Nations react strongly to unauthorized overflights.
各国对于未授权的飞越领空反应强烈。
No unauthorized changes be made.
不得擅自修改。
Holding copyright provides the only legal remedy against unauthorized copying.
持有版权是制止盗版的唯一法律手段。
This ensures that users cannot access unauthorized data.
这可确保用户无法访问未经授权的数据。
Unauthorized destruction of archives shall be prohibited.
禁止擅自销毁档案。
The latter doesn't reflect unauthorized transactions.
后者不反映未批准交易。
This removes the risk of unauthorized Web administration access.
这样会消除未授权Web管理访问的风险。
Changing a single parameter may give the user unauthorized access.
—改变一个单一的参数可能给用户未授权的访问。
Unauthorized use of the registered trademarks of others is illegal.
未经授权使用他人注册商标是违法的。
Data must be protected from unauthorized access and modification.
防止对数据进行未授权的访问和更改。
When the system is hacked with unauthorized and unformatted messages.
当系统受到未授权或未格式化的消息的攻击时。
This way an unauthorized transaction effectively doesn't accrue interest.
若用这种方法,则未批准的交易实际上没有生利息。
If they do not match, the current user can be detected as an unauthorized user.
如果不匹配,当前用户就可以被探测为未经授权用户。
Unauthorized access — Gaining unauthorized access to a Web service or its data.
未经授权的访问——获得对Web服务或其数据的未经授权的访问。
Tattoo Tattoo location but not the healing period any unauthorized smear ointment.
纹身愈合期内纹身处不可以擅自涂抹任何药膏。
Unauthorized access using techniques such as dictionary attack and falsified message.
非授权访问,实施攻击的技术包括目录攻击和伪造消息。
In this way, if you lose your smartphone, you can prevent unauthorized use by locking it.
这样,如果你丢了手机,可以避免未经授权的使用该通讯录。
"Step one is to protect published news content against unauthorized exploitation," he said.
“第一步是保护新闻内容不受未经授权的盘剥”,他说。
As a result, it's always possible for an unauthorized person to obtain a copy of an unguarded CA.
因此,总存在这种可能性,某个未经授权的人获得了没有很好保护的CA的副本。
Confidentiality: the system will prevent unauthorized disclosure of information (" can't read ").
机密性:系统将防止在未授权情况下泄露信息(“不能读”)。
Any unauthorized access of a computer and its data, constitutes a breach of a computer system.
所有未经授权的对计算机及其数据的访问,都可能造成计算机系统的泄露。
A network error could result from an unauthorized URL due to model access or an incorrect URL.
由于模型访问或错误url而产生的未授权URL可能会导致网络错误。
So we need to make sure that, while in transit, the data isn't accessible to unauthorized parties.
所以我们需要保证数据在传输时不会被未授权的人访问。
But what do you do if a system has been compromised and used for illegal or unauthorized activities?
但若系统已遭遇安全威胁并被用于非法或未经授权的活动,又该怎么办呢?
It also has the security features to prevent unauthorized classes from retrieving personal information.
它还拥有阻止未授权类检索个人信息的安全特性。
Passwords are the administrator's first line of defense against unauthorized use of system resources.
密码是管理员用于对付未经授权使用系统资源的第一道防线。
Passwords are the administrator's first line of defense against unauthorized use of system resources.
密码是管理员用于对付未经授权使用系统资源的第一道防线。
应用推荐