Changing a single parameter may give the user unauthorized access.
—改变一个单一的参数可能给用户未授权的访问。
Unauthorized access — Gaining unauthorized access to a Web service or its data.
未经授权的访问——获得对Web服务或其数据的未经授权的访问。
Any unauthorized access of a computer and its data, constitutes a breach of a computer system.
所有未经授权的对计算机及其数据的访问,都可能造成计算机系统的泄露。
But what do you do if a system has been compromised and used for illegal or unauthorized activities?
但若系统已遭遇安全威胁并被用于非法或未经授权的活动,又该怎么办呢?
The authorize methods are designed to protect the methods in a service layer from unauthorized access.
authorize方法设计用于保护服务层中的方法免受未经授权的访问。
He is charged with 25 counts of identity theft, unauthorized access and unauthorized damage to a protected computer.
他被指控利用25个身份盗窃、非法访问和非法损坏一个受保护的计算机。
In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.
此外,我们雇佣了保安和使用了电子安全多项措施,以防止在未经授权下访问用户的信息。
It can also report unauthorized access attempts to the server and thus is a useful tool for auditing your Lotus Domino server security.
它也可以报告对服务器的未授权的访问尝试,因此它对于审核LotusDomino服务器的安全性是一个有用的工具。
In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.
除了认证问题外,能够对数据库服务器的安全形成威胁的还包括对敏感信息未经授权的访问。
Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.
小心请不要在生产环境中使用此过程允许未经授权的用户访问用户数据。这样做可能会违反贵公司的隐私和安全政策。
Chaney, who was expected to appear in a Florida courtroom later Wednesday, was charged with 26 counts of identity theft, unauthorized access to a protected computer and wiretapping.
预计下周三出现在审判庭上的钱尼,面临着26项身份盗窃及未授权登录和监听一个受保护的计算机的指控。
The World Bank Group employs a range of technologies to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.
世行集团采用各种技术来保护系统中存留的信息,以防丢失、误用、越权使用或泄漏、篡改和破坏。
WHO employs a range of technologies and security measures to protect the information maintained on our systems from loss, misuse, unauthorized access or disclosure, alteration, or destruction.
世界卫生组织采用一系列技术和安全措施以防范我们系统上所保存信息的丢失、滥用、未经授权的存取或公布、修改或损毁。
For any unauthorized commoner, then, to gather firewood in them was a crime, poor people being the only exception.
对于任何未经授权的平民,收集木柴是犯罪的,唯独穷人是个特例。
Essentially, Apple's patent provides for a device to investigate a user's identity, ostensibly to determine if and when that user is "unauthorized," or, in other words, stolen.
从本质上讲,苹果的专利使设备能够鉴别用户的身份,显式确定是否及何时该用户是“未经授权的”,或者,换句话说,该设备被盗了。
Marine Col. Dave Lapan, a Pentagon spokesman, said Monday that Manning has "neither been ruled in or ruled out" as a suspect in the new unauthorized disclosure of documents.
海军陆战队上校,五角大楼发言人之一戴夫·拉潘星期一说:在这次未经授权的文件被泄露事件中曼宁被列为嫌疑犯。
Testing access will help you find out if an unauthorized user can successfully access a control that only the administrators are authorized to use.
测试访问将帮助您查明一名未授权用户是否能够成功访问一个只有管理员有权使用的控件。
As a result, it's always possible for an unauthorized person to obtain a copy of an unguarded CA.
因此,总存在这种可能性,某个未经授权的人获得了没有很好保护的CA的副本。
We recommend defining at least a process administrator in order to avoid potentially unauthorized repair actions from the process starter.
为了避免流程启动者可能在未授权的情况下修复活动,我们建议至少定义一个流程管理员。
Just make sure the password you give to authorized visitors is a strong one that would be difficult for unauthorized visitors to guess.
只要确保您提供给授权访问者的密码足够保密,不易被未授权访问者破解。
In the past, content owners have used identification methods as a means of identifying unauthorized content for the sake of calling out the attack dogs and sending take-down notices.
过去,内容所有者通常采用识别技术来判断未经授权的内容使用,并主动出击,追讨责任。
SQL injection is a technique which enables an attacker to execute unauthorized SQL commands by taking advantage of non-scrutinized input opportunities in applications that build dynamic SQL queries.
SQL注入这种技术使攻击者可以利用应用程序中未仔细检查的输入机会来执行未经授权的SQL命令,而应用程序的本意是使用该输入来构造动态sql查询。
In CSRF attacks, unauthorized commands are transmitted from a user that the Web site trusts.
在CSRF攻击中,从Web站点信任的用户处传播未经授权的命令。
If the user attempts to directly access the.jsp page for an unauthorized functionality, a user error message is displayed as in Figure 14.
如果用户想要直接访问.jsp页面上一个未被授权的功能,就会显示用户错误消息,如图14所示。
Mazzeo calls her book an "unauthorized biography of a scent," but in fact it is a biography of Coco Chanel as seen through the prism of her famous square flacon.
Mazzeo称她的书是“未经授权的香水传记”,但实际上,她从著名的方形香奈儿五号香水瓶来一窥可可·香奈儿的传记一生。
If an unauthorized visitor attempts entry with an incorrect password, you can choose to display a blank page, redirect to a different URL, or go back to the previous page.
如果未授权的访问者试图输入错误的密码,您可以选择显示一个空白页面、重定向到一个不同的URL,或者返回到先前的页面。
The US Army realized they had to secure USB drives, find a way to keep track of the devices, and ensure that the information could not be accessed by unauthorized personnel.
美军这才意识到他们得保护usb硬盘的数据安全,找出能够跟踪这些设备的方法,并且确保重要信息不被未经授权的员工访问。
The US Army realized they had to secure USB drives, find a way to keep track of the devices, and ensure that the information could not be accessed by unauthorized personnel.
美军这才意识到他们得保护usb硬盘的数据安全,找出能够跟踪这些设备的方法,并且确保重要信息不被未经授权的员工访问。
应用推荐