If an attacker knows your user name and you use a weak password, your account will be easily cracked.
如果你个攻击者知道你的用户名,并且你使用了弱密码,那么你的帐户会很容易就被破解。
If a shopper chooses a weak password, or does not keep their password confidential, then an attacker can pose as that user.
如果购物者选择了一个不合适的密码,或者没有对密码进行保密,攻击者就可以很容易的攻击用户。
A throwaway forum account with a weak password might be exploited years later, and could even be a password you still use with active accounts.
一个使用弱密码的废弃论坛账户可能会在几年之后被破解,但是他的密码你可能在其他账户中还在使用。
Installing db2 UDB with the default user IDs (for example, db2admin) and providing a weak password (or none at all) can put your system at risk.
用默认用户ID(如db2admin)安装db 2UDB并使用弱口令(或者根本没有)可能将系统置于风险中。
Vulnerabilities occur across a wide spectrum, from the obvious — like using a weak password or storing unprotected private data — to the more nuanced — like unchecked input.
脆弱点出现的范围很广,从明显的——像使用不健壮的密码或存储无保护的私有数据——到更有细微差异的——像未检查的输入。
It will require you to change your password to a stronger password if your password is categorized as a "weak" password.
这将要求您更改密码,以一个更强有力的密码,如果您的密码是归类为“软弱”的密码。
Although the encryption is, in essence, what protects your documents, it can be quickly rendered useless if the chosen password is weak, since it is used in the decryption process.
虽然加密是,在本质上,保护文档,它可以快速地变得无用,如果选择的密码是薄弱的,因为它是用在解密处理。
Illegal element USES partial user covet to go to the lavatory the flaw that installs weak countersign, to the bank card password undertakes defeating solving.
不法分子利用部分用户贪图方便设置弱口令的漏洞,对银行卡密码进行破解。
Illegal element USES partial user covet to go to the lavatory the flaw that installs weak countersign, to the bank card password undertakes defeating solving.
不法分子利用部分用户贪图方便设置弱口令的漏洞,对银行卡密码进行破解。
应用推荐