我们使用安全技术和程序来保护个人资料,以防止未经授权的资料存取、使用或公开。
We use a variety of security technologies and procedures to help protect your personal information from unauthorized access, use, or disclosure.
下次,当我们想在提供免费WiFi网络的公共场所使用笔记本电脑或智能手机时,请三思而后行或者在使用之前采取安全措施。
Next time, when we want to use our laptops or our smartphones in public places which offer free WiFi networks, please think it twice or take safe measures before using them.
根据我们的安全惯例,停止使用那些产品是正确的。
Those products have rightly been stopped in accordance with our safety routines.
如果它有自己的IP地址,那么我们就可以在网络上使用接入点本身了;这样做的安全性要差一些,但在用于演示方面会更有趣。
If it has its own IP address, we can use the access point itself over the network; this is less secure, but more fun to use for a demo.
为了安全,您只能使用我们的新篮子。
安全起见,研究人员建议,我们应该比以前更少使用电脑,或者在睡觉前尽可能地把屏幕亮度调低。
To be on the safe side, the researchers suggest that we should use computers less than before, or turn down our screens as much as possible before sleeping.
为了安全起见,我们开始使用呼吸器和手套将它们分批装袋。
We are starting to unbag them in batches, using respirators and gloves, for safety.
清单10提供了我们在这个安全领域中使用的一些密码以及它们的摘要。
Listing 10 provides some of the passwords we use in this security realm and their digests.
在此示例中,我们将配置与本地操作系统用户注册表一起使用的安全设置。
In this sample, we will configure the security for use with the Local OS user registry.
它为我们提供了一个不用管理的、安全的、复制的存储,我们可以使用它来灵活地将应用程序数据部署到很多不同的客户机和设备上。
It provides us with a no-administration, secure, replicated store that we can use to deploy application data flexibly, to many different kinds of clients and devices.
我们使用其保证数据的安全,尤其是传输或存储数据时,以及在数据容易被窥探的时候。
We use them to keep data safe, especially when transferring or storing data, times when data is particularly susceptible to prying eyes.
假如我们的隐私是安全的,那么没有借口在打击犯罪中不使用科技手段。
Provided our privacy remains secure, there is no excuse not to use every bit of science we can in the fight against crime.
以这种方式进行擦除在类型系统中引入了缺陷,这些缺陷限制我们使用泛型类型的安全性。
Erasing in this manner introduces holes in the type system that limit how we can safely use generic types.
我们使用尖端技术(生物统计、移动银行)来确保账户安全,并且接近人们生活工作的地方。
We use cutting-edge technology (biometrics, mobile Banks) to ensure accounts are secure and accessible where people live and work.
很多研究与事实告诉我们,这些年以来我们家里购买的以及正在使用的商品并不像我们想的那么安全可靠。
We are now being alerted through research and case studies that many items we have bought and used in our homes over the years are not as safe as we may once have thought.
在本文后面,我们将使用更安全的方法,不仅修改端口号,而且完全隐藏它。
Further along in the article, you'll use even safer methods to not only change the port number but to completely hide it.
由于安全的原因,我们建议不要使用实例所有者帐户作为fenced用户帐户。
For security reasons, we recommend that you do not use the instance owner account for the fenced user account.
我们使用security - constraint标记配置资源集合的安全权限。
We use the security-constraint tag to configure security permissions for resource collections.
我们使用SSH是因为它支持安全加密地访问远程Linux服务器,以及支持访问单一应用程序数据库。
We used SSH because it provides secure encrypted access to a remote Linux server, which provides access to a single application database.
我们让该参数为null,这样允许JSSE使用缺省的—并且安全的!
We'll leave this parameter null, allowing JSSE to use the default — and secure!
我们考察了三种安全方法,以及如何在php中使用它们?
We'll look at three approaches to security, and how we can use them from PHP.
我们接着使用它将安全上下文传播到在AppServerRemoteNode上运行的示例应用程序。
This in turn enabled us to propagate the security context to the example application running on AppServerRemoteNode.
答:我们强烈建议所有的WebSphereApplicationServer用户使用全局安全。
Answer: we strongly recommend that all WebSphere Application Server users enable global security.
我们能够明确配置ubuntu确保儿童使用计算机的安全。
We can definitely configure Ubuntu to make the computer a safer tool for our children to use.
我们使用以下安全性配置运行各测试。
The tests were run using each of the following security configurations.
在我们的示例中,人工任务没有使用安全性,并允许任何人请求或执行任务。
In our example, the human task does not use security and allows anyone to claim or work on the task.
共同的思路是我们为消息传递实现的安全模型需要与我们使用消息传递的方式保持同步。
The common thread is that the security models we implement for messaging need to keep pace with the ways in which we use messaging.
这些工具帮助用户利用我们在内部使用多年的工具,编写自己的安全和高质量的托管代码或原生代码。
This helped customers write secure and quality code for managed and native platforms using the same tools that we had been using internally for years.
通过使用机密性,我们可以确保没有人能够读取在非安全的通信隧道上传输的消息。
By using Confidentiality we can make sure that nobody can read the message that is sent over insecure communication channels.
通过使用机密性,我们可以确保没有人能够读取在非安全的通信隧道上传输的消息。
By using Confidentiality we can make sure that nobody can read the message that is sent over insecure communication channels.
应用推荐