单词 | md5 | ||||
释义 | md5
例句释义: 信息摘要5 1. In the later framework, MD5 is defined as an abstract class which can be extended, but its implementation is not trivial. 在Silverlight2的框架中,MD5被定义为抽象类,可对其进行扩展,但实现起来非常繁琐。 www.infoq.com 2. The MD5 algorithm is one of the industry standard methods for generating digital signatures. 这个MD5算法是用来创建数字签名的工业标准方法中的一种。 osl.bsw.net.cn 3. The design of a simulation system security log user interface, using MD5 algorithm users log on password security authentication. 设计一个模拟的系统用户安全登录界面,采用MD5算法实现用户登录口令的安全认证。 www.dgmini.com 4. Almighty hexadecimal conversion, encoding conversion, MD5 cracking in support of Thunderbolt, Express, Cyclones dedicated link conversion. 全能进制转换、编码转换、MD5破解、支持迅雷、快车、旋风专用链接转换。 dictsearch.appspot.com 5. The GUI tools do not expose controls that enable selection of the certificate signing algorithm, and they default to MD5 signatures. 但GUI工具不能公开那些支持选择证书签名算法的控件,因此默认支持MD5签名。 www.ibm.com 6. The password option specifies the MD5-encrypted password used to gain access to GRUB's interactive boot options. password选项指定了使用MD5加密的口令,用于访问GRUB的交互式引导选项。 www.ibm.com 7. Security researchers have recently demonstrated exploits against the MD5 algorithm which allowed them to forge usable certificates. 安全调查人员最近证明,利用MD5算法允许他们伪造可用的证书。 www.ibm.com 8. Many modern PHP installations use MD5 or higher salts, which use a strong 12-character salt, but don't take anything for granted. 许多现代PHP安装使用MD5或更高的salt,它们使用强大的12个字符的salt,但是,不要对任何事情想当然。 www.ibm.com 9. You can compare the published MD5 values with the checksum of the downloaded files to check if the downloaded file is corrupt or incomplete. 可以将公布的MD5值与所下载文件的校验和进行比较,以检查下载的文件是否已损坏或不完整。 download.boulder.ibm.com 10. Admin Panel passwords are MD5 encrypted for your protection from intrusion. 管理小组为您的密码的MD5加密的入侵保护。 www.bing.com 1. The authors have identified and notified a number of signing authorities who still have active certificates with MD5 signatures. 演讲者提醒了几家仍然有MD5签名证书处于生效状态的签发机构。 www.infoq.com 2. Authentication may be through simple passwords or through MD5 cryptographic checksums. 验证可以通过简单的密码,或通过加密的MD5校验。 chinaunix.net 3. On this basis, it analyzes MD5 message digest encryption weaknesses and deciphering means. 在此基础上分析MD5散列算法的弱点及其破译手段。 www.ecice06.com 4. This package contain ASP code for generating an MD5 'digest' or 'signature' of a string. 这个包中包括了ASP代码,可用来创建一个MD5‘摘要’或者‘符号’串。 osl.bsw.net.cn 5. To guard against such an attack, root and signer certificates based on the MD5 hash should not be trusted. 为防止此类攻击,基于MD5哈希的根证书和签名者证书不应受信任。 www.ibm.com 6. Here, you have created a database realm that used MD5 digest for passwords with hex encoding and a database pool to connect to the database. 这里,您已经创建了一个数据库域(其密码使用十六进制编码的MD5摘要),以及一个用以连接到该数据库的数据库池。 www.ibm.com 7. Check that your password is actually correct, and that MD5 is in the box. 核实一下你的密码的确是正确的,而且MD5在栏中。 www.zzbaike.com 8. You can populate the tables for this example by running the script db-md5-hex-data. sql (provided in the download materials). 您可以通过运行脚本db-md5-hex-data.sql(在下载资料中提供了该脚本)来为这个示例填充相应的表。 www.ibm.com 9. Master and member node compare their MD5 hash values to determine if changes occurred. 