根据国际标准提出了一种基于现货供应商品的二取二安全计算机方案。
According to international standards, a safety computer system with two out of two configuration based on Commercial-Off-The-Shelf is put forward.
分布式异构三取二安全控制单元以传统三取二安全计算机为基础,采用容错设计,具有高安全性,高可靠性的特点。
Distributed heterogeneous TMR (Triple Modular Redundancy) safety control unit, which is based on traditional TMR safety computer, has the character of high security and high reliability.
防止这种类型的欺诈不是一件容易的事,一个新的计算机科学领域正在发展以应对安全问题。
The prevention of this type of fraud is no easy task, and a new field of computer science is developing to cope with security issues.
然而我们要认识到,这种攻击并不仅仅存在于计算机和数字安全领域。
Realize, though, that this attack is not reserved strictly for the realm of computer and digital security.
用户可访问安全门户来检查其计算机,扫描的结果可以在门户上获得,也可以通过电子邮件获得。
Users access the security portal to check their computers, and they get the results either on the portal or through email.
尽管有了所有这些努力,但真正的限制计算机安全可能是人类的本性。
For all those efforts, though, the real limits to computer security may lie in human nature.
简介:由于黑客攻击最近在新闻中屡有报导,我们都知道需要认真地对待计算机安全问题。
Summary: With hacker attacks in the news frequently these days, we all know that computer security needs to be taken seriously.
由于僵尸网络的存在把世界上一些最好的计算机安全专家聚到一起来阻止其带来的潜在破坏。
The existence of the botnet has brought together some of the world’s best computer security experts to prevent potential damage.
一份计算机安全研究协会2007年的调查发现,有50%的受访者在过去的一年里有笔记本电脑或其他移动设备被偷。
A 2007 survey by the Computer Security Institute found that 50 percent of respondents had a laptop or other mobile device sto-len in the past year.
通过观念和信息的分享来为计算机安全领域的进步打下基础。
It serves as the foundation for the improvement of computer security worldwide by sharing goals, ideas, and information.
“匿名”随后发现,巴尔与他的一些同事竟然犯了计算机安全的大忌:对多个账号使用相同密码。
Barr and some of his colleagues, Anonymous then discovered, had committed computer security's biggest sin: They used the same password on multiple accounts.
安全软件能使远程计算机被“锁定”,以免考生开启未经批准的窗口。
Remote computers are "locked down" with security software, to prevent unauthorised Windows from being opened.
这家芯片制造企业支付了60%的溢价,表明了对计算机安全的重要性增强,也助长了与这些业务相关交易的投机。
The chipmaker paid a 60 percent premium, underscoring the growing importance of computer security and fueling speculation that related deals may be in the works.
在其苏黎世研究实验室,来自20多个国家的约300位科学家主攻微电子学、纳米技术和计算机安全等领域。
At its Zurich Research Laboratory around 300 scientists representing over 20 nationalities concentrate on areas such as microelectronics, nanotechnology and computer security.
这是一个虚构的故事,然而在我的系统管理员/计算机安全生涯中,这些事情却的的确确地发生过。
This is a fictional account, yet just about everything that happens in it is something I've seen take place at one time or another during my sysadmin/computer security career.
同时还数据对进行了分门别类的管理,类别有销售、安全、计算机、因特网、通信、金融管理和培训等,每个分类又有进一步的子分类。
Data is organized in a number of categories - Sales, Security, Computer, Internet, Communication, Financial Management, Training, etc. -, each category being further organized in sub-categories.
是的,我认为美国、英国以及其他大部分西方国家搞信息安全的目的是为了保护计算机和通信网络。
Yes. I think the way that the United States, the United Kingdom, and most other Western countries use it is for defense of computers and communications networks.
我们建议,在造访地球前请您先给自己的网路设上密码,并且请安装使用人类的安全软件以预防计算机攻击。
We advise protecting your network with passwords and generally adopting humanity's own security measures against any computer-based attacks before visiting Earth.
我早期对计算机安全的兴趣实际上激发了我对计算机科学的最初兴趣,并且从那时起就一直是我关注的焦点。
My early interest in system security is actually what sparked my initial interest in computer science and has been a focus of mine ever since.
许多资深的计算机安全研究人员认为这种战略是“外硬内软”。
“Hard on the outside, with a soft chewy center, ” is the way many veteran computer security researchers think of such strategies.
他们设计了一个系统用来测试计算机的安全网络,在这个系统中,计算机将会模拟人类的各种错误行动,正是这些导致了网络的脆弱。
They have created a system for testing computer-security networks by making computers themselves simulate the sorts of human error that leave networks vulnerable.
1月28日Kerviel就滥用职权、违反计算机安全条例及伪造文件开始接受正式调查。
On January 28th Mr Kerviel was placed under formal investigation for abuse of trust, breaching computer security and falsifying documents.
“神经装置正以极快的速度进行革新,未来前景巨大,”华盛顿大学的计算机安全专家TadayoshiKohno说。
“Neural devices are innovating at an extremely rapid rate and hold tremendous promise for the future,” said computer security expert Tadayoshi Kohno of the University of Washington.
计算机安全技术公司McAfee已经发布了最新的恶意网站地图报告。
McAfee, the computer security company, has released its latest "Mapping the Mal Web" report.
我们能够明确配置ubuntu确保儿童使用计算机的安全。
We can definitely configure Ubuntu to make the computer a safer tool for our children to use.
出于安全考虑,请确保不能从远程计算机执行管理活动。
Ensure that administrative activities can not be performed from remote machines, for security reasons.
网络防御的另外一个重要的方面是提高计算机自身的安全性。
Another important component of cyber defense is to improve security on the computers themselves.
一些电脑安全专家建议,确保计算机安全的最好方法是编写出一种不那么容易被病毒,蠕虫及其他黑客伎俩破环的软件。
Some computer security experts propose that the best way to ensure computer security is to write software that isn't easily breached by viruses, worms and other hacker tricks.
然而计算机安全研究人员这周说他们对作者的多产印象深刻。
Security researchers, however, said this week that they were impressed by the authors' productivity.
然而计算机安全研究人员这周说他们对作者的多产印象深刻。
Security researchers, however, said this week that they were impressed by the authors' productivity.
应用推荐