而对于黑客或欺诈者防止未经授权的访问也是挑战。
It is also the challenge of preventing unauthorized access from hackers and fraudsters.
在不使用时,应锁好车门,以避免未经授权的访问。
When not in use, doors should be locked to avoid unauthorized access.
于节目的访问可以使用密码,以防止未经授权的访问受到限制。
The access to the program can be restricted with a password in order to prevent unauthorized access.
authorize方法设计用于保护服务层中的方法免受未经授权的访问。
The authorize methods are designed to protect the methods in a service layer from unauthorized access.
未经授权的访问——获得对Web服务或其数据的未经授权的访问。
Unauthorized access — Gaining unauthorized access to a Web service or its data.
这有助于确保您的财务信息是受保护的网站通过另一个阻止未经授权的访问。
This can help to ensure your financial information is protected and blocked from unauthorised access via another website.
如果机器左侧分钟闲置超过20时,系统会自动登出,以防止任何未经授权的访问。
If the machine is left idle for more than 20 minutes, the system will automatically logoff itself to prevent any unauthorised access.
为了帮助保护您的帐户对未经授权的访问,我们可能需要另一种方法来验证您的身份。
To help protect your account against unauthorized access, we may need an alternate way to verify your identity.
因此类未经授权的访问或变更导致您可能直接或间接遭受或发生损失的,我们不承担责任。
We will not be liable for any losses that you may suffer or incur directly or indirectly as a result of such unauthorised access or alteration.
除了认证问题外,能够对数据库服务器的安全形成威胁的还包括对敏感信息未经授权的访问。
In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.
这些专业人员专门处理安全问题,能够提供不同寻常的建议来保护数据避免未经授权的访问。
Dedicated to security matters, these professionals can offer unconventional advice for securing data from unauthorized access.
该方案可确保您的机密数据全面的数据安全上的USB闪存驱动器和未经授权的访问保护他们。
The program ensures comprehensive data security of your confidential data on your USB flash drives and protects them from unauthorized access.
我们使用各种制度、安全技术和程序等措施来保护您的个人信息不被未经授权的访问、使用或泄漏。
We use a variety of systems and security technologies and procedures to protect your personal information from unauthorized access, use or disclosure.
现在你可以收集你的重要和秘密保存在一个隐藏的内容使用密码来限制未经授权的访问被锁定,所有。
Now you can collect all of your important and secret content in a hidden depository, locked with a password to restrict it from unauthorized access.
不幸的是,它们的可移植性也使得它们容易受到未经授权的访问,而这又使得它们不能安全敏感文件存储。
Unfortunately, their portability also makes them vulnerable against unauthorized access, which in turn makes them unsafe for sensitive file storage.
安全设置无法应用到文件夹。为了防止对此文件夹进行未经授权的访问,您应该手动验证此文件夹的安全设置。
Security settings could not be applied to the folder. To prevent unauthorized access to the folder, you should manually verify the security settings for the folder.
我们已为合理的保护您 的个人信息,以使其免于意外损失或未经授权的访问,使用,修改或披露而实施措施。
We have implemented measures designed to reasonably secure your personal information from accidental loss and from unauthorized access, use, alteration and disclosure.
而在最后一层则可执行那些用来防止未经授权的访问点以及其它无线设备配置的MAC地址过滤和基站发现策略。
MAC address filtering and base station discovery policies that prevent the deployment of unauthorized access points and other wireless devices can be enforced at the final layer.
因此,EFS可以解决未经授权的访问和因便携式设备的失窃或网络传输中的明文数据被截获而引发的泄密等问题。
Therefore EFS will be able to avoid unauthorized access and letting out secret information with portable equipments being stolen or plain data of network transmission being intercepted.
更准确地说,安全性是一个过程,它应用多种技术来防止未经授权的用户(通常称为入侵者)对内容进行未经授权的访问。
More precisely, security is the process of applying various techniques to prevent unauthorized parties, known as intruders, from gaining unauthorized access.
此外,我们雇佣了保安和使用了电子安全多项措施,以防止在未经授权下访问用户的信息。
In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.
缺点在于,如果联合被破坏,很少有防护措施来防止未经授权的用户获得对受控信息的访问。
The disadvantage is that if the federation is corrupted, few safeguards prevent an unauthorized user from gaining access to controlled information.
这可确保用户无法访问未经授权的数据。
数据篡改——利用访问控制机制中允许攻击者对Web服务进行未经授权调用的弱点来更改数据。
Data tampering — Exploiting weakness in the access control mechanism that permits the attacker to make unauthorized calls to the Web service to alter data.
很多邮件欺诈会挟持邮件账户,进行远程访问,Gmail的新功能就是为解决这个问题:未经授权的远程访问。
Many of these email scams involve a hijacked account being remotely accessed and Gmail's new feature addresses specifically that - remote unauthorized access.
美军这才意识到他们得保护usb硬盘的数据安全,找出能够跟踪这些设备的方法,并且确保重要信息不被未经授权的员工访问。
The US Army realized they had to secure USB drives, find a way to keep track of the devices, and ensure that the information could not be accessed by unauthorized personnel.
小心请不要在生产环境中使用此过程允许未经授权的用户访问用户数据。这样做可能会违反贵公司的隐私和安全政策。
Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.
小心请不要在生产环境中使用此过程允许未经授权的用户访问用户数据。这样做可能会违反贵公司的隐私和安全政策。
Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.
应用推荐