Now, if we try to sneak in a new employee's computer with an invalid network ID, our application knows not to accept it.
现在,如果我们试图用一个无效的网络ID潜入新员工的计算机,我们的应用程序不会允许。
Users can then access services on other machines that participate in this trusted network without again being prompted for a user ID and password.
用户然后可以访问参与此受信任网络的其他计算机上的服务,而不会再次提示用户ID和密码。
This interactive menu system goes into most areas of systems administration, from changing the maximum number of processes per user ID to changing the speed of a network interface.
这个交互式菜单系统覆盖了系统管理的大多数领域,从修改每个用户ID的最大进程数量直到修改网络接口的速度。
Now, if we try to sneak in a new employee with an invalid network id, our application knows not to accept it.
现在,如果我们试图偷偷在一个新员工中输入一个无效网络ID,应用应该会拒绝它。
Set the IP address and physical network card interface ID for the zone created as shown in Figure 7.
为创建的专区设置IP地址和物理网卡接口id,如图7所示。
Gol021-this level of firmware corrects the vendor device ID on EMC Class B adapters so that the adapter is recognized during AIX Network Installation Management (NIM).
这个固件级别将更正emcClassb适配器的供应商设备ID,以便在AIX网络安装管理(NIM)过程中能够识别该适配器。
If everything went according to plan, you should now be able to attach to the wireless network we just made, network ID "test," run a DHCP client, and get DHCP service from your regular DHCP server.
如果一切按计划进行,那么现在您应该能够连接到我们刚刚建立的无线网络(网络标识为“test”),能够运行DHCP客户机并从常规的DHCP服务器获取DHCP服务。
In the application key field, enter the same value that you specified for application ID in the workflow application in the ERP back-end network (in this case, ZMATCR).
在Applicationkey字段中,输入您刚才在erp后端网络的工作流应用程序中为应用程序id指定的值(在本例中为ZMATCR)。
The network ID partially matches some value with case-sensitivity, or
网络ID使用大小写敏感,部分匹配一些值,或者
Just like we did for the list template, change the code to display the employee's network id.
就象我们为list模板所做的那样,改变代码以显示员工的网络ID。
Similar authentication techniques use the MAC address of the remote host's network card, or any sort of unique ID associated with that machine (such as a Pentium III processor ID, if available).
类似的认证技术使用远程主机网卡的mac地址,或者与该机器关联的任何类型的唯一标识(例如,如果可用,PentiumIII处理器标识)。
For example, the database requires that network IDs not exceed eight characters in length, but we'll also enforce our business rule that a network ID must be no fewer than six characters in length.
如,数据库要求网络ID长度不超过8个字符,但是,我们也会加强我们的业务规则,要求网络ID的长度必须不小于6位字符。
Network solutions will also provide you with id-Names used for worldwide registration and management of domain names. Register your name in over 50 countries online.
Net worksolutions会为你所用的id提供全球的域名注册和管理,在大约50个国家里为你在线注册。
Instead of the current text in the employee Bean column, let's change it to display the employee's network ID.
替换EmployeeBean列的当前文本,改为显示员工的网络ID。
The ID Kaka in London, is the competence of its card holders, operating system functions to depend entirely on the computer network database platform support.
由于ID卡卡内无内容,故其卡片持有者的权限、系统功能操作要完全依赖于计算机网络平台数据库的支持。
To ride of the shortage of the id, we study on the extraction of the features, id method based on fuzzy neural network, and algorithm optimization and so on.
为克服现有入侵检测存在的不足,本文从特征提取、模糊神经网络应用于入侵检测、算法优化等方面进行了系统研究。
This paper introduces commonly used methods of ID Authentication in a campus network and finds a common problem that it is difficult to control access unauthorized within the broadcast domain.
介绍了常见的园区网用户身份认证方法,并指出它们普遍存在的一个问题:在一个广播域内非法接入难以控制。
Aim to identify the id of the speaker in digital voice communication in order to assure the security of information which is transmited in the network.
目的为保证网络信息交互的安全,在数字语音通信中对说话人进行身份认证。
Your location information is based on cell ID positioning, that is, the cellular network recognises the location of your device.
您的位置信息是基于细胞身份证定位,即通过蜂窝网络识别你的设备的位置。
The first defense for the security of information on the network is ID authentication. A practical method of ID authentication is put forward to conquer the abuse of normal remote login mechanism.
网络信息安全的第一道防线是身份认证,文章基于一般远程登录机制的弊端,提出了一种实用的身份认证方法。
The ID analysis methods have two ways: one is anomaly detection and the other is misuse detection. Nowadays, the most popular IDS is network intrusion detection system using misuse detection method.
入侵检测的分析技术主要分为滥用入侵检测和异常入侵检测,目前国内外流行的网络入侵检测系统大都是采用滥用入侵检测技术。
Traditional ID authentication combines a user name and a password, which is not sufficient enough to assure the security of application systems in an environment full of hackers network attacks.
传统的身份认证只是一种用户名和口令的简单组合,在充满黑客和攻击的网络环境下,这种认证方式已经不能充分保证应用系统的安全。
The software allows users to access ID photos and other demographic details from any network connection.
该软件使用户能够从任何连接网络获得身份证照片及其他统计资料。
This is done (a little simplified) by using the worldwide unique id of the network card, combined with the current date and time.
这是通过(简单来说)使用全球唯一的网卡id和当前时间和日期结合来生成的。
This should look be put in these data on public network to review the accredit way that see, if do not need special designation id can be read look to cannot calculate confidential data.
这要看放在公网上这些资料阅看的授权方式了,假如不需要非凡指定的ID就可以阅看就不能算机密资料了。
The data structure of road network is simplified based on the analysis on the features of the embedded system. And by rebuilding object's ID, the efficiency of data processing is improved.
在分析了嵌入式系统特点的基础上,对路网的数据结构进行了简化。
Once the network system security id seriously threatened, or even paralyzed, it will give business, society and even the whole country a huge economic losses.
一旦网络系统安全受到严重威胁,甚至处于瘫痪状态,将会给企业、社会、乃至整个国家带来巨大的经济损失。
Program has been integrated Thunder download network code, only the inside of the ID into your own ID.
程序己集成迅雷下载联盟代码,只需把里面的ID改成你自己的ID。
The unite authentication model this paper studied, which provides a solution to achieve cross-platform support to the ID management in inter-network enterprise applications.
本文研究的联合认证模型提供了一个解决方案,实现了支持跨平台、跨网络的企业级应用中的身份管理。
The unite authentication model this paper studied, which provides a solution to achieve cross-platform support to the ID management in inter-network enterprise applications.
本文研究的联合认证模型提供了一个解决方案,实现了支持跨平台、跨网络的企业级应用中的身份管理。
应用推荐