• When the application system is authorized to access sensitive data, but was left behind by the developer, the database encryption system does not recognize this backdoor and to stop.

    应用系统被授权访问敏感数据但是开发者留有后门时,数据库加密系统不能识别这种后门加以阻止

    youdao

  • Integrity and legitimate accessing of data will receive security threat in many ways, including password strategy, system backdoor, database operating and safety plan of itself.

    数据完整性合法存取受到很多方面安全威胁包括密码策略系统后门数据库操作以及本身安全方案

    youdao

  • This backdoor virus allows attackers to access your computer, stealing passwords and personal data.

    这个后门病毒运行攻击访问计算机窃取密码个人数据。

    youdao

  • This backdoor virus allows attackers to access your computer, stealing passwords and personal data.

    这个后门病毒运行攻击访问计算机窃取密码个人数据。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定