• 鉴别捕捉非法用户

    Identifying and capturing rogue users.

    youdao

  • 防止非法用户盗用合法链接几个方面的问题。

    The security encryption technology prevents the users from illegally embezzling legal links.

    youdao

  • 操作系统安全负责保证非法用户不会进入系统。

    The operating system is also responsible for security, ensuring that unauthorized users have no access to the system.

    youdao

  • 此种方法封闭非法用户权限,大大提高数据库管理软件安全性

    This method can occlude the invalid user and greatly improve the security of the DBMS software.

    youdao

  • 开发过程中,特别是书写代码时候考虑非法用户非常重要的。

    During development, when the code is being written, it is important to consider illegitimate uses of your application.

    youdao

  • 并且有效防止非法用户访问系统资源合法用户非法使用资源。

    And it can effectively prevent illegal users access system resources and legitimate users illegally use of resources.

    youdao

  • 身份认证网络安全技术一个重要组成部分限制非法用户访问网络资源。

    Authentication is an important part in the network security. It can prevent illegal user from accessing network.

    youdao

  • 此外,笔者探讨了利用系统完整性约束防止非法用户对数据不合理操作。

    The author discusses how to prevent illegal user from entering the system with the help of integrality rules.

    youdao

  • 访问控制用来保护系统资源免于非法用户访问、更改、破坏一项重要技术

    Access control is an important technology that is used to protect system resources from unauthorized user access, change, destruction.

    youdao

  • 电子文档进行加密处理,接受方具有相应安全证书防止非法用户窃取文件信息;

    Encrypting the electronic documents to which the receiver can have access only through corresponding safety certificates so as to avoid the access by illegal users.

    youdao

  • 行之有效认证方法有效解决了网络终端接入控制,使得非法用户无法使用网络。

    The effective authenticating method effectively solves the problem that the illegal users are unable to use the network by the accessing control of the network to the terminal.

    youdao

  • 基于以上安全策略可以防止非法用户访问数据库限制合法用户操纵数据库的权限

    The safety that is based on above is politic, can visit a database in order to prevent illegal user, restrict lawful user to operate after the attributive;

    youdao

  • 一定条件下多媒体拷贝内容能够有效跟踪非法用户抗击共谋攻击应用关键技术。

    Under stringent constraints, it is crucial that fingerprinted multimedia copies can resistance collusion attacks in streaming applications.

    youdao

  • IDMS数据字典控制系统产品存取,用子模式控制数据存取,使数据库非法用户使用

    Under IDMS, the access to system products is controled by means of a data dictionary, and data access is controled by subscheme, so as to protect IDMS data base accessed from unauthorized users.

    youdao

  • 通过访问控制服务可以限制关键资源访问,防止非法用户侵入或者因合法用户的不慎所造成的破坏。

    The service of access control could limit the access to key resources, prevent illegal users from breaking in and also prevent legal users from destroying these resources inadvertently.

    youdao

  • 针对目前一些IC应用系统存在的某些漏洞设计了一个IC卡应用系统防止非法用户对IC卡的窜改

    In the paper, an IC card application system is designed to prevent from being illegally changed and resolves some leaks in other systems.

    youdao

  • 身份验证,就是用户进入信息系统,系统必须对用户进行身份的合法性鉴别认证,防止非法用户进入系统。

    Authentication is, when users log in information system, the system must authenticate the users 'legal status in order to prevent illegal users 'login.

    youdao

  • 访问控制成为众多安全机制中的一个研究热点目标防止非法用户侵入或者合法用户系统资源非法使用

    Access control becomes a research hotspot in the multitudinous security mechanism, whose goal is to prevent invasion of illegal users or illegal usage of the system resources by legitimate users.

    youdao

  • 启用密码策略强制计算机用户设置符合安全要求密码包括设置口令锁定服务器控制台防止非法用户修改

    Enable password policy to force computer users to set passwords that meet security requirements, including setting the password lock server console to prevent unauthorized user modifications.

    youdao

  • 通过访问控制可以限制关键资源访问,也能够防止非法用户侵入或者合法用户的不慎操作而造成的破坏

    With access control service, we can restrict the approach to critical resource, avoiding damage brought by illegal user's intrusions or legal user's inappropriate operations.

    youdao

  • 仿真实验表明身份认证模型能够承受各种口令攻击有效过滤非法用户登录请求,具有好的棒性可用性

    Simulation tests show that the identity authentication model can stand with password attacks, filtrate out invalid login requests availably, and have advantages of good robustness and reliability.

    youdao

  • 因此必要采用一种加密强度比较的加密算法来加密一些重要数据防止合法用户越权操作非法用户恶意攻击

    So it is necessary to adopt one encrypt intensity high algorithm encrypt some important data, in order to prevent that legal users operate over authority, illegal user attack viciously.

    youdao

  • 非法用户首先受到一封警示邮件然后服务暂停处理,如果用户仍旧继续下载,服务商最后根据不可”规定终止合同

    Users would first be sent an email warning them followed by a suspension if they carry on and finally the termination of their contract under the 'three strikes' rule.

    youdao

  • 图书馆计算机管理进入网络化阶段后,计算机系统各类资源容易受到非法用户破坏,而采取运行机制管理网络增强网络的安全性

    In the network stage, all kinds of resources in the library computer manage system will be damaged easily by illegal user. Using a separated network system can buildup security of the network.

    youdao

  • 一旦存有重要数据存储设备丢失、被盗窃,如何最大程度的阻止试图读取这些设备的非法用户获取核心保密数据现代存储技术所最为注重课题之一

    After loss of devices with important data, the way to protect sensitive data against aggression from illegal user is gaining more and more concern in modern storage technology field.

    youdao

  • 一些非法文件共享网络用户-他们要的就是监管者难以追查出其网上活动。

    Some are users of illegal file-sharing networks who want to be harder to track down.

    youdao

  • 任天堂DS带来盗版困扰种叫r 4设备,拥有设备,用户就能够从网上下载非法的DS游戏便携设备上。

    The Nintendo DS has been affected by software piracy thanks to products like the R4 card, a device that lets users download illegal copies of DS games and play them on the portable.

    youdao

  • 虚假恶意软件警告已经成为引诱无辜用户购买非法软件通用手段

    Fake malware warnings have become a common method of luring innocent users into buying illegitimate software.

    youdao

  • 拼贴发加密模仿普通用户信息流通模式这样不会产生提示非法行为电子指纹

    Collage also aims to mimic the traffic patterns of innocent users, so that digital fingerprints which may suggest illicit behaviour are not produced.

    youdao

  • 上个星期法国议会通过了法案要求网络运营商那些一年内收到三次警告仍有提供非法侵权资料嫌疑用户停止提供网络连接服务。

    Just last week the French Assembly passed a law that forces ISPs to disconnect those suspected of illegally sharing copyright infringing material on the third warning for up to a year.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定