It allows the attacker to impersonate the victim.
这将允许黑客冒充受害者。
It's against my programming to impersonate a deity.
我的程序不能让我模仿神。
Be natural - don't impersonate the writing style of successful bloggers.
自然——不要冒充写作风格成功的博客。
Don't force me to impersonate a chicken. Please, don't make me fall that low.
请不要再逼我模仿一只鸡了,不要让我落到这个地步。
Describes how to use the EXECUTE AS clause to impersonate another user.
描述如何使用EXECUTE A s子句来模拟另一用户。
A. Robert Lee (Bruce's younger brother) told me: 'Don't impersonate' him.
答:李振辉(李小龙弟弟)对我说:不要去“演”他。
Tie a scarlet cape around your neck if you want to impersonate Harry as a Quidditch player.
如果你模仿的是打魁地奇的哈利,那么别忘了哈利的猩红色斗篷。
Retirees from Rainier climes irrigate green lawns that impersonate the grasslands they left behind.
雷尼尔山的退休人员在退休后模仿他们工作过的草地在自家造了绿色草坪并直接用水灌溉草坪。
You login as the client manager and select the name of the user that you would like to impersonate.
您以客户机管理人员的身份登录,并选择您希望模拟的用户的姓名。
If a user's Kerberos password is stolen by an attacker, then the attacker can impersonate that user.
如果一个用户的Kerberos密码被攻击者窃取,攻击者就能够模拟该用户。
The server can impersonate the client, but the impersonation token will not contain any information.
服务器可以模拟客户端,但是模拟标记不会包含任何信息。
The server (and developers/ops) never receives the user private key and cannot impersonate the user.
服务器(和开发人员/操作)从不接收用户私钥,并且不能模拟用户。
Sure, it can be harmless to impersonate a celeb online or create a fake profile for a movie character.
当然,在网上冒充一个名人或是为一个电影角色创建虚假资料都是无害的。
To test their procedures, they needed a man and a woman to impersonate a married couple for multiple sessions.
为了测试他们的流程,他们在很多时候需要一个男人和一个女人来模仿已婚夫妇。
If an LTPA token is successfully captured, the thief can impersonate the user identified until it expires.
如果ltpa令牌被成功截获,则窃取者可以模拟该用户的身份,直到它到期为止。
The reporter detects the out packing of these products to up basically don't impersonate product component.
记者发现这些产品的外包装上根本就没有体现产品成分。
You may not pretend that you are, or that you represent, someone else, or impersonate any other individual or entity.
您不得假装自己是其他人或代表其他人,也不能冒充任何其他个人或实体。
For impersonate newly married of pleased celebrate atmosphere, the local can have some fresh gorgeous and bright hues.
为体现新婚的喜庆气氛,局部可以有一些鲜艳、明亮的色彩。
The virus then USES the information to impersonate people online, with little or no external guidance from the thieves.
该病毒然后利用这些信息来模拟人上网,很少或根本没有外部的指导窃贼。
So long as, with reasonable success, I can impersonate "Joyce Carol Oates," it is not the case that I am dead and done for-yet.
只要我能扮演好“乔伊斯·卡洛尔·欧茨”,取得一定的成绩,我还不需担心自己会死或者垮掉——至少目前如此。
You may not use a false email address, impersonate any person or entity, or otherwise mislead as to the origin of any content.
您不得使用虚假的电子邮件地址、冒充任何人或实体,或以其他方式误导任何内容的来源。
The server can impersonate the client for access control list (ACL) checking, but it cannot access system objects as the client.
服务器可以模拟客户端以进行访问控制列表(acl)检查,但是无法作为客户端访问系统对象。
It is not invariably the case that a teacher is also a writer, and that, as a teacher, she has been hired to impersonate the writer.
实际情况并非单纯的一个老师身兼作家之职,事实上,她被学校聘为老师,就是为了扮作那个作家。
By forging these cookies, an attacker can impersonate a valid client, and thus gain information and perform actions on behalf of the victim.
通过打造这些cookie,一个黑客可以模拟一个有效的客户,因此获取详细信息并执行代表病毒的行为。
It is possible for unauthorized users to obtain the unique information that is used for digital signatures and attempt to impersonate a sender.
未经授权的用户可能获取用于数字签名的唯一信息,并冒充发件人。
And if the ca certificate (s) fall into the wrong hands, outsiders can create certificates that can impersonate a valid member of your organization.
一旦ca证书落到不正当的人手中,外部的人就可以创建证书伪装成您公司的一个合法成员。
Tax Planning impersonate in the severalty link of the taxpayer abearance course, piercing through in the enterprises decision-making all the time .
税务筹划在企业运行中处于举足轻重的地位,因此它是企业决策不可或缺的前提。
With the token of the legitimate user in hand, the attacker can proceed to act as the user in interaction with the site, thus to impersonate the user.
手边有了合法用户的标记,黑客可以继续扮演用户与站点交互,从而冒充用户。
With the token of the legitimate user in hand, the attacker can proceed to act as the user in interaction with the site, thus to impersonate the user.
手边有了合法用户的标记,黑客可以继续扮演用户与站点交互,从而冒充用户。
应用推荐