• Finally, some ideas on how to properly secure yourself and your systems from the possibility of a password cracking attack were offered.

    最后,提供有关如何适当保护您自己系统避免可能受到密码破解攻击一些想法

    youdao

  • Business partners do not need to set up IDs and passwords for users, nor do the partners need to maintain these password systems.

    业务合作伙伴并不需要用户设置ID密码,合作伙伴不需要维护这些密码系统。

    youdao

  • The application providers had unique id and password schemes for each of their systems, which caused IBM employees to still require multiple IDs and passwords in order to access their applications.

    应用程序提供者对于每个系统采用独有ID密码方案从而导致IBM员工仍然需要使用多个ID密码才能访问他们的网站。

    youdao

  • The user can use the same service ticket for accessing other AIX client systems without having to re-enter the password.

    用户可以使用同一个服务票据访问其他AIX客户机系统而不需要重新输入密码。

    youdao

  • This attack USES password cracking to penetrate the systems that the attacker wants to deface.

    攻击使用密码破解渗透攻击破坏系统

    youdao

  • Password management. Enables users to have a single set of credentials to sign on to the company information systems.

    密码管理—使用户能够凭证登录公司信息系统。

    youdao

  • When WI was first released, there were already many user ID and password systems.

    WI首次发布时已经存在很多用户ID密码系统

    youdao

  • A password policy is put in place to ensure the systems that users access are secure.

    密码策略用来确保用户访问系统安全性

    youdao

  • After logging in with your root password, you can validate the managed systems.

    使用root密码登录之后,可以托管的系统进行验证

    youdao

  • Some applications already had ID and password systems set up before IIPx.

    有些应用程序在采用IIPx已经具有ID密码系统

    youdao

  • Connection documents contain the information necessary to connect to external systems, such as user and password information.

    Connection文档包含连接外部系统必要信息比如用户名密码信息。

    youdao

  • Requesting access to each discovered system by providing an administrator user id and password that Director will use to authenticate to the systems in the future.

    请求访问发现每个系统,这要提供Director用来执行系统身份验证管理员用户ID密码

    youdao

  • In most cases on modern systems, though, the password is stored in an encrypted Samba-only password database.

    现在系统大多数情况下密码存储于仅samba加密的密码数据库中。

    youdao

  • There are various authentication methods in UNIX systems, like password-based authentication, authentication using smart CARDS, authentication based on biometric technology, and more being practiced.

    UNIX系统中,多种身份验证方法比如基于密码的身份验证、使用智能卡的身份验证、基于生物检测技术的身份验证等等。

    youdao

  • Do you have established password controls for your automated systems?

    自动系统是否密码控制

    youdao

  • You would have to augment this example for production use, as most computer systems require a letter for the first character of a password.

    也许正式使用这个例子之前扩展一下这个例子,因为大多数计算机系统要求密码第一字符字母

    youdao

  • At present, people adopt a large amount of network authentication systems based on password or digital certificate.

    目前人们大量采用基于密码数字证书认证系统

    youdao

  • Before using most information systems in the computers or the networks, the users must obtain relevant authorizations which always have time limit, such as entry password.

    计算机网络中的一些信息系统需要获得一定授权才能使用,而且很多授权有一定的使用期限例如登录口令。

    youdao

  • Assign the function for the password attestation and legal powers that other systems provided the employee to register at the same time.

    同时其它系统提供员工登录密码认证权限分配功能

    youdao

  • Automated systems must use individually assigned accounts that require a periodic change of password.

    自动化系统必须使用需要定期更换口令个人担保账户

    youdao

  • The existing single sign-on systems are usually not easy to be deployed, and they have a limitation in password security protection.

    现有登录系统通常存在部署开销大、口令安全性保护不足等问题。

    youdao

  • The password is a kind of protection means of the computer systems has been applied extensively.

    口令作为保护手段被广泛应用于计算机系统

    youdao

  • You may not attempt to gain unauthorized access to any KOE site or service, computer systems or networks connected to any KOE site or service, through hacking, password mining or any other means.

    不得试图以以“黑客行径、破译密码其他方法非法进入任何超越网站使用服务或连接有关计算机系统网络

    youdao

  • You may not attempt to gain unauthorized access to any KOE site or service, computer systems or networks connected to any KOE site or service, through hacking, password mining or any other means.

    不得试图以“黑客行径、破译密码其他方法非法进入任何超越网站使用服务、或连接有关计算机系统网络

    youdao

  • On the basis of the introduction of the working principle of dynamic password card, the scheme of realizing dynamic password card by embedded systems is studied. And th

    介绍动态口令工作原理基础研究了嵌入式系统实现动态口令卡实施方案,并进一步介绍了该方案的硬件、软件的实现方法及技术难点。

    youdao

  • A smart card based on remote access password authentication scheme is given, which can verify a log-in password without verification table. It utilizes the signature property of public key systems.

    给出了一个基于智能卡远程访问口令认证方案能够登录口令进行检验而不需要检索口令

    youdao

  • Traditional ID authentication combines a user name and a password, which is not sufficient enough to assure the security of application systems in an environment full of hackers network attacks.

    传统身份认证只是一种用户口令的简单组合充满黑客和攻击网络环境下这种认证方式已经不能充分保证应用系统安全

    youdao

  • Traditional ID authentication combines a user name and a password, which is not sufficient enough to assure the security of application systems in an environment full of hackers network attacks.

    传统身份认证只是一种用户口令的简单组合充满黑客和攻击网络环境下这种认证方式已经不能充分保证应用系统安全

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定