S3 USES a user key (a long, random-looking string) and a user password (another random-looking string) to let you store and retrieve files.
S3使用一个键(一个较长的随机字符串)和一个用户密码(另一个随机字符串)来让您存储和检索文件。
If you've used Rails acts_as_authenticated, you know that a logged-in user will set the value associated with the: user key within the session.
如果使用过Rails acts_as_authenticated,就会知道登录用户会设置与会话中的:user密钥相关联的值。
The User key field is the attribute that Lotus Mobile Connect uses to search the directory server for the userid provided by the credential challenge.
User keyfield是LotusMobileConnect用于搜索目录服务器,以查找凭证询问所提供的用户ID 的属性。
The key file was generated with encrypted user key to store in the field of key in key storage table, and the key file was decrypted with the inputted user key.
用户密钥加密运算后生成的密文存入密钥存储表密钥字段,用输入的密钥解此密文。
All kinds of different methods based on rooted-tree multicast key distribution schemes make efforts to minimize the user key storage while providing efficient member deletion.
基于生成树组播钥匙分配方案的各种方法在提供有效的用户删除方法的同时努力将用户钥匙存储最小化。
User-space programs are not allowed to create new key types.
用户空间程序不允许创建新的密钥类型。
Instead of sending the complete access key to another user, you can also set access permissions on individual files residing on EFS.
您还可以为efs中的单个文件设置访问权限,而不是将完整的访问密钥发送给另一个用户。
The permissions mask allocates 8 bits each to the four possible types of key accessor: possessor, user, group, and other.
权限掩码给四个可能的密钥访问者类型各分配8位:所有者、用户、组和其他。
Because that allows for the user to type a lot of text; then, a second after the user presses the last key, the search will run.
因为这将允许用户输入大量的文本;然后,当用户按下最后一个键时,第二种方法将运行搜索。
When bandwidth was the key limiting factor, we did not measure any significant improvement in the key user operations that we timed.
当带宽成为关键限定因素时,我们不度量我们所计时的关键用户操作的任何有意义的提高。
This password check is done even if the user is following the public key or host-based authentication.
即使用户采用公共密钥或基于主机的身份验证,也会执行这个密码检查。
If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.
如果恶意用户获得了这些密钥信息,那么主机的安全性就很容易受到威胁。
Once the security server confirms the identity of the user via secret key, the login process of the user into the DCE is completed.
一旦安全服务器通过秘密密钥确认了用户的身份,用户登录到DCE的过程就完成了。
Technologies that enable natural user interaction are key to the success of mobile devices.
有助于用户自然互动的技术是移动设备成功的关键。
Fine-grained event handling is the key to a rich user interface.
细粒度的事件处理对富用户界面至关重要。
Instead it just raises the command which represents the user hitting the delete key which is eventually handled by the editor and deletes the selection.
它只是执行代表用户按下删除键的命令,最后由编辑器执行并删除所选内容。
The key used matches the key selected by the user.
使用的键与用户选择的键匹配。
Only the user who holds secret key can ever decrypt the original data, the query, or the query results.
只有手握密匙的用户能够看到原始数据,查询词或查询结果。
Publicity is often key, to alert your user community to a new web site or tool.
宣传通常都是取胜之钥,因为只有靠宣传你的用户的社区才能知道新的网站或者工具。
That's why the User object's key is the name of a Twitter account, which is inherently unique.
这就解释了为什么User对象的键是Twitter帐户的名称,它本质上是惟一的。
Next, generate the Kerberos key for this user.
接下来,为此用户生成Kerberos密钥。
Andrew Eisner, Director of Community and Content, Retrevo, took issue with this - saying that user reviews are key, pointing to the expert reviews at Retrevo.
Retrevo的网络内容和社区经理安德鲁·艾斯纳提出的观点则是,用户的评论是关键的,对Retrevo的专家观点起到指示作用。
Notice that each query includes the API key, user ID, and, in some cases, the ID of the item being modified or deleted.
注意,每个查询都包含aip键、用户ID,有时还包含被修改或删除的商品的ID。
Expanding existing social capabilities like ActivityStreams, networks and advanced user profiling is a key area of focus.
扩展现有的社交功能,比如activitystreams、人际网络、高级用户档案等等是这部分的关键之处。
Keylogin then prompts the user for the Secure RPC password and then decrypts the secret key of that user.
然后,keylogin提示用户输入安全RPC密码,然后解密该用户的机密密钥。
Creating user netnames and public and private key pairs
创建用户网络名以及公钥和私钥对
Type: The Linux key retention service defines two standard key types: user and keyring.
类型(Type):Linux密钥保留服务定义两个标准密钥类型:user和keyring。
There are two defined key types: keyring and user.
有两种预定义的密钥类型:keyring和user。
The method getUserInfo1() returns a Map object, which you then store into the context with the key user.
方法getUserInfo1()将返回一个Map对象,然后将把该对象存储到关键字为user 的上下文中。
The user must supply the value for this key. A user or application may set or change the key value by calling the WlanHostedNetworkSetSecondaryKey function or by using the netsh wlan commands.
应用程序可以调用WlanHostedNetworksetsecondarykey函数,用户则可以使用netshwlan命令来设置或更改其值。
应用推荐