If they do not match, the current user can be detected as an unauthorized user.
如果不匹配,当前用户就可以被探测为未经授权用户。
To prevent unauthorized user to access, the camera and video are protected by password.
以防止未经授权的用户访问,相机及摄录机所保护的密码。
Not every system hack will initially provide an unauthorized user with full access to the targeted system.
不是每个系统黑客最初将提供未经授权的用户提供完整的访问目标系统。
Access Can an unauthorized user successfully access a control that only the administrators are authorized to use?
访问一个未经授权的用户能成功访问只有经过授权的管理员才能使用的控制权吗?
Physical access to your servers and your databases may be compromised allowing an unauthorized user to access them.
对服务器和数据库的物理访问可能受到危害,使未授权用户得以访问它们。
Once an unauthorized user is identified, Apple could wipe the device and remotely store the user's "sensitive data.
一旦发现未经授权的用户,苹果可以重写设备并远程存储用户的敏感数据。
You should ensure that you do not accidentally expose the contents of the record sequence to an unauthorized user.
您务必要避免不小心将记录顺序内容公开给未经授权的使用者。
Once an unauthorized user is identified, Apple could wipe the device and remotely store the user's "sensitive data."
一旦发现未经授权的用户,苹果可以重写设备并远程存储用户的敏感数据。
As long as your messages are encrypted, an unauthorized user that intercepts a message would not be able to actually read it.
一旦你的邮件经过加密,就算未授权的用户拦截到信息也不能读取。
Using an unauthorized user, attempt to perform instance-level operations such as get the database manager configuration parameter.
使用未授权的用户,尝试执行实例级操作,如获得数据库管理器配置参数。
You can use encryption to protect user secrets (for example, passwords) and to make credentials unreadable by unauthorized users.
您可以使用加密来保护用户的机密信息(如密码),并使未经授权的用户无法读取凭据。
Typically, a closed community site or extranet site like this presents an unauthorized user with a login page instead of the home page.
通常,完整的社区站点或外部网站点会向未经过身份验证的用户显示一个登录页面,而不是主页。
Access control is an important technology that is used to protect system resources from unauthorized user access, change, destruction.
访问控制是用来保护系统资源免于被非法用户访问、更改、破坏的一项重要技术。
Testing access will help you find out if an unauthorized user can successfully access a control that only the administrators are authorized to use.
测试访问将帮助您查明一名未授权用户是否能够成功访问一个只有管理员有权使用的控件。
Security management protects network user resources and devices and the network management system itself is not accessed by unauthorized users.
安全管理保护网络用户资源与设备以及网络管理系统本身不被未经授权的用户访问。
The disadvantage is that if the federation is corrupted, few safeguards prevent an unauthorized user from gaining access to controlled information.
缺点在于,如果联合被破坏,很少有防护措施来防止未经授权的用户获得对受控信息的访问。
If an unauthorized user is allowed to gain physical access to the server, there is a potential for him to obtain secured data or to do severe damage to the server.
如有未授权的用户被允许对服务器进行物理访问,那么他有可能盗取了加密数据或对服务器进行严重的破坏。
In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identities of authorized users of the electronic device.
在某些具体情况下,可以通过比较电子设备当前用户与授权用户的身份来探测未经授权的用户。
This is a security measure. It insures that an unauthorized user cannot tell the difference between a case where an account exists and when the account does not exist.
这是个安全特性,确保未授权的用户不能区分他请求的这个账号是否存在。
Enable password policy to force computer users to set passwords that meet security requirements, including setting the password lock server console to prevent unauthorized user modifications.
启用密码策略,强制计算机用户设置符合安全要求的密码,包括设置口令锁定服务器控制台,以防止非法用户修改。
In this way, you can greatly improve performance and still prevent transmission of user IDs and passwords in clear text, thus preventing unauthorized access to the data.
通过这种方式可以极大地提高性能,并且可以防止用明文传输用户ID和密码,进而防止未授权的用户访问数据。
Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.
小心请不要在生产环境中使用此过程允许未经授权的用户访问用户数据。这样做可能会违反贵公司的隐私和安全政策。
Essentially, Apple's patent provides for a device to investigate a user's identity, ostensibly to determine if and when that user is "unauthorized," or, in other words, stolen.
从本质上讲,苹果的专利使设备能够鉴别用户的身份,显式确定是否及何时该用户是“未经授权的”,或者,换句话说,该设备被盗了。
Changing a single parameter may give the user unauthorized access.
—改变一个单一的参数可能给用户未授权的访问。
In CSRF attacks, unauthorized commands are transmitted from a user that the Web site trusts.
在CSRF攻击中,从Web站点信任的用户处传播未经授权的命令。
If the user attempts to directly access the.jsp page for an unauthorized functionality, a user error message is displayed as in Figure 14.
如果用户想要直接访问.jsp页面上一个未被授权的功能,就会显示用户错误消息,如图14所示。
If the user does not have access to the document in question, then an error displays when the agent runs (for example, "Entry not found in index" or "Unauthorized to attempt that operation").
如果用户没有所讨论文档的访问权限,那么在代理工作时将显示错误(例如,“Entrynotfoundinindex”或“Unauthorized to attempt that operation”)。
In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.
此外,我们雇佣了保安和使用了电子安全多项措施,以防止在未经授权下访问用户的信息。
The command bean is instantiated and a try catch block is used to catch exceptions generated from a duplicate user, an invalid credit card, or an unauthorized credit card.
命令bean被实例化,trycatch块被用于捕捉由于重复的用户、无效的信用卡或未经认证的信用卡而产生的异常。
The command bean is instantiated and a try catch block is used to catch exceptions generated from a duplicate user, an invalid credit card, or an unauthorized credit card.
命令bean被实例化,trycatch块被用于捕捉由于重复的用户、无效的信用卡或未经认证的信用卡而产生的异常。
应用推荐