• Changing a single parameter may give the user unauthorized access.

    改变一个单一参数可能用户未授权访问

    youdao

  • Unauthorized accessGaining unauthorized access to a Web service or its data.

    未经授权访问——获得Web服务数据的未经授权的访问。

    youdao

  • Any unauthorized access of a computer and its data, constitutes a breach of a computer system.

    所有未经授权计算机及其数据的访问,都可能造成计算机系统泄露

    youdao

  • But what do you do if a system has been compromised and used for illegal or unauthorized activities?

    系统遭遇安全威胁用于非法未经授权的活动,又该怎么办呢?

    youdao

  • The authorize methods are designed to protect the methods in a service layer from unauthorized access.

    authorize方法设计用于保护服务中的方法免受未经授权的访问。

    youdao

  • He is charged with 25 counts of identity theft, unauthorized access and unauthorized damage to a protected computer.

    指控利用25个身份盗窃非法访问非法损坏一个受保护的计算机。

    youdao

  • In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.

    此外我们雇佣了保安使用了电子安全多项措施防止未经授权下访问用户信息

    youdao

  • It can also report unauthorized access attempts to the server and thus is a useful tool for auditing your Lotus Domino server security.

    可以报告服务器未授权访问尝试因此对于审核LotusDomino服务器的安全性一个有用的工具

    youdao

  • In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.

    除了认证问题外,能够数据库服务器安全形成威胁还包括敏感信息未经授权访问

    youdao

  • Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.

    小心请不要生产环境中使用过程允许未经授权的用户访问用户数据这样做可能会违反公司隐私安全政策

    youdao

  • Chaney, who was expected to appear in a Florida courtroom later Wednesday, was charged with 26 counts of identity theft, unauthorized access to a protected computer and wiretapping.

    预计下周三出现审判庭钱尼,面临26身份盗窃及未授权登录监听一个受保护计算机指控

    youdao

  • The World Bank Group employs a range of technologies to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.

    世行集团采用各种技术保护系统存留信息,以防丢失、误用越权使用泄漏篡改破坏

    youdao

  • WHO employs a range of technologies and security measures to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.

    世界卫生组织采用一系列技术安全措施防范我们系统所保存信息丢失滥用未经授权存取公布修改损毁

    youdao

  • For any unauthorized commoner, then, to gather firewood in them was a crime, poor people being the only exception.

    对于任何未经授权平民收集木柴犯罪的,唯独穷人是个特例

    youdao

  • Essentially, Apple's patent provides for a device to investigate a user's identity, ostensibly to determine if and when that user is "unauthorized," or, in other words, stolen.

    从本质上讲苹果专利使设备能够鉴别用户身份显式确定是否何时用户未经授权的”,或者,换话说,该设备被盗了。

    youdao

  • Marine Col. Dave Lapan, a Pentagon spokesman, said Monday that Manning has "neither been ruled in or ruled out" as a suspect in the new unauthorized disclosure of documents.

    海军陆战队上校五角大楼发言人之一戴夫·拉潘星期一说这次未经授权文件泄露事件曼宁被列为嫌疑犯

    youdao

  • Testing access will help you find out if an unauthorized user can successfully access a control that only the administrators are authorized to use.

    测试访问帮助查明未授权用户是否能够成功访问只有管理员有权使用控件

    youdao

  • As a result, it's always possible for an unauthorized person to obtain a copy of an unguarded CA.

    因此存在这种可能性某个未经授权获得了没有很好保护的CA副本

    youdao

  • We recommend defining at least a process administrator in order to avoid potentially unauthorized repair actions from the process starter.

    为了避免流程启动者可能在未授权的情况下修复活动我们建议至少定义一个流程管理员

    youdao

  • Just make sure the password you give to authorized visitors is a strong one that would be difficult for unauthorized visitors to guess.

    只要确保提供授权访问者密码足够保密,不易被未授权访问者破解。

    youdao

  • In the past, content owners have used identification methods as a means of identifying unauthorized content for the sake of calling out the attack dogs and sending take-down notices.

    过去内容所有者通常采用识别技术来判断未经授权内容使用,主动出击追讨责任。

    youdao

  • SQL injection is a technique which enables an attacker to execute unauthorized SQL commands by taking advantage of non-scrutinized input opportunities in applications that build dynamic SQL queries.

    SQL注入这种技术使攻击可以利用应用程序未仔细检查输入机会执行未经授权的SQL命令,而应用程序的本意是使用输入来构造动态sql查询。

    youdao

  • In CSRF attacks, unauthorized commands are transmitted from a user that the Web site trusts.

    CSRF攻击中,Web站点信任用户传播未经授权命令

    youdao

  • If the user attempts to directly access the.jsp page for an unauthorized functionality, a user error message is displayed as in Figure 14.

    如果用户直接访问.jsp页面上一个未被授权功能会显示用户错误消息如图14所示。

    youdao

  • Mazzeo calls her book an "unauthorized biography of a scent," but in fact it is a biography of Coco Chanel as seen through the prism of her famous square flacon.

    Mazzeo未经授权香水传记”,实际上,她从著名方形香奈儿五号香水瓶来窥可可·香奈儿的传记一生。

    youdao

  • If an unauthorized visitor attempts entry with an incorrect password, you can choose to display a blank page, redirect to a different URL, or go back to the previous page.

    如果授权的访问者试图输入错误的密码可以选择显示空白页面重定向一个不同URL或者返回先前的页面。

    youdao

  • The US Army realized they had to secure USB drives, find a way to keep track of the devices, and ensure that the information could not be accessed by unauthorized personnel.

    美军才意识到他们保护usb硬盘数据安全,找出能够跟踪这些设备方法并且确保重要信息未经授权的员工访问

    youdao

  • The US Army realized they had to secure USB drives, find a way to keep track of the devices, and ensure that the information could not be accessed by unauthorized personnel.

    美军才意识到他们保护usb硬盘数据安全,找出能够跟踪这些设备方法并且确保重要信息未经授权的员工访问

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定