主节点和成员节点比较其MD5哈希值,确定路由信息是否发生变化。 technet.microsoft.com 10. All virus scanner detection's are a false-positive as long as the MD5 matches. 所有的病毒扫描程序检测的是一个长的MD5匹配的假阳性。 apps.hi.baidu.com 1. If the network is insecure, but you're either not very paranoid or concerned about minimizing CPU resources, use md5. 如果您的网络不够安全,但您不是特别多疑,或者不是很关心最小化CPU资源的使用,那么应该使用md5。 www.ibm.com 2. Then the local bridgehead server uses the DIGEST_QUERY verb to request the MD5 hash from the remote bridgehead server. 然后,本地桥头服务器使用DIGEST_QUERY动作向远程桥头服务器请求MD5哈希值。 technet.microsoft.com 3. This revision is actually the MD5 hash of the document, automatically added by CouchDB. 这个修订实际上是文档的MD5哈希表,由CouchDB自动添加。 www.ibm.com 4. It uses the user ID as the key, and the value is the password stored as an MD5 hash. 它使用用户标识作为密钥,其值为作为MD5散列存储的密码。 www.ibm.com 5. First, the bridgehead servers compare their MD5 hashes to detect any changes to link state information. 首先,桥头服务器比较其MD5哈希值,检测链路状态信息是否发生任何变化。 technet.microsoft.com 6. Use this algorithm for improved security over the MD5 algorithm. 使用该算法可以获得比MD5算法高的安全性。 msdn2.microsoft.com 7. For example, let's consider the relatively common case of MD5-hashing a file and determining the hex value of that hash. 打个比方,考虑比较常见的情况,使用MD5哈希一个文件,并确定该哈希的十六进制值。 www.infoq.com 8. We use MD5 algorithm to examine the integrity of documents and BP neural network to verify the signer's identity. 应用MD5算法检修公文的完全性和BP神经网络实现发送方身份的认证。 www.starlunwen.com 9. Now the MD5 algorithm will falsely verify that the signature matches the new contents. 因此MD5算法会错误地认为签名与新内容是匹配的。 www.infoq.com 10. A common use for MD5 is for password encryption as it is one-way in nature. MD5的一种通常用法是作为加密的方法,因为实质上它是单向的。 cosoft.net.cn 1. Changing to a more complex algorithm, say from MD5 to SHA-2, 16 does little to restore password integrity. 变更为更复杂的算法,比方说从MD5变更为SHA-2,16对恢复秘密的完整性没什么作用。 www.ibm.com 2. MD5 value of the document produced at the same time the source file using DES encryption, and signature private key encryption. 对文件产生MD5值同时对源文件用DES加密,并用私钥加密签名。 www.hackchina.com 3. This script will populate the database with the MD5 digest passwords encoded in hex format. 这个脚本将使用十六进制格式编码的MD5摘要密码来填充数据库。 www.ibm.com 4. Robust checksum algorithms like MD5 and SHA do much more than simply take the remainder when dividing by 256. 健壮的校验和算法如MD5和SHA并不仅仅取其除以256的余数,它完成的要多得多。 www.ibm.com 5. The MD5 sum also matches what was seen before the corruption. MD5总和与损坏之前所看到的相匹配。 www.ibm.com 6. MD5 catalog tools - Tools for maintaining file catalogs in directory trees. 用来维护子目录树状图的文件目录工具。 osl.bsw.net.cn 7. Since MD5 hashing has been broken, the client wisely stipulated that all keys must be signed using SHA-1 instead. 由于MD5散列法已经被破坏,客户明智地规定,所有密匙必须使用SHA-1签名。 www.ibm.com 8. will output the MD5 digest of the string "hello" in hexadecimal format. 将采用十六进制的格式输出字符串“hello”的MD5摘要。 www.ibm.com 9. The method of differential analysis on collision attacks against MD5 was analyzed. 针对MD5的碰撞攻击,分析了差分分析的步骤和方法; kns50.chkd.cnki.net 10. Delay's first version was a command-line application which verified the files checksums using MD5, CRC-32, or SHA-1. Delay发布的第一版本是命令行应用程序,可用于检验使用了MD5、CRC-32或SHA-1算法的文件验证码。 