The true problem may be the unquestioning acceptance of manufacturer-supplied XML signature code.
真正的问题可能是对制造商提供的XML签名程序码的绝对接受。
Although you can use these applications to generate the canonical form of an XML document, they are primarily used by the XML signature code.
虽然可以使用这些应用程序来生成XML文件的规范形式,但是它们仍主要用于XML签名代码。
The downside of this approach is the possibility that a typo or slight ambiguity in the signature will silently fail, which means the code will compile but "do the wrong thing" at runtime.
这种方法的缺点在于签名录入的错误或含糊不清可能会导致没有征兆的故障,这也就意味着代码可以编译,但在运行时无法正确完成操作。
Instead of giving your ATM card and PIN code, the card can double as a credit card with a signature authorization.
不用交出你的ATM卡和PIN密码,只需获得信用卡签名的授权,你就可以使用信用卡。
In many cases, changing the method signature so the collaborator becomes a parameter will result in a confusing, untested snarl of code inside the method's original callers.
在许多情况下,更改方法签名以使合作者成为参数将会在方法的原始调用者内部产生混淆的、未经试验的代码混乱。
The tool will also create an empty implementation class for you that contains the following code in an empty method with the signature.
该工具还将为您创建一个空实现类,此类在一个具有签名的空方法中包含以下代码。
The added constructor code USES a signature defined by AspectWerkz 2.0 to get access to context information, which includes any parameter definitions for the aspect.
增加的构造函数代码使用AspectWerkz 2.0定义的一个签名来访问上下文信息,这些信息包括为方面定义的所有参数。
So it looks like the current CXF code insists on generating a signature when an AsymmetricBinding is in scope, even when nothing is being signed.
因此,当asymmetricbinding在作用域中时,它和当前CXF代码一样坚持生成签名,即使没有什么需要签署。
The Listing 8 properties file is used by the underlying WSS4J WS-Security code to configure the signature and encryption processing.
底层的WSS4JWS-Security代码使用清单8 所示的属性文件配置签名和加密处理。
The generated code will add the Ajax-Call header, whose value is the function's signature.
生成的代码将添加ajax - Call头部,它的值就是函数的签名。
The Eclipse IDE and IBM Lotus Expeditor effectively apply signature security mechanisms in their provisioning subsystems by enhancing the code security level when it's deployed to end users' desktops.
EclipseIDE和IBMLotusExpeditor有效地将签名安全机制应用到它们的供应子系统中,从而在将插件部署到终端用户桌面时增强它的安全性。
The code makes a call out to a template and the template is matched by the signature of the call. In this case the template can be found in the uml2utility.xsl.
由代码向模板发出命令,模板与调用签名相匹配。
This interceptor method can use the same signature as the original method, including returning the same value. Listing 3 shows what a source code version of this approach would look like.
这个拦截器(interceptor)方法可以使用与原来方法同样的签名,包括返回同样的值。
This will generate a function signature in the source code with the const qualifier for the selected parameter, once the transformation is executed.
这样,当转换执行的时候,将在源代码中为选定的参数生成带有常量修饰符的函数签名。
Tools that recognize your signature can then optionally grant your software security privileges it wouldn't otherwise have, and detect if the code has been tampered with.
这样,能够识别签名的工具就可以有选择地为您授予软件安全特权,这是其他文件做不到的,它还可以检测代码是否被篡改过。
This makes it easier for frameworks and client and server code in general to handle signature verification.
这通常能简化框架、客户端、服务器代码对签名的验证。
Second, more information such as comments or zip code can be displayed next to the signature.
其次,更多的诸如评论,邮编信息可以展示在签名旁边。
But when you replace the PIN code with your signature, the card becomes very limited and can only be used for limited access.
但是当用签名代替PIN密码时,就只能对信用卡进行有限授权的操作。
Signature changes will cause the client code to either not compile or to crash and behavioral changes will create more subtle errors.
方法声明的变化会导致客户端无法编译或是崩溃,方法行为的变化会导致无可预计的微妙错误。
The code in Listing 1 shows the signature of the find() method.
列表1中的代码显示了find() 方法的结构。
Message information may be authenticated with error-control code, message authenticated code and digital signature.
报文信息的鉴别认证可采用差错控制码、报文鉴别码与数字签名进行。
Since expressions are not covered in the digital signature, it is important to verify that expressions aren't harmful, and that the code behind functions that are called by expressions is safe.
因为数字签名没有覆盖表达式,所以验证表达式无害,并且其调用的函数代码是安全的将非常重要。
The encryption and digital signature solve the problem in integrity and confidentiality of active code. The application of decode-binding realizes the scalability in systematic encryption methods.
加密与数字签名解决了主动代码的完整性、机密性问题,这里使用解码绑定方式,实现了系统加密方法的可扩展。
The chain code was replaced by the shape signature and used to express the contour, improve the speed and decrease the effect of noise and transformation due to camera calibration.
在特征表示方面,用形状签名代替链码来描述轮廓,从而提高了计算速度,降低了由噪声干扰和镜头形变造成的影响。
The reference is actually taken to an intermediate reference assembly, that is, an assembly that contains all the type and signature information, but that does not necessarily contain any code.
该引用实际上引用的是一个中间引用程序集,即,一个包含所有类型和签名信息但不一定包含任何代码的程序集。
Typically, the runtime validates each assembly's digital signature when the code is loaded.
通常,在加载代码时,运行时会验证每个程序集的数字签名。
Extract method determines the signature of the new method, creating a static method when no instance data is referenced by the code in the new method.
“提取方法”确定新方法的签名,并在新方法中的代码不引用实例数据时创建静态方法。
Enables code to demand that its callers possess a digital signature, thus allowing only callers from a particular organization or site to call the protected code.
使代码能够要求其调用方拥有数字签名,从而只允许特定组织或特定站点的调用方来调用受保护的代码。
Followed with malicious code analysis and detection technology, for example, the signature scanning, can analysis and detect a certain extent, but still could not avoid their defects.
随之出现的恶意代码分析检测技术,包括特征码扫描等,能在一定程度上进行分析检测工作,但仍无法避免各自的缺陷。
Followed with malicious code analysis and detection technology, for example, the signature scanning, can analysis and detect a certain extent, but still could not avoid their defects.
随之出现的恶意代码分析检测技术,包括特征码扫描等,能在一定程度上进行分析检测工作,但仍无法避免各自的缺陷。
应用推荐