检查密码的传入连接现在是可选的。
Checking of passwords for incoming connections is now optional.
只有当用户登录到CM时才需要检查密码。
也许程序会检查密码以认证用户,或者对数据加密以将它隐藏等等。
Perhaps the program checks passwords to authenticate users, or encrypts data to keep it hidden, and so on.
对于High、Medium和Low安全级别,检查密码、用户和组定义。
Checking password, user, and group definitions for High, Medium, and Low security levels.
运行的时候,TAI检查密码,通过用户注册中心验证密码是否属于信任用户。
At run time, the TAI examines the password and validates with the user registry that the password belongs to the trusted user.
在检查密码时,会对比用户提供的密码的散列签名和数据库中存储的签名。
Password validation is done by comparing the hash signatures of the password provided by the user with the signature stored in the database.
例如,当一个用户登录时,我们根据存储在数据库中的密码和用户标识副本检查密码和用户标识。
For example, when a user logs on we check the password and userid against a stored copy in our database.
而且通过检查持有密码区的页面,当用户提交它们的信息时,我们同样可以检查密码数据将被发送到哪里。
Besides checking the page hosting the password field, we can also check where password data is going to be sent when users submit their information.
清单7显示了 hasNonPrintable子例程,它可以针对 @nonPrintable数组中的一个预期前缀检查密码。
Listing 7 shows the hasNonPrintable subroutine used to check a password for one of the expected prefixes in the @nonPrintable array.
GoogleChrome阻拦了这种狡猾的攻击,再一次使用same - origin策略,检查密码数据被提交到哪个页面。
Google Chrome defends against this subtle attack by checking the page to which the password data is submitted, once again using the same-origin policy.
无意义介导的衰变检查是否存在过早的无意义密码子。
Nonsense-mediated decay checks for the presence of premature nonsense codons.
您需要为这个方法传入三个参数,即ID文件、密码和用于检查更改的服务器。
You pass to this method the ID file, password, and server on which to check for changes.
例如,如果您开发用于检查系统运行状况的监视脚本,并且必须用该脚本在本地保存用户ID和密码,则应该使用具有监视人员角色的ID。
For example, if you develop monitoring scripts that check for system health and have to store the user ID and password locally with the script, use an ID with the monitor role.
在这里,它只是针对固定值检查提供的用户名和密码,但它可以轻松使用一个数据库查询或其他机制替代。
In this case, it just checks the supplied username and password against fixed values, but it could easily use a database lookup or other mechanism instead.
更明确地说,SSH是一种更安全的工具,不以明文传输密码,并且执行更加健壮的检查,以确保客户机不是在欺骗它们的主机名。
More specifically, SSH is a more secure utility that does not transmit passwords in clear text, and performs much more robust checks to ensure that clients are not spoofing their hostname.
即使用户采用公共密钥或基于主机的身份验证,也会执行这个密码检查。
This password check is done even if the user is following the public key or host-based authentication.
清单6将添加第一个基本的击键力度相关的检查子例程:密码输入总时间。
Listing 6 adds subroutines for the first basic keystroke dynamics-related check: total time of password entry.
当用户登录并输入用户名和密码时,会检查这些文件。
These files are checked when a user logs in and enters a username and password.
在经过简单的检查确保两个密码长度相等之后,将在整个密码中匹配各个键——例如,确保两个密码中的第五个字符是零。
After a simple check to ensure the two passwords are of equal length, each key is then matched in the entire password - ensuring that the fifth character is a zero in both passwords, for example.
默认的身份验证器仅仅检查用户名和密码是否相同。
The default authenticator simply verifies that the username and password are identical.
检查用户ID和密码,并进行相应的修改。
清单4显示为对一个用户的项目目录进行密码检查向httpd . conf增加的代码,而不是将其放入一个. htaccess文件并依赖于AllowOverrides。
Listing 4 shows the additions to httpd.conf to enable password checking for a user's project directory, rather than putting in a.htaccess file and relying on AllowOverrides.
检查中sample . zip所有小写6个字符的密码(aaaaaa…abaaba…ghfgrg…zzzzzz)加密的文件。
Checks the encrypted files in sample.zip for all lowercase 6 character passwords (aaaaaa... abaaba... GHFGRG... ZZZZZZ).
最初,表单只是检查用户名和密码,如果正确无误则创建一个loginToken。
Originally, it simply checked the username and password and created a loginToken if they were correct.
因此,如果您自己管理安全设置(例如通过编辑文件、设置密码规则等等),那么AIXPert安全检查不起作用。
So, if you've started locking down security yourself-for example, by editing files, setting password rules, and so on-the AIXPert security check won't work.
我要做的只是了解如何使用ActiveDirectoryServer检查用户名和密码,创建一个类来扩展这个接口,并添加执行身份验证的代码。
All I had to do was find out how to check the username and password using Active Directory Server, create a class to extend this interface, and add the code to perform the authentication.
它从前面生成的passfile文件读取用户名和密码,然后通过检查 /etc/passwd 确认这是有效的账户。
It reads the user and password from the file passfile, (generated earlier in this demonstration) it then checks this is a valid account by checking /etc/passwd.
对root密码的更严格的检查。
在设置为“Yes”时,在允许用户登录之前,它检查用户的密码是否已经过期。
When it is set to "Yes," it checks whether the password is expired for that user before allowing the user to log in.
示例4:检查userid和密码以确保策略遵从性。
Example 4: Check userids and passwords for policy compliance.
应用推荐