鉴别并捕捉非法用户。
防止非法用户盗用合法链接几个方面的问题。
The security encryption technology prevents the users from illegally embezzling legal links.
操作系统也对安全负责,保证非法用户不会进入系统。
The operating system is also responsible for security, ensuring that unauthorized users have no access to the system.
此种方法可封闭非法用户的权限,大大提高数据库管理软件的安全性。
This method can occlude the invalid user and greatly improve the security of the DBMS software.
在开发过程中,特别是书写代码的时候,考虑非法用户是非常重要的。
During development, when the code is being written, it is important to consider illegitimate uses of your application.
并且它还能有效防止非法用户访问系统资源和合法用户非法使用资源。
And it can effectively prevent illegal users access system resources and legitimate users illegally use of resources.
身份认证是网络安全技术的一个重要组成部分,它限制非法用户访问网络资源。
Authentication is an important part in the network security. It can prevent illegal user from accessing network.
此外,笔者还探讨了利用系统完整性约束来防止非法用户对数据的不合理操作。
The author discusses how to prevent illegal user from entering the system with the help of integrality rules.
访问控制是用来保护系统资源免于被非法用户访问、更改、破坏的一项重要技术。
Access control is an important technology that is used to protect system resources from unauthorized user access, change, destruction.
对电子文档进行加密处理,接受方需具有相应安全证书,防止非法用户窃取文件信息;
Encrypting the electronic documents to which the receiver can have access only through corresponding safety certificates so as to avoid the access by illegal users.
行之有效的认证方法有效解决了网络对终端的接入控制,使得非法用户无法使用网络。
The effective authenticating method effectively solves the problem that the illegal users are unable to use the network by the accessing control of the network to the terminal.
基于以上的安全策略,可以防止非法用户访问数据库,限制合法用户操纵数据库的权限;
The safety that is based on above is politic, can visit a database in order to prevent illegal user, restrict lawful user to operate after the attributive;
一定条件下,多媒体拷贝内容能够有效跟踪非法用户并抗击共谋攻击是其应用的关键技术。
Under stringent constraints, it is crucial that fingerprinted multimedia copies can resistance collusion attacks in streaming applications.
IDMS用数据字典控制系统产品的存取,用子模式控制数据的存取,使数据库不被非法用户使用。
Under IDMS, the access to system products is controled by means of a data dictionary, and data access is controled by subscheme, so as to protect IDMS data base accessed from unauthorized users.
通过访问控制服务可以限制对关键资源的访问,防止非法用户的侵入或者因合法用户的不慎所造成的破坏。
The service of access control could limit the access to key resources, prevent illegal users from breaking in and also prevent legal users from destroying these resources inadvertently.
针对目前一些IC卡应用系统存在的某些漏洞,设计了一个IC卡应用系统来防止非法用户对IC卡的窜改。
In the paper, an IC card application system is designed to prevent from being illegally changed and resolves some leaks in other systems.
身份验证,就是用户进入信息系统时,系统必须对用户进行身份的合法性鉴别认证,防止非法用户进入系统。
Authentication is, when users log in information system, the system must authenticate the users 'legal status in order to prevent illegal users 'login.
访问控制成为众多安全机制中的一个研究热点,目标是防止非法用户侵入或者合法用户对系统资源的非法使用。
Access control becomes a research hotspot in the multitudinous security mechanism, whose goal is to prevent invasion of illegal users or illegal usage of the system resources by legitimate users.
启用密码策略,强制计算机用户设置符合安全要求的密码,包括设置口令锁定服务器控制台,以防止非法用户修改。
Enable password policy to force computer users to set passwords that meet security requirements, including setting the password lock server console to prevent unauthorized user modifications.
通过访问控制,既可以限制对关键资源的访问,也能够防止非法用户的侵入或者因合法用户的不慎操作而造成的破坏。
With access control service, we can restrict the approach to critical resource, avoiding damage brought by illegal user's intrusions or legal user's inappropriate operations.
仿真实验表明,该身份认证模型能够承受各种口令攻击,有效过滤非法用户的登录请求,具有较好的鲁棒性和可用性。
Simulation tests show that the identity authentication model can stand with password attacks, filtrate out invalid login requests availably, and have advantages of good robustness and reliability.
因此,有必要采用一种加密强度比较高的加密算法来加密一些重要数据,以防止合法用户的越权操作和非法用户的恶意攻击。
So it is necessary to adopt one encrypt intensity high algorithm encrypt some important data, in order to prevent that legal users operate over authority, illegal user attack viciously.
非法用户首先会受到一封警示邮件,然后时服务暂停处理,如果用户仍旧继续下载,服务商最后会根据“三不可”规定终止合同。
Users would first be sent an email warning them followed by a suspension if they carry on and finally the termination of their contract under the 'three strikes' rule.
图书馆计算机管理进入网络化阶段后,计算机系统的各类资源容易受到非法用户的破坏,而采取分网运行机制管理网络,能增强网络的安全性。
In the network stage, all kinds of resources in the library computer manage system will be damaged easily by illegal user. Using a separated network system can buildup security of the network.
一旦存有重要数据的存储设备丢失、被盗窃,如何最大程度的阻止试图读取这些设备的非法用户获取核心保密数据是现代存储技术所最为注重的课题之一。
After loss of devices with important data, the way to protect sensitive data against aggression from illegal user is gaining more and more concern in modern storage technology field.
一些是非法文件共享网络用户-他们想要的就是监管者难以追查出其网上活动。
Some are users of illegal file-sharing networks who want to be harder to track down.
给任天堂DS带来盗版困扰的是一种叫r 4卡的设备,拥有该设备,用户就能够从网上下载非法的DS游戏到便携设备上。
The Nintendo DS has been affected by software piracy thanks to products like the R4 card, a device that lets users download illegal copies of DS games and play them on the portable.
虚假恶意软件警告已经成为引诱无辜用户购买非法软件的通用手段。
Fake malware warnings have become a common method of luring innocent users into buying illegitimate software.
拼贴发加密还模仿普通用户的信息流通模式,这样就不会产生提示非法行为的电子指纹。
Collage also aims to mimic the traffic patterns of innocent users, so that digital fingerprints which may suggest illicit behaviour are not produced.
上个星期,法国议会通过了一项法案,要求网络运营商对那些一年内收到了三次警告仍有提供非法侵权资料嫌疑的用户停止提供网络连接服务。
Just last week the French Assembly passed a law that forces ISPs to disconnect those suspected of illegally sharing copyright infringing material on the third warning for up to a year.
应用推荐