• Weak passwords do not mix these elements.

    密码混合使用这些元素

    youdao

  • Many computer viruses, worms, and Trojan horses are designed to exploit weak passwords.

    很多计算机病毒蠕虫特洛伊木马的设计利用口令。

    youdao

  • Are passwords randomly selected by the system, or can users select their own? If the latter, does the system check for common weak passwords such as?

    密码系统随机选择的,还是用户可以自行选择密码?

    youdao

  • However, we find that relatively weak passwords, about 20 bits or so, are sufficient to make brute-force attacks on a single account unrealistic so long as a “three strikestype rule is in place.

    然而我们发现,长度约为20个字符左右相对较”的密码已经能够使得针对单一账户暴力破解变得不现实只要有“振出局”的规范即可。 (译者注:原文的“threestrikestyperule 指的应该连续三次输入错误密码就会暂时锁死账户,具体可参考此处。)

    youdao

  • Passwords that are too weak of course invite brute-force attacks.

    当然了,密码的确容易招致暴力破解攻击。

    youdao

  • In addition, many widely used authentication mechanisms are weak. For example, usernames and passwords for authentication are weak due to.

    此外许多广泛使用身份验证机制很薄弱

    youdao

  • In addition, many widely used authentication mechanisms are weak. For example, usernames and passwords for authentication are weak due to.

    此外许多广泛使用身份验证机制很薄弱

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定