Finally, some ideas on how to properly secure yourself and your systems from the possibility of a password cracking attack were offered.
最后,提供了有关如何适当保护您自己和您的系统避免可能受到密码破解攻击的一些想法。
Business partners do not need to set up IDs and passwords for users, nor do the partners need to maintain these password systems.
业务合作伙伴并不需要为用户设置ID和密码,合作伙伴也不需要维护这些密码系统。
The application providers had unique id and password schemes for each of their systems, which caused IBM employees to still require multiple IDs and passwords in order to access their applications.
应用程序提供者对于其每个系统采用了独有的ID和密码方案,从而导致IBM员工仍然需要使用多个ID和密码才能访问他们的网站。
The user can use the same service ticket for accessing other AIX client systems without having to re-enter the password.
用户可以使用同一个服务票据访问其他AIX客户机系统,而不需要重新输入密码。
This attack USES password cracking to penetrate the systems that the attacker wants to deface.
这一攻击使用密码破解来渗透攻击者想破坏的系统。
Password management. Enables users to have a single set of credentials to sign on to the company information systems.
密码管理—使用户能够用一组凭证登录到公司的信息系统。
When WI was first released, there were already many user ID and password systems.
WI首次发布时,已经存在很多用户ID和密码系统。
A password policy is put in place to ensure the systems that users access are secure.
密码策略用来确保用户访问的系统的安全性。
After logging in with your root password, you can validate the managed systems.
在使用您的root密码登录之后,您可以对托管的系统进行验证。
Some applications already had ID and password systems set up before IIPx.
有些应用程序在采用IIPx前已经具有ID和密码系统。
Connection documents contain the information necessary to connect to external systems, such as user and password information.
Connection文档包含连接到外部系统的必要信息,比如用户名和密码信息。
Requesting access to each discovered system by providing an administrator user id and password that Director will use to authenticate to the systems in the future.
请求访问发现的每个系统,这要提供Director用来执行系统身份验证的管理员用户ID和密码。
In most cases on modern systems, though, the password is stored in an encrypted Samba-only password database.
在现在系统的大多数情况下,密码存储于仅samba加密的密码数据库中。
There are various authentication methods in UNIX systems, like password-based authentication, authentication using smart CARDS, authentication based on biometric technology, and more being practiced.
在UNIX系统中,有多种身份验证方法,比如基于密码的身份验证、使用智能卡的身份验证、基于生物检测技术的身份验证等等。
Do you have established password controls for your automated systems?
自动系统是否有密码控制?
You would have to augment this example for production use, as most computer systems require a letter for the first character of a password.
你也许在正式使用这个例子之前扩展一下这个例子,因为大多数计算机系统要求密码的第一个字符是字母。
At present, people adopt a large amount of network authentication systems based on password or digital certificate.
目前,人们大量采用基于密码或数字证书的认证系统。
Before using most information systems in the computers or the networks, the users must obtain relevant authorizations which always have time limit, such as entry password.
计算机或网络中的一些信息系统需要获得一定的授权才能使用,而且很多授权都有一定的使用期限,例如登录口令。
Assign the function for the password attestation and legal powers that other systems provided the employee to register at the same time.
同时为其它系统提供了员工登录的密码认证和权限分配功能。
Automated systems must use individually assigned accounts that require a periodic change of password.
自动化系统必须使用需要定期更换口令的个人担保账户。
The existing single sign-on systems are usually not easy to be deployed, and they have a limitation in password security protection.
现有的单点登录系统通常存在部署开销大、口令安全性保护不足等问题。
The password is a kind of protection means of the computer systems has been applied extensively.
口令作为一种保护手段被广泛应用于计算机系统中。
You may not attempt to gain unauthorized access to any KOE site or service, computer systems or networks connected to any KOE site or service, through hacking, password mining or any other means.
不得试图以以“黑客”行径、破译密码或其他方法非法进入任何超越的网站或使用其服务、或连接有关计算机系统或网络。
You may not attempt to gain unauthorized access to any KOE site or service, computer systems or networks connected to any KOE site or service, through hacking, password mining or any other means.
不得试图以“黑客”行径、破译密码或其他方法非法进入任何超越的网站或使用其服务、或连接有关计算机系统或网络。
On the basis of the introduction of the working principle of dynamic password card, the scheme of realizing dynamic password card by embedded systems is studied. And th…
在介绍动态口令卡工作原理的基础上,研究了用嵌入式系统实现动态口令卡的实施方案,并进一步介绍了该方案的硬件、软件的实现方法及技术难点。
A smart card based on remote access password authentication scheme is given, which can verify a log-in password without verification table. It utilizes the signature property of public key systems.
给出了一个基于智能卡的远程访问口令认证方案,它能够对登录口令进行检验而不需要检索口令表。
Traditional ID authentication combines a user name and a password, which is not sufficient enough to assure the security of application systems in an environment full of hackers network attacks.
传统的身份认证只是一种用户名和口令的简单组合,在充满黑客和攻击的网络环境下,这种认证方式已经不能充分保证应用系统的安全。
Traditional ID authentication combines a user name and a password, which is not sufficient enough to assure the security of application systems in an environment full of hackers network attacks.
传统的身份认证只是一种用户名和口令的简单组合,在充满黑客和攻击的网络环境下,这种认证方式已经不能充分保证应用系统的安全。
应用推荐