Server Port: Use 1389 for a non-secure connection and 1636 for a secure connection.
服务器端口:对于非安全性的链接使用1389,对于安全性的链接使用1636。
This paper focuses on the formal verification of MANET non-secure and secure routing protocols.
在安全问题中,路由协议的正确性尤为重要。
Kerberos protocol allows computer nodes communicating on a non-secure computer network to authenticate each other in a secure manner.
Kerberos协议允许在不安全的计算机网络上通信的计算机节点以一种安全的方式互相验证。
This error is usually caused by a basic connection failure, such as attempting to make a non-secured connection with a secure application server.
这个错误通常由基本连接失败引起,例如试图对安全应用程序服务器进行不安全的连接。
It's important to ensure that access permissions are properly set because the OpenSSH server may refuse to use keys which have non-secure access rights.
确保正确设置访问权限非常重要,因为OpenSSH服务器可能拒绝使用具有不安全的访问权的密钥。
When company information is stored on non-secure and personally owned devices, employees put their company at risk every time they step out the door.
如果雇员将公司的信息存储在无保护的个人存储设备上,那么他们一出门就将公司置于风险之中。
Visiting scholars were not allowed to enter secure areas, and could only enter non-secure areas for work in the company of personages from the US side.
访问学者不得进入保密区,只能在美方人员陪伴下进入非保密区工作。
If you sign in to Gmail via a non-secure Internet connection, like a public wireless or non-encrypted network, your Google account may be more vulnerable to hijacking.
如果你在不安全的网络环境下登陆Gmail,比如在公共无线网络里或者没有加密的网络里,你的Gmai帐号可能会被劫持。
In this case you might store the two types of data together, but you still want to ensure that operations done on the secure data are never done on the non-secure data.
此时可以将这两类数据保存在一起,不过仍然需要确保对安全数据所进行的操作不会发生在不安全数据上。
While it seems counterintuitive, non-secure data often goes through all the same operations as secure data, simply because the two types of data are stored in the same place.
尽管看似违背直觉,但不安全的数据所经历的操作往往与安全数据完全相同,这只是因为这两类数据都被存储到了相同的位置。
It has simple configuration and secure communication with integrating RBAC to enable non-root users to collect FFDC data.
它具有简单的配置和安全的通信,并通过集成rbac允许非根用户收集FFDC数据。
If you need to secure a virtual cube, you need to define security on the non-virtual cubes on which the virtual cube is based.
如果需要保护一个虚拟多维数据集,需要在虚拟多维数据集所基于的非虚拟多维数据集上定义安全性。
Now with the sample application ready, we need to secure these resources to prevent non-authenticated users from accessing this site.
示例应用程序已经准备好了,现在需要保护这些资源,防止未经身份验证的用户访问这个站点。
FUSE lets you develop a fully functional filesystem that has a simple API library, can be accessed by non-privileged users, and provides a secure implementation.
使用FUSE您可以开发功能完备的文件系统:其具有简单的api库,可以被非特权用户访问,并可以安全的实施。
The secure, high-capacity, jam-resistant wireless (non-satellite) system connects users with both digital data and voice communications.
这种安全、高容量、抗阻塞的无线(非卫星)系统通过数字数据以及话音通信使战场用户互连。
Generate a single, secure password with no ambiguous, or easily confused, characters and at least one non-alphanumeric character.
生成一个安全的密码,其中不包含含糊(即容易混淆的)字符,至少包含一个非字母数字字符。
It has Compact Flash (CF) and Secure Digital (SD) slots and can support non-storage devices such as an 802.11b wireless CF card or an Ethernet adapter.
它还有CF (CompactFlash)和SD (SecureDigital)插槽,可以支持非存储设备,例如802.11b无线cf卡或以太网适配器。
As the centralized monitoring system is a non secure system, it is necessary to adopt a secure communication protocol between the centralized monitoring system and other systems.
由于集中监测系统为非安全系统,从系统边界防护角度考虑,应该对集中监测系统和其它系统之间的通信接口采用安全通信协议。
A hand of an acid attack victim hangs from a bed during a therapy session at a secure shelter run by non-profit organization "Cambodia acid Survivors Charity" outside Phnom Penh July 7, 2010.
一种酸攻击的受害者手挂起治疗会议期间从床非营利组织运行安全的居所“柬埔寨酸幸存者慈善”之外金边2010年7月7日。
Non Repudiation in data sending and receiving is essential in the secure communication.
在安全数据通信中,数据发送和接收的非否认性是一个极为重要的问题。
The labor security and salary of these non-official employees is always low and their basic labor rights and interests are difficult to secure.
而这些非“正式”员工的劳动保障和待遇往往都很低,一些基本的劳动权益很难保障。
They are secure enough to trust their partner when they are not with them, and find non-stop emailing and texting to be a waste of their own time.
当她们的恋人不在身边时,她们有足够的安全感去相信他们,她们认为不停地发电子邮件和短信是一种浪费时间的行为。
Non - secure Internet Protocol Router NETwork?
不安全的因特网协议路由器网络NIPRNET ?
Finally, it presents a secure implementation model of SET transaction, which ensures the validity, confidentiality, integrity and non-repudiation of transaction.
给出了一个SET交易的安全实现模型,它保证了交易的有效性、机密性、完整性和不可抵赖性。
A secure network information system should ensure integrity, confidentiality and non-reputation of the transmitted data.
一个安全的网络信息系统应当确保所传输信息的完整性、保密性、不可否认性等。
A mobile agent protection scheme based on the non-interactive secure function evaluation was presented using an optimized oblivious transfer (ot) protocol.
通过优化不经意传输(OT)协议,提出一种基于非交互保密函数计算的移动代理保护新方案。
Through combining the simultaneous ot protocol and the encrypted circuit construction, obtain a non-interactive secure function evaluation protocol.
组合该并发ot协议与加密电路构造,得到一个非交互保密函数计算协议。
The simultaneous ot protocol and the encrypted circuit construction were combined to obtain a non-interactive secure function evaluation protocol.
将该并发ot协议与加密电路构造组合,得到一个非交互保密函数计算协议。
As an international non-profit organization, DFS provides services and support to help its clients secure and maintain employment.
作为一个国际性的非营利组织,DFS为客户提供服务和支持来帮助其就业。
A secure network system should ensure the integrality and confidentiality of the data non-repudiation.
一个安全的网络系统应当确保传输信息的完整性、保密性、不可否认性等。
应用推荐