即使用户采用公共密钥或基于主机的身份验证,也会执行这个密码检查。
This password check is done even if the user is following the public key or host-based authentication.
通过扩展PasswordHandler接口,开发人员可以创建一个类来实现密码检查逻辑。
By extending the PasswordHandler interface, a developer can create a class to implement the password-checking logic.
清单4显示为对一个用户的项目目录进行密码检查向httpd . conf增加的代码,而不是将其放入一个. htaccess文件并依赖于AllowOverrides。
Listing 4 shows the additions to httpd.conf to enable password checking for a user's project directory, rather than putting in a.htaccess file and relying on AllowOverrides.
无意义介导的衰变检查是否存在过早的无意义密码子。
Nonsense-mediated decay checks for the presence of premature nonsense codons.
您需要为这个方法传入三个参数,即ID文件、密码和用于检查更改的服务器。
You pass to this method the ID file, password, and server on which to check for changes.
例如,如果您开发用于检查系统运行状况的监视脚本,并且必须用该脚本在本地保存用户ID和密码,则应该使用具有监视人员角色的ID。
For example, if you develop monitoring scripts that check for system health and have to store the user ID and password locally with the script, use an ID with the monitor role.
在这里,它只是针对固定值检查提供的用户名和密码,但它可以轻松使用一个数据库查询或其他机制替代。
In this case, it just checks the supplied username and password against fixed values, but it could easily use a database lookup or other mechanism instead.
更明确地说,SSH是一种更安全的工具,不以明文传输密码,并且执行更加健壮的检查,以确保客户机不是在欺骗它们的主机名。
More specifically, SSH is a more secure utility that does not transmit passwords in clear text, and performs much more robust checks to ensure that clients are not spoofing their hostname.
清单6将添加第一个基本的击键力度相关的检查子例程:密码输入总时间。
Listing 6 adds subroutines for the first basic keystroke dynamics-related check: total time of password entry.
如果用户并未提交用户名或密码,则脚本会把最初的实例返回给登录页面,但是如果有了这些信息,则通过数据库检查它们。
If the user hasn't submitted a username or password, the script simply returns the original instance to the login page, but if the information is there, check it against the database.
当用户登录并输入用户名和密码时,会检查这些文件。
These files are checked when a user logs in and enters a username and password.
在经过简单的检查确保两个密码长度相等之后,将在整个密码中匹配各个键——例如,确保两个密码中的第五个字符是零。
After a simple check to ensure the two passwords are of equal length, each key is then matched in the entire password - ensuring that the fifth character is a zero in both passwords, for example.
默认的身份验证器仅仅检查用户名和密码是否相同。
The default authenticator simply verifies that the username and password are identical.
检查用户ID和密码,并进行相应的修改。
运行的时候,TAI检查密码,通过用户注册中心验证密码是否属于信任用户。
At run time, the TAI examines the password and validates with the user registry that the password belongs to the trusted user.
对于High、Medium和Low安全级别,检查密码、用户和组定义。
Checking password, user, and group definitions for High, Medium, and Low security levels.
检查中sample . zip所有小写6个字符的密码(aaaaaa…abaaba…ghfgrg…zzzzzz)加密的文件。
Checks the encrypted files in sample.zip for all lowercase 6 character passwords (aaaaaa... abaaba... GHFGRG... ZZZZZZ).
最初,表单只是检查用户名和密码,如果正确无误则创建一个loginToken。
Originally, it simply checked the username and password and created a loginToken if they were correct.
因此,如果您自己管理安全设置(例如通过编辑文件、设置密码规则等等),那么AIXPert安全检查不起作用。
So, if you've started locking down security yourself-for example, by editing files, setting password rules, and so on-the AIXPert security check won't work.
清单7显示了 hasNonPrintable子例程,它可以针对 @nonPrintable数组中的一个预期前缀检查密码。
Listing 7 shows the hasNonPrintable subroutine used to check a password for one of the expected prefixes in the @nonPrintable array.
我要做的只是了解如何使用ActiveDirectoryServer检查用户名和密码,创建一个类来扩展这个接口,并添加执行身份验证的代码。
All I had to do was find out how to check the username and password using Active Directory Server, create a class to extend this interface, and add the code to perform the authentication.
它从前面生成的passfile文件读取用户名和密码,然后通过检查 /etc/passwd 确认这是有效的账户。
It reads the user and password from the file passfile, (generated earlier in this demonstration) it then checks this is a valid account by checking /etc/passwd.
对root密码的更严格的检查。
在设置为“Yes”时,在允许用户登录之前,它检查用户的密码是否已经过期。
When it is set to "Yes," it checks whether the password is expired for that user before allowing the user to log in.
示例4:检查userid和密码以确保策略遵从性。
Example 4: Check userids and passwords for policy compliance.
注册新用户时,Web服务器当然会首先检查缓存,然后发出一条包含了用户名和散列密码的消息registerusermessage。
When registering a new user, the web server would of course first check its cache, and then send a RegisterUserMessage that contained the username and the hashed password.
j_username指定请求安全检查的用户的用户名,j _ password指定密码。
J_username specifies the username of the user requesting a security check, and j_password is the password.
在检查确保已经指定了XWindowID之后,将为密码输入总时间和键事件输入时间设置一些变量。
After checking to make sure an X Window ID has been specified, some variables are set up for times between the total password entry and the between key event entry.
LogonCmd调用VerifyCredentialsCmd任务,向它传递登录ID和密码,并检查该询问信息是否有效。
The LogonCmd calls the VerifyCredentialsCmd task passing it the logon id and logon password, which checks to see if the challenge information is valid.
恶意攻击者仍可以探查连接(请注意,缺省情况下密码摘要没有被加密)并回复整个UsernameToken,因此nonce和时间戳检查是缺一不可的。
A malicious attacker can still sniff the wire (note that password digest is not encrypted by default) and replay the entire UsernameToken, so nonce and timestamp checking are imperative.
应用推荐