www.infoq.com 1. To validate credentials, the user password is hashed using the MD5 algorithm and compared to the stored value. 为了验证凭据,将使用MD5算法对用户密码进行哈希运算并将计算出来的值与存储的值进行比较。 msdn2.microsoft.com 2. This tools checking and source control using check sum algorithm like MD5, SHA and CRC. 这个工具通过使用检验和算法,如MD5,SHA和CRC来进行校验和源代码控制。 osl.bsw.net.cn 3. From the respect of technology, the system firstly adopts hi-technology such as MD5 password encrypt and validate code. 从技术层面讲:采用MD5密码加密和验证码等技术,实现了各级各类用户的安全登录; www.bing.com 4. BEFORE saving, remember to select "MD5" in the "function" dropdown list. 注意,在保存之前需要在“密码”这一行的“函数”下拉列表中选择MD5。 www.bing.com 5. However the MD5 algorithm is much faster in calculating the message digest. 但是,MD5算法在计算消息摘要方面要更快一些。 www.ibm.com 6. In addition, the TLS layer will check each record for tampering by computing the HMAC_MD5 hash of the contents. 此外,TLS层还会通过计算消息内容的HMAC_MD5哈希值来校验每一条消息是否被篡改。 www.infoq.com 7. Once you have done that, click the dropdown menu indicated, and select MD5 from the menu. 你一旦完成了这一步,点击显示的下拉菜单,并且从菜单中选中MD5。 www.zzbaike.com 8. Some people get paranoid when they hear MD5 because it has some weaknesses. I certainly don't advocate using it as-is. 有些人一听到MD5就感到恐慌,因为它存在一些弱点,我原先也很不提倡使用它。 www.infoq.com 9. Retrieves the MD5 message-digest algorithm. 撷取MD5讯息摘要演算法。 technet.microsoft.com 10. If the MD5 values are different, the routing group member processes the OrgInfo packet. 如果MD5值不同,路由组成员便会对OrgInfo数据包进行处理。 technet.microsoft.com 1. Finger prints: Shows the SHA1 and MD5 fingerprints of the CA certificate. Fingerprints:显示CA证书的SHA1和MD5指纹。 www.ibm.com 2. Both use MD5 for passwords . I make tests and the password transfer works fine. 双方的密码使用MD5。我做测试和密码调水工程的罚款。 www.bing.com 3. This GUID follows next in the link state table. 此GUID在链路状态表中位于MD5摘要的后面。 technet.microsoft.com 4. The MD5 algorithm is the de facto hashing standard for digests. MD5算法是事实上的标准摘要哈希算法。 www.ibm.com 5. This security realm example uses "MD5" with "hex. " 这个安全领域示例使用了十六进制编码的MD5。 www.ibm.com 6. The technique we use to generate the token is based on computing an MD5 hash from the content of the page. 我们用来产生记号的技术是基于从页面内容计算MD5哈希值。 www.infoq.com 7. Get an MD5 hash of your password. 得到你的密码的MD5杂乱信号。 www.zzbaike.com 8. Copy this into your grub. conf after password -md5 but on the same line. 将这个口令拷贝到grub.conf中password-md5之后,但是要在同一行上。 www.ibm.com 9. To make an attack, the attacker needs to buy several SSL certificates from CAs who sign certificates with the MD5 algorithm. 要实现攻击,攻击者需要先从使用MD5算法签署证书的CA购买若干SSL证书。 www.infoq.com 10. Many download sites list the MD5 hash along with the download link. 许多下载网站在下载链接旁一并列出了MD5哈希值。 bbs.360.cn 1. HMAC can be used with any iterative cryptographic hash function, such as MD5 or SHA-1, in combination with a secret shared key. HMAC可以与任何反覆式的密码编译杂凑函式(例如MD5或SHA-1)一起使用,并与秘密共用金钥组合。 technet.microsoft.com 2. Switch to the SSL tab view, and specify a cipher specification (in this case, use RC4_MD5_US). 切换到SSL选项卡视图,然后指定一个密码规范(在这个例子中使用RC4_MD5_US)。 www.ibm.com 3. Choosing between MD5 and SHA-1 is a tradeoff between security and performance. 