无线设备配置的MAC地址过滤和基站发现策略。
MAC address filtering and base station discovery policies that prevent the deployment of unauthorized access points and other wireless devices can be enforced at the final layer.
应用推荐