Dotard, a-dozing at the very nonce.
老糊涂,恰恰在此刻打盹。
Nonce is required to prevent replay attacks.
需要Nonce以防止重播攻击。
There are many ways you can tune the specifics of a nonce test.
有很多方式可以对nonce测试进行细节调优。
Then you require that nonce as one of the fields in form submission.
之后,再在表单提交中要求该nonce作为其中的一个字段。
Next, I need to author the nonce field, which wraps a random number as an integer.
下面,需要生成nonce字段,它包装了一个随机数作为一个整数。
Duke: the prince, sire, swears he'll marry nonce but the girl who fits this slipper.
公爵:陛下,王子发誓说只娶能穿上这只水晶鞋的女孩。
Save the nonce to a DB or some persistent storage to make sure the same one isn't used.
保存到数据库或一些临时的持久性存储,确保同一个不习惯。
By adding a nonce, you can distinguish between the same messages sent more than one time.
通过添加现时标志,就可以对多次发送的相同消息加以区分了。
Typically, the nonce can be implemented as a counter (a sequence number) or as a timestamp.
现时标志通常能实现为计数器(一个序列数)或者时间戳。
One of the text values, the nonce, is a random value generated by the sender for each request.
其中一个文本值为nonce,是由发送者对每个请求生成的随机值。
Development and nonce situation of agricultural tax system and peasants burden were discussed.
分别论述了农业税收体系,农民负担问题的沿革和农民负担的现状。
Web service producers should reject any UsernameToken not using both nonce and creation timestamps.
Web服务生产者应拒绝任何没有同时使用nonce和创建时间戳的UsernameToken。
When used in conjunction with nonce and timestamp checking, this can effectively thwart replay attacks.
将nonce与时间戳检查一起使用时,可以有效地阻止回复攻击。
Use a nonce instead? Save the nonce to a DB or some persistent storage to make sure the same one isn't used.
使用临时代替吗?保存到数据库或一些临时的持久性存储,确保同一个不习惯。
In all cases, you want to be sure that a nonce cannot be reused, otherwise spammers will easily circumvent it.
无论在何种情况下,都要确保nonce不能被重用,否则垃圾信息散布者就会很容易破解它。
In the transformer substation install compensation capacitors, it is mostly form of reactive compensation nonce.
在变电所内加装电容器,是当前无功补偿的主要形式。
Note that a nonce (20010711-0001287634) and the identity of the recipient are added to the order information in the SOAP body.
请注意,现时标志(20010711- 0001287634)和接收方的身份是被添加到SOAP正文部分的订单信息中的。
The paper analyzes and discusses these nonce words in three aspects: ways of formation, rhetoric features and translation strategies.
本文针对该类杜撰词从其构成方式、修辞特点和翻译应对三个方面进行了分析和探讨。
A nonce is a non-repeating string freshly generated by the sender (the signer) such that the intended recipient can check its uniqueness.
现时标志是一个由发送方(签名者)新生成的无重复字符串,这样目标接收方就能检查其唯一性了。
You might want to use the IP address and the date or full time at which the page request was made in order to generate and validate the nonce.
最好是使用IP地址和页面请求发生时的日期或完整时间以便生成和验证此nonce。
Theproblem is that you can't abstract a nonce root from Mubarak, because italready has an honored and traditional one: brk, or "blessing"."Mubarak"
问题在于,穆巴拉克(Mubarak)这个名字无法提炼出一个暂时性的词根,因为这个单词已经是历史悠久,享誉多年:brk,意即“祝福”,“Mubarak”就是“受祝福的”, mubaraka有恭喜、祝福的含义,不一而足。
If the robot goes straight to POSTing the form submission, it will not have loaded the HTML page, and so it will not know the expected value for the nonce.
如果机器人程序径直去POSTing这个表单提交,它将不会完成此html页面的加载,因此也就不会知道此nonce所预期的值。
As described above, it is important for security against repudiation to add both a nonce and the identity of the intended recipient to application data to be signed.
正如上面所描述的那样,对于针对抵赖的安全性来说,在待签名的应用数据中同时加入现时标志和目标接收方的身份是非常重要的。
The Web application USES a nonce (a unique string whose value is valid only for a short time) that is included in the POST as a way to guard against denial-of-service attacks.
Web应用程序使用POST中包含的nonce(值仅在短期内有效的惟一字符串)来防范服务拒绝攻击。
On receiving this signed order, the online-trade server needs to validate the uniqueness of the nonce and check whether its identity is specified as the intended recipient.
一接收到经签名的订单,在线交易服务器就需要确认现时标志的唯一性,并检查其身份是否被指定为目标接收方。
A malicious attacker can still sniff the wire (note that password digest is not encrypted by default) and replay the entire UsernameToken, so nonce and timestamp checking are imperative.
恶意攻击者仍可以探查连接(请注意,缺省情况下密码摘要没有被加密)并回复整个UsernameToken,因此nonce和时间戳检查是缺一不可的。
A malicious attacker can still sniff the wire (note that password digest is not encrypted by default) and replay the entire UsernameToken, so nonce and timestamp checking are imperative.
恶意攻击者仍可以探查连接(请注意,缺省情况下密码摘要没有被加密)并回复整个UsernameToken,因此nonce和时间戳检查是缺一不可的。
应用推荐