Police who believe a car to be stolen can ask an OnStar operator to disable its accelerator, while leaving the steering and brakes in working order.
警方可以要求OnStar总控台操作员在关闭被其认定为系被盗车辆的速度引擎系统的同时,保持该车方向盘及刹车相关设备的正常运转。
Note that cheques take longer to clear in France than in Britain, and can only be stopped if stolen or lost.
请注意,支票在法国清算的时间比在英国要长,而且只有在被盗或丢失时才能被停用。
The microbiologist has applied for a patent on his strains and has sequenced the genomes so he can tell if someone else has stolen it.
这位微生物学家已经为这种菌株及其基因排列申请了专利,因此他可以把其他人的这类行为称为偷窃。
when you’ve finally decided to implement the stolen identity into your current situation, see if you can adopt some of those traits for future challenges.
当你最终决定把偷来的身份融入自己的现状时,看看你能否学习这些特质中的一部分来面对将来的挑战。
She argues that's what makes the system more secure than coming up with a standard password, which is repeated over and over at different sites, can be shared with a friend, or stolen by an adversary.
她认为正是这一点使得该系统比利用一般的密码要更安全,因为后者会在多个不同的网站反复输入,可以被朋友分享,甚至会被怀有恶意的人所盗取。
But the size of the global art market is also attractive to organised gangs - and stolen items can be moved around the world "with a low risk of detection", a spokesman for the service said.
世界艺术品市场的规模对有组织的犯罪团伙也很有吸引力。被盗的物品可以在全世界范围内转移,而“被发现的可能性很小”,该情报局的发言人说。
If the user loses the certificate or the certificate is stolen, hackers can access this information without being challenged for authentication.
如果用户的证书丢失或被盗,黑客就能够访问信息而不用经过身份验证。
An "anomaly" can also mean that a safety problem at a facility could have resulted in greater damage than it did or that radioactive material has been stolen or transported incorrectly.
“异常”也可能意味着核设施的某个安全问题本可能造成更大的破坏,但结果并未造成严重后果;或是放射性材料被盗,或被不当运输。
Most Japanese consider their phone to be secure; if it is lost or stolen it can be locked remotely to protect the cash, credit and other valuables tied to it.
但大部分日本人认为自己的手机是安全的,因为手机丢失或被盗时可以远距离锁定以保护现金、信用卡及其他与之联系密切的重要功能。
Clusters of overseas servers can undermine much of the commercial basis for creative work around the world, offering users the speedy, secret transmission of stolen goods.
海外服务器簇群(簇群:指一群服务器的集合——译者注。)动摇了世界创意产业的商业根基,让用户能快速、秘密地享受赃物。
These are the words of a well-meaning man who can see no moral or practical difference between a car thief, a scrap-yard mechanic, and a person who insures a car and thus profits if it is stolen.
这些话出自心地善良的人口中,但他们看不到偷车贼、废品堆放场的机械工以及购买了汽车保险、当车失窃后得到赔偿的车主之间有什么道德或实质上的区别。
These can be read under a microscope and a quick phone call will reveal whether the goods are, indeed, stolen—or have been sold legitimately by an owner who has forgotten to clean them first.
这些号码可在显微镜下读出,然后迅速打个电话就可以查出这个货物是被偷的,还是被拥有者忘记提前清理印记而合法卖出的。
Why buy a bike (and risk having it stolen) when you can pick one up at a bike rack near your home and drop it off at another rack near your office?
能在家附近租辆自行车,用完后退还到单位附近的租车点为什么还要冒着被偷的风险自己买一辆?
The battle for your authenticity is not an easy one, but there are some things you can do to get started on the road to recovering your stolen identity.
为你的真实性而战斗可不轻松,但是你还是可以做点什么,来找回被偷走的个性。
The user can come to the library and show us their ID to access their account and we can fix the problem the same way we do with stolen library cards.
用户可以到图书馆核实其身份并取回帐户,这和我们处理借书证被盗用的是一回事。
This can happen to messages being transmitted in the clear, transmitted encrypted but stored in the clear, or decryption of messages due to stolen key or cryptoanalysis.
以明文方式传输消息、传输加密的但以明文方式存储的消息、或者由于密钥被窃取或通过密码分析获取后对消息进行解密,在以上几种情况下都可能发生这种攻击。
This is a prevalent5 misconception in many people’s minds — that love, like merchandise, can be “stolen”.
这是许多人心目中普遍存在的一种错觉——爱情,像商品一样,可以“偷走”。
On Monday, the company announced BlackBerry Protect, a free application that users can access over the Web when they've lost their phone or had it stolen.
本周一,RIM宣布启动“BlackBerry Protect”应用程序项目:当用户的手机丢失或被盗时,他们可以登陆网站,使用一个免费应用程序。
The document cookies can allow the attacker to hijack sessions or log in with stolen credentials.
文档cookies可以允许攻击者劫持会话或使用所窃取的凭证进行登录。
If you get your cookies stolen, your corresponding account can be easily compromised and even taken over.
如果cookies被窃取了,您的相应账号很可能被破坏甚至被他人利用。
Reset to factory defaults - administrators can reset a device to its factory defaults in order to wipe sensitive data in case the device was stolen or lost.
恢复出场设置——管理员可以将设备重置为出场设置,这样就能在设备被偷或丢失后擦除上面的敏感数据了。
It is an attack on the privacy of clients of a particular Web site, which can lead to a total breach of security when customer details are stolen or manipulated.
它是针对特殊Web站点的客户隐私的攻击,当客户详细信息失窃或受控时可能引发彻底的安全问题。
XSS is an attack on the privacy of clients of a particular Web site, which can lead to a total breach of security when customer details are stolen or manipulated.
XSS是针对特殊Web站点的客户隐私的攻击,当客户详细信息失窃或受控时可能引发彻底的安全威胁。
If a user's Kerberos password is stolen by an attacker, then the attacker can impersonate that user.
如果一个用户的Kerberos密码被攻击者窃取,攻击者就能够模拟该用户。
If a user's Kerberos password is stolen by an attacker, then the attacker can impersonate that user.
如果一个用户的Kerberos密码被攻击者窃取,攻击者就能够模拟该用户。
应用推荐