Mahone gets the security disk from the harbor master's office.
马宏从港口经理处拿到了柜台录像带。
Although text files take up less disk space, databases provide greater data security, easier access to the data, and better scalability for a large number of users.
虽然文本文件占用较少的磁盘空间,但数据库为广大用户提供更高的数据安全性、更轻松的数据访问和更好的可伸缩性。
Monitoring of the client status can focus on, for example, checking the remaining disk space, the security status, or licensing issues in the context of asset management.
例如,对客户机状态的监视可以主要关注剩余磁盘空间、安全状态或资产管理方面的许可证问题。
Security - Do not save encrypted pages to disk.
安全性——不要将加密的页面保存到硬盘中。
Also, that file's security context must be privileged to be "associated" with that filesystem (so for example, a "Top secret" file can't be written to an "Unclassified" disk).
同样,那个文件的安全上下文必须有特权与文件系统“关联(associated)”(所以,举例来说,“高度保密”的文件不能写到一个“不保密”的磁盘)。
It works by placing the files on a RAM disk (it cuts down RAM for applications, slowing performance, but remember, our goal is to assess the system's security).
它在工作时将这些文件放到一个RAM磁盘上(这样就减少了应用程序可以使用的RAM数量,从而会降低系统的性能,但是不要忘了,我们的目标是评估系统的安全性)。
Tape provides another technical differentiator from disk systems that addresses both security and data protection concerns: a completely offline copy of data.
磁带提供与磁盘系统不同的技术区别,离线备份能够解决安全和数据保护问题。
Disk Encryption offers several different methods of accessing the encrypted data to suit your own personal security needs.
磁盘加密提供了访问加密的数据,以满足您自己的个人安全需要几种不同的方法。
Mingke want bar, attention must be paid to the disk situation, confirm the bar card security, or sometimes occur. The crisis.
明刻想要加杠,必须注意盘面的局势,确认加杠牌的安全,否则有时会发生被抢杠的危机。
Clean Disk Security gives you secure file deletion, ensuring that deleted files cannot be undeleted again.
清洁磁盘安全让您安全的文件删除,以确保被删除的文件无法再被还原。
As a security measure, they are not stored on disk.
作为一种安全措施,它们不存储在磁盘上。
Because of high security, high speed, and good performance advantages, such as hardware-based encryption technology to protect disk data has become the mainstream of current trends and research focus.
由于安全性高、速度快、性能好等优势,硬件加密技术成为了当前保护磁盘数据的主流趋势和研究热点。
Fourth, the article shows the key technology used and by the security USB disk module, and demonstrate the result of TPM based security USB systems.
第四,文章说明了安全优盘模块所使用的关键技术与这些关键技术的实现,并且展示了基于TPM的安全优盘系统的实现结果。
TPM based security USB disk system has access control functions, to maximize control over the use of USB disk.
基于TPM的安全优盘系统具有优盘访问控制功能,最大限度的控制移动存储设备的使用。
TPM based security USB disk system uses the Trusted Computing Platform Module TPM to store and use the key to solve the password management problems.
基于TPM的安全优盘系统使用可信计算平台模块TPM实现密钥的存储和管理,解决了密码技术中密钥管理的难题。
Hard disk encryption card, which is designed based on the IP reuse in this paper, is a kind of hardware encryption device to ensure storage security.
基于IP复用方法实现的硬盘加密卡,是一种用于保障数据存储安全的硬件加密装置。
The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus.
本发明属于计算机信息安全处理系统,尤其属于一种外置式计算机硬盘数据加密方法及其装置。
The invention belongs to the computer information security processing system, in particular to an outlaid computer hard disk data encryption method and apparatus.
本发明属于计算机信息安全处理系统,尤其属于一种外置式计算机硬盘数据加密方法及其装置。
应用推荐