在MD5和SHA-1之间作选择是安全性和性能之间的权衡。 www.ibm.com 4. Security - We will store a MD5 key within each Archive file so that manipulation of the Archive Files will be detected instantly. 安全-我们将在每一个档案文件内部存储一个MD5值,这样的话对于档案文件的操作将被直接检测到。 www.cnblogs.com 5. Some key data, such as the password, is encrypted by the encrypting technology, such as MD5 and DES. 对于一些关键的信息如密码,选用了如MD5及DES加密技术。 www.sosheji.com 6. In response to these decoding methods, it proposes an iterative algorithm based on MD5. 针对这些破译方法提出基于MD5的迭代散列算法。 www.ecice06.com 7. To generate an md5 password, run the tool grub-md5-crypt (as root), which comes with GRUB. 为了生成一个md5口令,请运行GRUB所附带的grub-md5-crypt工具(以root身份)。 www.ibm.com 8. It then will output the MD5-encrypted password. 然后输出使用MD5加密的口令。 www.ibm.com 9. The files are digitally signed using both PGP and md5. 文件使用PGP和MD5进行了数字签名。 www.ibm.com 10. You can choose from three authentication schemes: crc, md5, or sha1. 有三种认证模式可以选择:crc、md5或sha1。 www.ibm.com 1. The server has access to either the raw password, or a stored MD5 hash that was created when the password was set. 服务器有权访问原始密码或在设置密码时创建的已存储的MD5哈希表。 msdn2.microsoft.com 2. Passwords are stored using a Message Digest 5 (MD5) hash digest. 使用消息摘要5(MD5)哈希摘要存储密码。 msdn2.microsoft.com 3. He warns about MD5 as considered insecure and suggest using SHA2. 他警告MD5并不安全并建议用户使用SHA2。 www.infoq.com 4. In 0. 21 seconds, the first result is "Google Hash: md5(foobar) = 3858f62230ac3c915f300c664312c63f" . 秒内,第一个结果是“GoogleHash:md5(foobar)=3858f62230ac3c915f300c664312c63f”。 www.ibm.com 5. Cabinet good with Ha Xi calculator, supportive file procrastinates put, rate is very rapid, can calculate value of file MD5, SHA1, CRC32. 小巧好用哈希计算器,支持文件拖放,速度很快,可以计算文件MD5、SHA1、CRC32值。 dictsearch.appspot.com 6. The SHA algorithm is more secure, producing a 160-bit output compared to the MD5 algorithm's 128-bit output. 与MD5算法的128位输出相比,SHA算法更安全,它产生160位输出。 www.ibm.com 7. The two hash types currently in use are MD5 and SHA1. 当前使用的两种哈希类型是MD5和SHA1。 www.ibm.com 8. The DIGEST_QUERY verb contains the GUID of the Exchange organization and the MD5 hash of the local bridgehead server. DIGEST_QUERY动作包含Exchange组织的GUID及本地桥头服务器的MD5哈希值。 technet.microsoft.com 9. It can also use a password encrypted with the MD5 algorithm as opposed to the plain text password of LILO. 它还使用一个通过MD5算法加密的密码,而不是LILO的纯文本密码。 www.ibm.com 10. The type attribute indicates the hash algorithm, such as Message-Digest algorithm 5 (MD5) or Secure Hashing Algorithm (SHA-1). 类型属性指出了hash算法,例如消息摘要算法5(MD5)或安全哈希算法(SHA-1)。 www.ibm.com 1. I have used a javax. security MessageDigest to compute the MD 5 hash code. 我使用了javax.securityMessageDigest来计算MD5哈希码。 www.infoq.com 2. For example, take the MD5 hash of "foobar" : 3858f62230ac3c915f300c664312c63f. 举例来说,利用“foobar”的MD5散列:3858f62230ac3c915f300c664312c63f。 www.ibm.com 3. For example, the program calculates MD5 checksums to identify identical files. 举例来说,程序计算MD5checksums以辨识出完全相同的文件。 www.gnu.org 4. Verify that the sources are not corrupted by using MD5 message digests 通过使用MD5消息摘要,验证源代码没有受到破坏 www.ibm.com |
||||
随便看 |
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。