破产程序保护债务人免受债权人的讨债。
Bankruptcy protects the debtor from debt collection by creditors.
您不易确认这些系统已经更新了反病毒程序保护。
You may not be able to as easily ensure that those systems have updated AV protection.
从抗病毒程序保护的系统中 清除危害更是雪上加霜。
Removing infections from systems supposedly protected by antivirus applications only adds insult to injury.
个人申诉程序旨在保护普通劳动者免遭“不正当解雇”。
Personal grievance procedures were designed to guard the jobs of ordinary workers from "unjustified dismissals".
许多倡导者认为,带有日期和时间戳的透明数据程序将保护科学家的成果不被他人抢先发表。
Many advocates think that transparent data procedures with a date and time stamp will protect scientists from being scooped.
是否有可能为机器人编写像阿西莫夫定律这样的安全保护程序是值得商榷的。
Whether it's possible to program a robot with safeguards such as Asimov's laws is debatable.
用“呼吸”一词设为屏幕保护程序或桌面图片,或把它作为一个便条贴在您的墙壁、冰箱或办公桌上。
Put the word "Breath" as a screensaver or desktop pic, or put it up as a note on your wall, fridge, or your desk.
最值得注意的是,Pointcast网络使用一个屏幕保护程序来向用户的计算机显示器发送不断更新的新闻和广告流。
Most notably, the Pointcast Network uses a screen saver to deliver a continually updated stream of news and advertisements to subscribers' computer monitors.
同样,并非所有黑客都是攻击者-许多黑客编写保护您的程序!
Also, not all hackers are attackers — many hackers write the programs that defend you!
此外,有些实现不支持跳板代码,因此可能必须对需要这种保护的程序禁用该特性。
Also, some implementations don't support trampolines, so the protection may have to be disabled for programs that need them.
当然,有特权的程序必须保护自己不受攻击,但是这个方法通常意味着这一部分必须是安全的程序,这些程序应更小并且更容易保护。
The privileged program, of course, must defend itself from all attacks, but this approach usually means that the part of the program that must be secured is much smaller and easier to defend.
这个特定的折衷是对两种糟糕结果的选择:程序死锁,还是不再保护重要资源的状态。
This specific tradeoff involves a choice between two bad results: deadlock the program or fail to protect the state of a critical resource.
法国的破产程序旨在保护公司和就业岗位,对债权人却考虑不多。
France's insolvency process was designed to protect companies and jobs, and gives creditors little influence.
能够保护程序抵御模糊攻击的最简单的方法是将一个检验和添加到数据中。
The simplest thing you can do to protect against fuzzing is add a checksum to your data.
此外,查德勒博士说海洋保护的公共程序制定由于这些原因也推迟了。
Furthermore, says Dr Chandler, the public procedure by which Marine reserves are designated as such causes delays.
最大的弱点是安全性;没有投入任何精力来保护这些程序不受最常见入侵的危害。
The weakest point is security; no real effort has gone into making these programs secure against any but the most casual intruders.
俄罗斯新闻媒体报道称,他们已启动证人保护程序,并试图更改他们的名字。
Russian news media reported that they have applied to a witness-protection program and are seeking to change their names.
实体法界定权利,程序法则制定保护和实施权利的秩序。
Substantial law defines rights, and procedural law establishes the procedures by which rights are protected and enforced.
如果存在fencepost错误(超过数组末尾运行),程序就会产生保护错误,并立即结束。
If there is a fencepost error (running off the end of an array), your program will immediately exit with a protection error.
理论上,也可以用相同的方法保护MIDP应用程序。
In theory, MIDP applications could be secured by the same methods.
在本文描述的示例应用程序中,保护业务逻辑ejb,以使只有通过认证的用户可以调用特定的EJB方法。
In the sample application described in this article, the business logic EJB is secured so that only authenticated users can invoke specific EJB methods.
提示:用“调息”一词作一个屏幕保护程序或桌面图片,或把它作为一个提示贴在您的墙壁、冰箱办公桌上。
Tip: put the word "Breathe" as a screensaver or desktop PIC, or put it up as a note on your wall or fridge or on your desk.
要构造一个屏幕保护程序,最好的方式就是为其配置一个虚拟的光驱、键盘、屏幕和鼠标,但是不需要虚拟磁盘和网络适配器。
To construct a screensaver, the best way is to configure it with a virtual CD-ROM drive, keyboard, screen, and mouse, but without any virtual disks or network adapter.
完成这些配置步骤之后,可以配置J2EE安全设施来保护应用程序组件。
After these configuration steps are completed, you can configure J2EE security facilities to protect application components.
我在关闭我的屏幕保护程序时没有遇到麻烦——至少是当时没有遇到麻烦。
And I didn't get in trouble for turning off my screen-saver — at least not yet.
比如,为屏幕保护程序设置解锁代码并在接近电脑的时候吹一下口哨——再无需烦人的密码键入操作。
Set up an unlock code for your screensaver and whistle as you approach your desk — no more bothersome password typing.
用户可以让集群代理以低优先级运行,或者在启动屏幕保护程序时运行。
The user can instruct the cluster agent to run in low priority or run whenever the screen saver is activated.
约束和角色在部署受安全保护的应用程序时确定。
Constraints and roles are fixed when a secured application is deployed.
本文介绍的方法适用于所有AIX版本,并且能够帮助AIX系统管理员和AIX程序员保护他们的系统。
The ideas discussed here apply to all releases of AIX and will be useful to both AIX system administrators and AIX programmers concerned about protecting their systems from intruders.
应用程序文件默认是受保护的。
应用推荐