They should also consider two-part authentication, which can combine passwords with a security key with a changing code.
他们还应该考虑双重认证,用不断变化的代码将口令与安全键码结合起来。
Retrieves a security token that matches one of the security key identifier clauses contained within the specified key identifier.
检索与指定的密钥标识符中包含的安全密钥标识符子句之一相匹配的安全令牌。
To study the cryptosystem suitable to encrypt data, to implement digital signature and identify authentication on the USB Security key.
主要研究内容如下:(1)研究适于usb安全钥上实现数据加密、数字签名和身份认证功能的密码体制。
Instead, the drives automatically generate a new security key when they start up, then wipe that key as soon as they are powered down or disconnected.
取而代之的,在驱动器启动时自动产生一个新的安全密钥,而驱动器断电或终止链接时密钥就会被删除。
Gets a security key identifier clause that references this security token when this security token is included in the SOAP message in which it is referenced.
获取当此安全令牌包含在引用它的SOAP消息内时引用此安全令牌的安全密钥标识符子句。
To allow for ease of use, wireless Hosted Network also supports the concept of a secondary or user security key that is more user-friendly, but could be less secure.
为了便于使用,无线承载网络还支持“第二密钥”,也称作“用户安全密钥”,使用起来更加友好,但是安全性稍差。
Gets a security key identifier clause that references this security token when this security token is not included in the SOAP message in which it is referenced.
获取当此安全令牌未包含在引用它的SOAP消息内时引用此安全令牌的安全密钥标识符子句。
This paper discussed the basic technique of setting security key and produced group security key to anti-copy and dynamic reading security key to anti digital simulation.
对软件加密解密基本技术和方法分析的基础上 ,提出组合加密防拷贝 ,动态密钥读取防仿真两种方法。
In downtown Vancouver, some roads are already closed, and rings of security fencing surround some key venues.
在温哥华市中心,一些道路已经关闭,一些主要场所周围设置了安全围栏。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
One report suggests he was in charge of several road checkpoints around the capital, which were a key part of security defences.
一份报道显示,他负责首都周围几个道路检查点的安全,这是安全防御的关键部分。
This feature enables these key security technologies to exploit the hardware cryptographic acceleration facility provided by the ACF.
此特性让这三种关键的安全技术能够利用 ACF提供的硬件密码计算加速设施。
In our previous column, we discussed software security analysis at a high level, introduced a methodology for assessing software security, and explained the key characteristics of a risk analysis.
在上一专栏中,我们从较高层次讨论了软体安全性的分析,介绍了软体安全性的方法,并且说明了风险分析的关键特性。
Understanding the answer to that question is the key to building meaningful security using SSL.
理解该问题答案的关键是使用SSL构建有意义安全性的关键。
"Public education is key," Daniel J. Kaniewski, a security expert at George Washington University, said in an interview.
“公众教育是关键,”乔治华盛顿大学安全专家丹尼尔·j·凯涅维斯基在接受采访时说。
An application security posture questionnaire, a detailed worksheet that helps extract key information about the security posture of off-the-shelf software.
一个应用软件安全情况的调查问卷表,是一个详细的工作表,可以帮助解析出架下的安全性情况的关键信息。
Keystore is a key repository that contains EFS security information.
密钥存储库是包含EFS安全信息的密钥库。
Understanding the implications of transparent data flow is key to the security of XML-based applications.
理解透明数据流的牵涉对于基于XML的应用程序的安全性来说至关重要。
In the context of digital security, a key is a piece of data which is used to encrypt or decrypt other pieces of data.
在数字安全语境中,密钥是一段数据,用于对其他数据进行加密或解密。
One of the more common security systems used is PKI (Public Key Infrastructure), an encryption used for PDA and smart-phone security.
使用的更公用安全性系统之一是PKI(公用密钥基础),一种用于PDA和智能电话安全性的加密技术。
Hopefully, most readers realize that security is a key aspect of enterprise systems.
令人欣慰的是,大多数读者都能够认识到安全性是企业系统的一个关键方面。
Assuming there is at least one, each instance is described in a row of the table. The instance ID and AMI ID are displayed, along with the public DNS name, security group, and key pair.
假设至少有一个实例,每个实例在一个表格行中描述,包括实例ID、A MI ID、公共dns名称、安全组和值对。
Before delving into SSL itself, it is useful to consider the key security problems that network communication faces, along with the appropriate solutions. Key security problems include.
在深入研究ssl本身之前,考虑一下网络通信面临的关键的安全性问题以及适当的解决方案,这是很有帮助的。
Containing all the key security relationships between objects.
包含对象间所有的关键安全关系。
The irony is that energy security was key in persuading the east Europeans to sign up to the climate-change package in March 2007.
具有讽刺意味的是,在2007年3月的峰会上,能源安全问题是说服东欧国家签署气候变化方案的关键。
This article outlined the key players and security attacks and defenses in an e-Commerce system.
本文概述了e - Commerce系统中的关键参与者,安全性攻击和防御。
In this article, we focus on security supporting the key standards and projects that could potentially be used with Domino 6.
本文主要讨论支持可能与Domino 6共同使用的那些重要标准和项目的安全。
In this article, we focus on security supporting the key standards and projects that could potentially be used with Domino 6.
本文主要讨论支持可能与Domino 6共同使用的那些重要标准和项目的安全。
应用推荐