In theory, WEP is supposed to make your network secure; in practice, it will only slow down intruders a little bit.
WEP理论上被认为会使您的网络很安全;实际上,它只会略微减缓入侵者的入侵速度。
In order to use the technique of network secure in the environment of distribution network systems, the information secure middleware has been presented.
信息安全中间件是为了在分布式网络应用环境中,提供网络安全技术而提出的。
Reducing the source consume, and prolonging the WSN lifecycle is becoming the chief target of WSN, which was based on the assurance of Network Secure Communication.
在保证网络安全通信的基础上,尽量减少网络的能源消耗、延长网络生命周期已经成为无线传感器网络通信的首要目标。
It is an urgent need for network secure communication to apply Chaos theory to the multimedia signals transmission, and it is one of most advanced and hot research topics internationally.
将混沌学理论应用于多媒体信号的保密通信是网络安全的迫切需要,也是当今世界的前沿课题和研究热点。
This paper describes a method of implementing network secure isolation and data exchange system based on USB, which has been promoted in the network construction of Shanghai E-government network.
该文讨论了一种基于USB实现安全隔离与数据交换的方法,并已经在上海市电子政务中得到了应用。
Using Wi-Fi in a public place such as a hotel, cafe or bar can expose your data to a network which is not secure.
在酒店、咖啡馆或酒吧等公共场所使用Wi-Fi会把你的数据暴露在不安全的网络中。
If it has its own IP address, we can use the access point itself over the network; this is less secure, but more fun to use for a demo.
如果它有自己的IP地址,那么我们就可以在网络上使用接入点本身了;这样做的安全性要差一些,但在用于演示方面会更有趣。
Network and data security can be guaranteed by establishing point-to-point secure connections.
可以通过建立点对点安全连接来保证网络与数据安全性。
However, if it has its own IP address, we can use the access point itself over the network; this is less secure, but more fun to use for a demo.
不过,如果它有自己的IP地址,那么我们就可以在网络上使用接入点本身了;这样做的安全性要差一些,但在用于演示方面会更有趣。
Prior to the latest version of JPPF framework, there was no easy way to integrate JPPF in secure network environments, due to the inherent design of the communication layer.
由于JPPF框架通信层固有的设计,在其最新版本之前尚不存在任何简单的方式得以将JPPF集成到安全的网络环境中。
To be effective, this approach requires that the network link between the requestor and provider be secure and that the subscriber not provide third party access to their certificate.
要提高效率,这种方法要求请求方及提供方之间的网络连接是安全的,并且没有为订阅者提供对他们的证书的第三方访问。
As a new and more secure network becomes widely adopted, the current Internet might end up as the bad neighborhood of cyberspace.
当这种更为安全的新网络被广为采用,现在的互联网可能最终被视作坏的网络空间而终结。
With users' passwords traveling over the network in plain text, you do not meet the requirement for secure authentication.
由于用户密码是在网络上以正文文本格式传输的,因此这并不能满足安全身份验证的需求。
A vulnerability scanner is similar to other types of scanners-for example, port scanners help secure the network and the systems on it.
漏洞扫描器类似于其他类型的扫描器——例如,端口扫描器有助于保障端口上的网络和系统的安全。
The migration also ensures more secure network activities.
迁移工作还确保更安全的网络活动。
The business requirement is for the solution to be secure with no dependency on the network transport.
业务需求就是保护解决方案,使其不依赖于网络传输。
The network USES a secure RF link, protected through exportable encryption for joint and coalition operations.
该网络使用安全RF链路,通过出口加密保护联合作战行动。
Secure network architecture is achieved when all interaction points and data paths traveled are created using double secure keys.
当使用双重安全密钥创建了所有经过的交互点和数据路径时,才能达到安全网络体系结构。
SSH is a powerful and secure network utility that countless users worldwide use for numerous tasks.
SSH是一个强大而安全的网络实用程序,全球有无数用户使用它来完成各种任务。
XIA is similar to the NDN architecture in that both propose to secure data itself rather than the network pathway that the data travel.
与NDN架构类似,XIA建议保护数据本身而不是数据通行的网络路径的安全。
The new architecture is designed to allow a smart card to act as a secure network node, either providing security services to a network or requesting access to network resources.
新架构旨在让智能卡成为安全的网络结点,要么为网络提供安全服务,要么请求访问网络资源。
The system relies on a secure, low-power wireless network that allows the cameras to operate for up to a year on a single lithium-ion battery.
该系统凭借安全、低能耗无线网络可以让摄像头靠一节锂电池用上一年。
A secure and reliable competing network that... reduces retailers' costs would be welcomed news.
一个安全可靠的有竟争力的支付网络并且可以降低零售业的成本,应该是个好消息。
The Thales SONET Datacryptor and lower speed Datacryptors will be deployed to secure the JHITS network.
部署泰利斯公司的同步光纤网数据加密机和更低速率的数据加密机是为了确保JHITS网络的安全。
SSH, or Secure SHell, is a network protocol for remote administration of UNIX computers.
SSH或SecureSHell是用于远程管理UNIX计算机的一个网络协议。
Kerberos, which provides a secure means of authentication for network users, is one of the most popular authentication mechanisms.
Kerberos为网络用户提供了一种安全的身份验证手段,是最流行的身份验证机制之一。
If your heartbeat runs over a secure network, such as the crossover cable in the example, you'll want to use CRC.
如果您的heartbeat运行在一个安全的网络上,比如例子中的交叉线缆,那么应该使用crc。
The solutions in this article can help you perform simple to more advanced and secure network backups using open source tools that are part of nearly every Linux distribution.
本文中的解决方案可以让您使用开源工具执行从简单的到更高级而且安全的网络备份,几乎所有Linux发行版本都包含这些工具。
The solutions in this article can help you perform simple to more advanced and secure network backups using open source tools that are part of nearly every Linux distribution.
本文中的解决方案可以让您使用开源工具执行从简单的到更高级而且安全的网络备份,几乎所有Linux发行版本都包含这些工具。
应用推荐