Changing a single parameter may give the user unauthorized access.
—改变一个单一的参数可能给用户未授权的访问。
Data must be protected from unauthorized access and modification.
防止对数据进行未授权的访问和更改。
Unauthorized access — Gaining unauthorized access to a Web service or its data.
未经授权的访问——获得对Web服务或其数据的未经授权的访问。
Unauthorized access using techniques such as dictionary attack and falsified message.
非授权访问,实施攻击的技术包括目录攻击和伪造消息。
It is also the challenge of preventing unauthorized access from hackers and fraudsters.
而对于黑客或欺诈者防止未经授权的访问也是挑战。
Any unauthorized access of a computer and its data, constitutes a breach of a computer system.
所有未经授权的对计算机及其数据的访问,都可能造成计算机系统的泄露。
You configure Websphere Portal to avoid unauthorized access by using an LDAP directory for authentication.
可以配置WebspherePortal来通过使用LDAP目录进行身份验证,从而避免非授权访问。
The authorize methods are designed to protect the methods in a service layer from unauthorized access.
authorize方法设计用于保护服务层中的方法免受未经授权的访问。
Most of the time, its content is not protected against unauthorized access from the users in this infrastructure.
大多数时间,不会针对此基础设施内的用户的非授权访问对其内容进行保护。
We maintain strict security standards and procedures to prevent unauthorized access to information about you.
我们设有严格的安全标准和程序,以防止未经授权访问您的信息。
Valuable assets, including intellectual assets and information, are protected from unauthorized access or use.
有价值的资产,包括知识产权和信息,非经授权不得使用。
He is charged with 25 counts of identity theft, unauthorized access and unauthorized damage to a protected computer.
他被指控利用25个身份盗窃、非法访问和非法损坏一个受保护的计算机。
We highly recommend explicitly changing the value of these parameters to valid group names in order prevent unauthorized access.
我们强烈建议明确将这些参数值改为合法的组名,以便防止未授权的访问。
Dedicated to security matters, these professionals can offer unconventional advice for securing data from unauthorized access.
这些专业人员专门处理安全问题,能够提供不同寻常的建议来保护数据避免未经授权的访问。
Access to specific pages is restricted with J2EE declarative and programmatic security to protect the pages from unauthorized access.
对特定页面的访问使用J2EE声明性和程序性安全来限制,以禁止对页面的非授权访问。
In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access.
此外,我们雇佣了保安和使用了电子安全多项措施,以防止在未经授权下访问用户的信息。
It can also report unauthorized access attempts to the server and thus is a useful tool for auditing your Lotus Domino server security.
它也可以报告对服务器的未授权的访问尝试,因此它对于审核LotusDomino服务器的安全性是一个有用的工具。
In addition to authentication issues, threats to the security of a database server involve unauthorized access to sensitive information.
除了认证问题外,能够对数据库服务器的安全形成威胁的还包括对敏感信息未经授权的访问。
Seriously, at some point yesterday, customers were reporting unauthorized access to other customers' accounts - but nothing really came of that.
说点严肃的吧,昨天某些时候,有些消费者称,预订时,存在帐户被非法侵入,但是没有造成其他后果。
There really are no more details on what procedures Dropbox has in place or how they implement the crypto to prevent unauthorized access to your files.
关于Dropbox业已到位的安全程序或者他们如何实施加密以阻止对你的文件的未授权访问,根本没有更多的细节。
Security involves both managerial and technical measures to protect against loss and the unauthorized access, destruction, use, or disclosure of the data.
安全问题涉及管理和技术手段,以避免损失和未授权的访问,破环,使用或者数据泄露。
You've learned how to create and deploy an application on the Apache Geronimo application server, securing directory content from unauthorized access.
您已经学习了如何在ApacheGeronimo应用服务器上创建并且部署应用程序,保护目录内容不受非授权的访问。
EnSTratus holds encryption keys and manages user access from its own SaaS solution, shielding data housed in the public cloud from unauthorized access.
EnSTratus持有密钥并管理用户获得属于其的SaaS解决方案,保护储存于云中的数据不受到未认证用户的读取。
More precisely, security is the process of applying various techniques to prevent unauthorized parties, known as intruders, from gaining unauthorized access.
更准确地说,安全性是一个过程,它应用多种技术来防止未经授权的用户(通常称为入侵者)对内容进行未经授权的访问。
Many of these email scams involve a hijacked account being remotely accessed and Gmail's new feature addresses specifically that - remote unauthorized access.
很多邮件欺诈会挟持邮件账户,进行远程访问,Gmail的新功能就是为解决这个问题:未经授权的远程访问。
Attack An attempt to circumvent the security measures in place on a network either to gain unauthorized access to the system or to force a denial of service.
试图破解网络上某一处的安全防护措施,以便在未获得授权的情况下访问系统或者是遭到服务拒绝。
Attack An attempt to circumvent the security measures in place on a network either to gain unauthorized access to the system or to force a denial of service.
试图破解网络上某一处的安全防护措施,以便在未获得授权的情况下访问系统或者是遭到服务拒绝。
应用推荐