AIX V7.1 provides user group scalability and security enhancements such as new password policies and access restriction to ODM directories.
AIXV7.1提供用户组扩展能力,以及新的密码策略和对OD m目录的访问限制等安全改进。
For security, a unique user id and password needs to be configured on the XC10, which will be used by the XI50 to access the data grid.
为了安全起见,需要在XC10上配置唯一的用户ID和密码,XI50使用它们来访问数据网格。
Default security is set to WiFi Protected Access 2 (WPA2), requiring users to enter a randomly chosen password to connect to the Internet.
这套WiFi系统默认使用WAP2协议,用户想要接入这个WiFi网络需要输入随机密码。
If security is enabled on the Service registry (and typically it is), a username and password that has appropriate access to the registry has to be configured.
如果在ServiceRegistry上启用了安全性(并且通常是这样),则必须配置具有适当注册中心访问权限的用户名和密码。
In terms of security, delegates can only view your inbox and respond to messages on your behalf; they can't access gChat, change your password, or fiddle with other account settings.
考虑到安全因素,邮件代理只允许你查看收件箱和以你自己的账户回复邮件,而不允许访问到gChat服务,修改用户密码或者修改账户的其他设置。
Improved Internet security features, including the ability to prevent access to Internet password fields in the Domino Directory and Internet account lockout due to password entry failure.
增强了Internet安全特性,包括阻止访问DominoDirectory中的Internet密码字段以及当密码输入错误时停用Internet帐户。
For password removal its now possible to backup original security module. It helps to recover original password after getting access to data.
对于密码清除它现在可以备份原来的安全模块。它有助于获得数据后恢复原来的密码。
For the highest level of security, choose to only allow access to the data when both a USB and password are present.
对于最高级别的安全,选择只允许访问数据时,既是一个USB和密码都存在。
When I access my account on the Internet account site, I must input my password and also enter the most recent security number from the small transmitter.
当我在互联网上查我的帐户,我必须输入自己的密码,及一并输入小型发射器上即时所显示的安全号码。
Most common security mechanisms give rights to users based on their logon credentials (usually a password) and restrict resources (often directories and files) that the user is allowed to access.
大部分的一般安全机制都是依据使用者的登入认证 (一般为密码) 来授与权限,并限制使用者允许存取的来源 (通常为目录和档案)。
Describe the it security policies and procedures for password protection and to identify the abuse of improper access, tampering or the altering of business data.
描述信息技术保全政策和程序,对密码保护和识别滥用不当访问,篡改或改变业务数据的程序。
Security is increased because an attacker needs to know the user's password and have access to whatever provides the second factor, such ane-mail account or cell phone.
这样增加了安全性,因为攻击者需要知道用户的口令,并且能够对提供第二因子的客户端进行访问,如e -mail账号或移动电话等。
Security is increased because an attacker needs to know the user's password and have access to whatever provides the second factor, such ane-mail account or cell phone.
这样增加了安全性,因为攻击者需要知道用户的口令,并且能够对提供第二因子的客户端进行访问,如e -mail账号或移动电话等。
应用推荐