protection password

英 [prəˈtekʃn ˈpɑːswɜːd] 美 [prəˈtekʃn ˈpæswɜːrd]

网络  保护密码

计算机



双语例句

  1. For example, in a package that uses a protection level that encrypts sensitive information with a password, the values of all properties that have been identified as sensitive are encrypted.
    例如,如果包所使用的是利用密码加密敏感信息的保护级别,则包中标识为敏感的所有属性的值都是加密的。
  2. On the define power buttons and turn on password protection page, click don't require a password.
    在“定义电源按钮并打开密码保护”页面上,单击“不需要密码”。
  3. The private key protection password has been reset.
    已重新设置私钥保护密码。
  4. Gets a value that indicates whether the workbook has a protection password.
    获取一个值,该值指示工作簿是否具有保护密码。
  5. If you want the document protection to have a password, you must add the password before you deploy your solution.
    如果您希望文档保护有密码,必须在部署解决方案之前添加密码。
  6. The following example does not use password protection; however, you might want to consider using a password when adding document protection.
    下面的示例未使用密码保护;但是,在添加文档保护时,您可能想考虑使用密码。
  7. To help protect the file from being opened by unauthorized people, type a password in the protection password box.
    若要帮助防止未经授权的人员打开文件,请在“保护密码”框中键入密码。
  8. Enable password protection at power-on~~ Requires a password when turned on.
    启用开机密码保护功能~~开机时需要密码。
  9. Passwords enable authorized users to remove protection from the document; because there is no password, protection cannot be easily removed.
    密码使经过授权的用户可以移除文档的保护;因为如果没有密码,就不太容易移除保护。
  10. Using Binary Files Realize Protection and Modification of Login Password
    巧用二进制文件实现登录密码的保护与修改
  11. You can optionally add a password so that users cannot remove the document protection unless they know the password.
    可选择添加密码,这样一来,除非用户知道此密码,否则无法移除文档保护。
  12. Therefore, the original intention of keystroke dynamics is to provide a convenient and effective protection on password verification.
    击键动力学的研究初衷正是要给口令加上一个简便而有效的保护措施。
  13. This kind of attack is different from the passive attack based on network sniffing. It can bypass the protection of system password and S/ KEY, and get full control of the link between two end points. This can cause great harm to the network system.
    这种攻击不同于以往的基于网络侦听的被动式网络攻击,它能绕过系统口令和S/KEY口令保护的防御,将网络连接完全接管,对网络安全造成了重大威胁。
  14. Therefore, the original intention of keystroke dynamics is to provide a convenient and effective protection on password verification. In keystroke dynamics, the characteristics of users 'keystroke are captured when password is being typed, and is analyzed by algorithms to automatically recognize the authentic identity.
    击键特征的研究目的是给口令加上一个简便而有效的保护措施,基于击键特征方法获取并分析用户敲击键盘的特征数据,自动地识别用户的真实身份。
  15. Taking windows 3. 2 system as an example, setting up methods of fixed-time and arbitrary time screen protection were introduced respectively. The password of removing the screen protection was al-so presented.
    以Windows3.2系统为例,分别介绍了定时屏幕保护和随时屏幕保护的设置方法,同时还介绍了解除屏幕保护口令的两种方法。
  16. In access control, such improvements will be done as following: Self-protection mechanism of system resource will be added to existing security policies: password protection, and this is the research focus of this paper: password access control mechanism based on self-protection password.
    在现有安全策略基础之上,增加系统资源的自我保护机制:口令保护.这也是本文研究的核心内容:基于自我保护口令的密码访问控制机制。
  17. Security protection of the for CIQ network system analysis and design, using mobile apn private network, the application layer username password authentication, the phone number is bound certification and other means to ensure the security of the system data. 6.
    针对国检局内网系统的安全性保障进行了分析及设计,采用移动apn专网、应用层用户名密码验证、手机号码绑定认证等多种手段确保系统数据的安全性。