英语人>网络例句>密码保护 相关的搜索结果
网络例句

密码保护

与 密码保护 相关的网络例句 [注:此内容来源于网络,仅供参考]

Today I will talk about password security and protection measures in order to help increase awareness of network security.

今天我将讨论一下密码安全和保护措施,以便帮助用户提高网络安全意识。

There will security built-in to protect the patient's confidentiality based on priority level of login user and password.

而且为了保护病人的隐私,因此将利用密码来管制使用者的使用权限。

In those instances where the necessity arises of subjecting a person guilty of violating legislation on the protection of consumers' rights to administrative liability, the procurator, in accordance with Article 25 of the Law on the Procuracy and Article 28.4 of the Code of Administra64 STATUTES AND DECISIONS tive Violations, issues a decree on the initiation of proceedings concerning an administrative violation.

在那些需要主题一个人发生的例证中有罪的违犯在消费者的权利保护上的立法到管理的责任,代理人,符合文章 25 在 Administra64 的密码 Procuracy 和文章 28.4 上的法律法令及决定 tive 违反,发行在进行的开始上的一条法令关于一个管理的违反。

If you choose to protect the document without a password , anyone reading the document can see the user IDs of those who have been given access.

如果选择在不使用密码的情况下保护文档,则读取该文档的任何人都可以查看已被授予访问权限的那些人的用户 ID。

The generation of watermark information is based upon quadratic residue theory and Rabin cipher system.

水印信息的产生基于二次剩余理论和Rabin密码体制,该算法在多个水印与宿主程序之间建立功能性的依赖关系,对真实水印起到防篡改的作用,增加了攻击难度,从而可对该类水印进行有效保护。

Because this worm spreads by using shared folders on networked computers, to ensure that the worm does not reinfect the computer after it has been removed, Symantec suggests sharing with Read Only access or by using password protection.

因为这种蠕虫病毒会利用网络上的计算机的共享功能来传播。确保在蠕虫病毒在没有删除之前不要再次感染。赛门铁克建议您最好将您计算机上的文件共享目录设置为只读或设置密码来保护你的计算机。

In addition, an improved secure lock is designed by using the Chinese Remainder Theorem, which is used for key management of the confidential cell broadcast.

创新之处是将指纹视为明文数据,在传输过程中也需要保护,从而设计了指纹与密码技术相结合的身份认证协议。

A simple password mechanism provides very basic protection to avoidthat unauthorized users toggle the switch.

同时,通过一个简单的密码检测提供最基本的保护,防止未经授权的用户来攫取开关的控制权。

Cryptographic protocol is one of the important ways of constructing safe internet environment and protecting the safety of information systems. However, it is very difficult to analyze its limitation and unclose the intrusion.

密码协议是构建网络安全环境、保护信息系统安全的重要手段之一,然而分析其固有缺陷和揭示入侵攻击行为,却是一件非常困难的事情。

Key Spyware allows you specify hotkey and password to unhide protection.

关键间谍软件可以让您指定热键和密码,以隐藏保护。

第12/14页 首页 < ... 6 7 8 9 10 11 12 13 14 > 尾页
推荐网络例句

I didn't watch TV last night, because it .

昨晚我没有看电视,因为电视机坏了。

Since this year, in a lot of villages of Beijing, TV of elevator liquid crystal was removed.

今年以来,在北京的很多小区里,电梯液晶电视被撤了下来。

I'm running my simile to an extreme.

我比喻得过头了。