您要查找的是不是:
- Unauthorized access to a momentarily inactive terminal of a legitimate user assigned to a communications channel. 未授权的访问一个临时不运行的终端,该终端属于一个被分配到一个通信信道的合法用户。
- Passwords, session timeouts, and access control all create obstacles for a legitimate user. 密码、会话超时以及访问控制这些都给合法用户造成了障碍。
- These threats behave like legitimate user transactions and cannot be detected through a standard signature-based IPS. 这些威胁的行为很像合法的用户,所以标准的基于签名的ips是无法检测出的。
- In data security, the unauthorized access to a database by using the password of a legitimate user. 在数据安全技术中,通过使用合法用户的口令对数据库的非法访问。
- The service trusts the AS, so it knows that only the legitimate user could have created such an authenticator. 服务信任AS,因此它知道只有合法的用户才会创建这个验证者。
- The typical behavior of a legitimate user may be to use a different, but a relatively constant, set of domains in their HELO statements. 合法用户通常可能会在HELO语句中使用不同但是相对恒定的一组域。
- The SSL VPN should enable multiple levels of inactivity timeouts, in a way that is unobtrusive to the legitimate user, but will not allow illegitimate users access. SSLVPN应该能够控制多个等级的不活泼超时,在某种意义上说,客气的对待合法用户,但将不容许不合理用户的访问。
- It is wise to be mindful of your legitimate users as you implement security measures. 所以在你实现安全措施的时候,留心合法用户的反馈是很明智的。
- Or they could be e-mail identities and passwords that could be used by hackers to log into corporate network's as if they were legitimate users. 也可能是电子邮件用户名和密码,一旦被黑客利用,他们就能以合法用户身份进入公司网络。
- Usernames that are designed to impersonate legitimate users will be blocked immediately and indefinitely. 模仿他人合理用户名的用户名也是不恰当的,管理员有权立即封禁。
- By entering it in the database (under the Protection menu), these codes can be selectively invalidated, without affecting your legitimate users. 通过输入他到数据库(在保护菜单下),这些注册码能被选择为无效,不影响你的合法用户。
- Copyrighting IP address often happens in LAN, it seriously influents the normal visit of the legitimate users and takes the insecurity to the Internet. 局域网内盗用IP地址的情况经常发生,严重影响了合法用户的正常访问,也给网络带来了不安全因素。
- The method can be used for confidential data encryption and decryption, and this process for legitimate users is real-time and transparent. 使用该方法可以对机密数据进行加解密,该加解密的过程对于合法用户是实时透明的;
- Distributed Denial of Service, which depletes the network's resource and denies service to legitimate users, is one of the hardest security problems in the Internet. 分布式拒绝服务攻击,目的在于耗尽网络资源从而使合法用户的服务请求被拒绝,是最难解决的网络安全问题之一。
- Kabbah began when the Mid-users upgrading in key check whether legitimate users, suggesting that KEY been blacklisted, delete the previous KEY, into a new can. 卡巴在中秋节的时候开始在用户升级时检查用户key是否合法,提示KEY被列入黑名单,请删除以前的KEY,导入新的就可以了。
- Politicians are legitimate targets for satire. 政治家理所当然是讽刺的靶子。
- The fundamental limitation of these technologies is that, once legitimate users have access to the information, they can share it with unauthorized people, potentially breaching security policies. 这些技术的根本局限是:在合法用户访问信息后,他们可以与未经授权的人员共享该信息,从而会潜在违反安全策略。
- In a denial-of-service attack, hackers use automated programs to try to jam a site with bogus requests for service to the point that service is slowed or interrupted for legitimate users. 在这次攻击中,黑客们使用自动程序试图阻塞一个站点,用伪造的服务请求指向这个站点,进而使合法的用户登陆服务器变得缓慢或不能登陆。
- Industry is a heavy user of electric power. 工业需耗费大量的电力。
- In both cases, in order to allow or deny access, software analyzes the geometric pattern of minutiae, such as the ridges and valleys that are unique to every finger, and compares it with patterns registered by legitimate users. 以上两种装置要决定允许或拒绝存取,都必须利用软体分析指纹特徵点的几何图案,例如每根手指特有的脊纹与沟纹,然后再与合法使用者登录的指纹模式进行比对。