入侵
- 与 入侵 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
A short list of features include: Multiple user account capability, Drag and drop operation for insertion of user name and password, Printing function for hard copy of passwords, Password protected database functionality, Internal security features to help maintain privacy from "over the shoulder" intrusion using our -Hide/Show password function, Descriptive titles allowing the same username to be used repeatedly, Configurable random password generation, Memo section for noting important info about password, like inception date, expiration date or special site instructions, Method of storing and launching relative URL information for quick access to the web site the particular password might pertain, Ability to disable Splash screen after registration, Configurable timeout function for unattended program lock-up, Ability to copy username and password to clipboard without entering that particular record, Ability to clear clipboard from within program and upon program exit, Full program help files.
短名单的功能包括:多用户帐户的能力,拖放操作插入的用户名和密码,打印功能,为的硬拷贝密码,密码保护数据库的功能,内部的安全功能,以协助维持隐私,从"肩膀"入侵使用我们的-hide/show密码功能,描述性的标题,让相同的用户名被反复使用,可配置的随机密码的一代,备忘录节注意到重要的信息密码,如成立日期,到期日或特别的指示,网站的方法,储存和开展相对网址的资料,以便快速存取该网站的特定密码,可能涉及,有能力,要禁用初始屏幕上注册后,可配置的超时功能,为无人值守程序锁起来,有能力复制的用户名和密码到剪贴板没有进入特定的纪录,能力要清除剪贴板从内部程序后,程序退出,全面计划,帮助文件。
-
The framework model proposed in this paper is a distributed intrusion detecting system based on a tridimensional agent.
提出了一种基于立体式Agent的分布式入侵检测系统的模型。
-
Along with the fast development and application of Internet, intrusion detection technology becomes more and more important.
随着互联网技术的迅速发展和广泛应用,入侵检测技术成为一个重要的研究领域。
-
Detente, invasion of Afghanistan, nepotism, and "period of stagnation".
缓和政策、阿富汗的入侵、裙带关系和停滞的年代。
-
These years, Because of corruption of Dynasty ,make social stop progress,national power lose ,west invest frequently,The chinese is also experiencing diaster,but always self-reliance,one nation will learn more in diaster and failure than common time.
近年以来,由于封建王朝的愚昧和腐败及闭关锁国,导致社会停滞,国力衰竭,列强频频入侵。中华民族尽管灾难深重、饱受凌辱,但是始终自强不息。一个民族在灾难和挫折中学到的东西会比平时多的多。
-
In the new intrusion diction system, the Clustering technique is also improved, and it makes the work more efficient.
本文的研究不仅是一种可供参考的网络安全解决方案,而且更是对入侵检测技术发展的一种新的探索。
-
The DIDAPPER (distributed intrusion detector with apperception) system presented in this paper is a distributed intrusion detector with apperception.
DIDAPPER( distributed intrusion detector with apperception)系统是一种具有认知能力的分布式入侵检测系统。
-
The security aim of E-Government Affairs is to prevent all kinds of intrusion and attack ,access without authorization, imitation, juggle, disavowal from exterior and inside.
电子政务系统的安全目标是防止来自外部和内部的各种入侵和攻击,防止非授权的访问,防止各种冒充、篡改和抵赖等行为,防止信息泄密和被破坏。
-
How to rescue a demoralized society in disbalance when one day the human world is intruded by dragons?
当有一天人类的世界被龙入侵,道德伦丧,失去平衡的社会要如何拯救?
-
If you have detected a network compromise, the first thing to do is to disconnect your network.
如果您发现了网络入侵,首先要断开网络连接。
- 推荐网络例句
-
Do you know, i need you to come back
你知道吗,我需要你回来
-
Yang yinshu、Wang xiangsheng、Li decang,The first discovery of haemaphysalis conicinna.
1〕 杨银书,王祥生,李德昌。安徽省首次发现嗜群血蜱。
-
Chapter Three: Type classification of DE structure in Sino-Tibetan languages.
第三章汉藏语&的&字结构的类型划分。