No sensitive information, such as passwords, gets stored there.
没有敏感的信息,如密码,获取那里存储中。
Upon entry, they scan your file system for personal information, such as passwords.
在进入以后,他们可以检查文件系统,查看个人信息,比如密码。
Do you want to change access on keychain items (such as passwords) to allow the new version access?
是否希望更改对密钥链项(比如密码)的访问权以允许新版本访问?
When the secret ports are open, the usual security mechanisms (such as passwords or certificates) will apply.
打开秘密端口之后,应用常用的安全机制(比如密码或证书)。
Do you want to allow the new version to access the same keychain items (such as passwords) as the previous version?
是否要允许新版本访问与上一版本相同的密钥链项(比如密码)?
In addition, the file system configuration repository contains a great deal of sensitive information (such as passwords).
此外,文件系统配置存储库包含大量的敏感信息(如密码)。
Do you want to allow the new program access to keychain items (such as passwords) that the previous version had access to?
是否希望允许新程序访问上一版本可以访问的密钥链项(比如密码)?
The attacker can then analyze the recorded data to retrieve confidential information, such as passwords and confidential messages.
然后,攻击者能够通过分析记录数据检索出凭证信息,比如说密码和凭证信息。
If they contain confidential information, such as passwords, you may want to have the server agent erase that information after it's been read.
如果它们包含机密信息,比如口令,您可能希望让服务器代理在读取文档之后删除该信息。
As authentication data such as passwords will be traveling over the network, you'll want to set up encrypted communications using the TSL protocol.
由于诸如密码之类的身份验证数据会通过网络进行传输,因此希望使用TSL协议建立加密通信连接。
A keylogger is a malicious program that tracks keystrokes on the victim's computer to illegally capture the user's personal data, such as passwords.
键盘记录器是一种恶意程序,跟踪击键在受害者的电脑,非法获取用户的个人数据,如密码。
Using this technique, the attacker can gain sensitive data such as passwords, credit card numbers, and any arbitrary information the user inputs as shown in Figure 2.
通过使用这种技术,攻击者可以获得诸如密码、信用卡号以及用户输入的任意信息等敏感数据,如图2 所示。
Using this technique, the attacker can gain sensitive data such as passwords, credit card Numbers, and any arbitrary information the user inputs as shown in Figure 2.
通过使用这种技术,攻击者可以获得诸如密码、信用卡号以及用户输入的任意信息等敏感数据,如图2所示。
It provides functionality for validating user credentials, creating and modifying membership users, and managing user Settings such as passwords and email addresses.
它提供用于验证使用者认证,建立和修改成员资格使用者,以及管理使用者设定(例如,密码和电子邮件地址)的功能。
WebSphere CloudBurst is able to encrypt all data, and stores sensitive data, such as passwords and credentials, on encrypted flash memory inside the tamper-resistant vault.
WebSphereCloudBurst能够加密所有数据并在抗外力入侵的库内在加密的闪存上存储密码和凭证之类的敏感数据。
If music is saved on a hard drive so that it can be played around the house, make sure that sensitive information, such as passwords or identifying Numbers, are saved elsewhere.
如果你音乐存储在硬盘里,能在家中的每个地方播放,那你可要当心了,你的某些私人敏感信息,像密钥或者识别码之类的,都会出现在家中的每个地方,这都是潜在的危险。
Biometrics which is a kind of science of using individual personal characteristics to verify identity, is inherently more reliable than traditional methods such as passwords and PIN Numbers.
生物特征识别技术是一门利用人类特有的个体特征来验证个人身份的科学,它比传统的基于口令和身份号码的方法更为的可靠。
Avoid giving the file an obvious name, such as "my passwords".
可别用像“我的密码”这样明显的文件名。
This is often helpful to diagnose connection problems, such as bad username/passwords or wrong database or schema specified, etc.
一般来说,对于诊断连接错误、用户名/口令错误、指定的数据库或模式错误等,非常有效。
When using an unsecured, "clear text" protocol such as Telnet, anyone on the network can pilfer your passwords and other sensitive information.
在使用telnet这样的不安全“明文”协议时,网络上的任何人都可以窃取您的密码和其他敏感信息。
Are passwords randomly selected by the system, or can users select their own? If the latter, does the system check for common weak passwords such as?
密码是由系统随机选择的,还是用户可以自行选择密码?
After you provide this information, continue to provide standard configuration data such as virtual machine resource allocation information, cell name, node name, and passwords.
提供这些信息之后,继续提供标准的配置数据,比如虚拟机资源分配信息、单元名称、节点名称和密码。
They define and use the data manipulation layer metadata, such as various database locations, schemas, rules, connections, user IDs and passwords, and so on.
这些服务定义并使用数据操作层元数据,例如各个数据库位置、模式、规则、连接、用户ID和密码等等。
Policies can also force strong passwords and set security features such as the number of times a password attempt can fail before the device wipes its data.
这方面的政策还可以要求设定复杂的密码以及设置安全功能,如在多次密码输入错误后可自动抹除设备上的数据。
User IDs and passwords stored in its local files and are meaningless in any other context, such as on a different server.
用户ID和密码存储在其本地文件中,并且在任何其他上下文(如在另一台服务器上)中是没有意义的。
This includes potentially sensitive information, such as stored passwords.
这可能包含敏感信息,例如,所存储的密码。
This means sitting on top of the creation of user passwords and the formulation of rules and procedures for such fundamental functionality as general access to the system assets.
这意味着他们控制用户密码的创建,以及为对系统资产的一般访问等基本功能制定规则和过程。
The data in the string is product-specific, and is used for passing information needed for authentication, such as user IDs and passwords.
字符串中的数据是特定于产品的,并用于传递身份验证所需的信息,如用户ID和密码。
It is normally used to assign a unique identification to your computer and securely store information such as user IDs, passwords, preferences, and online profiles.
它通常用于为你的计算机进行独特的识别并安全地储存类似用户身份、密码、偏好和在线概况等信息。
It is normally used to assign a unique identification to your computer and securely store information such as user IDs, passwords, preferences, and online profiles.
它通常用于为你的计算机进行独特的识别并安全地储存类似用户身份、密码、偏好和在线概况等信息。
应用推荐