单词 | password |
释义 | passwords是password的复数
复数:passwords n. code word,open sesame,secret word,PIN,key 例句释义: 密码,口令,〔军〕口令,〔金融〕通行字,密码设置,设定密码,已储存密码 1. Researchers at Microsoft have come up with a way to create easy-to-remember passwords without making a system more vulnerable to hackers. 微软研究人员已经发明一种创建简单易记密码的方法,同时也会使系统更容易被黑客攻击。 www.bing.com 2. The bank's service desk had six full-time employees dedicated to dealing with 160, 000 requests for new passwords a year. 银行的服务台有6名全职员工,专门负责处理每年达16万次的索取新密码的请求。 www.ftchinese.com 3. He then changed all the passwords so I now have no clue who we owe or how much. 然后他改变了密码,所以我现在没有线索知道我们欠款的对象,也不知道欠了多少。 bbs.putclub.com 4. If you use more than one computer, keeping bookmarks and passwords synched between the machines can be a bit of a hassle. 如果你不止使用一台电脑,在不同电脑之间保持书签和密码同步可能有点麻烦。 www.bing.com 5. It is typically used to steal passwords and other data, or to open a "back door" to a computer so that it can be taken over by outsiders. 它通常被用来窃取密码和其他数据,或打开计算机“后门”以便入侵者控制。 www.ecocn.org 6. An alternative response to that risk is to use strong passwords, gibberish characters adding up to at least 10 characters. 对这种风险的另一种替代反应是使用难以破解的强密码——至少长达10个字符的一串乱码。 dongxi.net 7. Any discussion of system security would be incomplete without at least a cursory word or two on the topic of passwords. 如果没有(哪怕是粗略地)提到一两句关于密码的话题,那么任何关于系统安全性的讨论都将是不完整的。 www.ibm.com 8. Use any form of authentication that requires passwords to be encrypted. Do not encrypt data. 使用要求加密密码的任何格式的身份验证。不要加密数据。 angel.w15.5tom.cn 9. Establish and enforce a policy that forbids users from keeping their passwords written down in an easy-to- find location . 建立并实施以下策略:禁止用户将其密码记在容易找到的位置。 www.bing.com 10. If you are tired of trying to come-up with secure passwords, Password Architect is for you! 如果您已厌倦试图来跟进与安全的密码,密码建筑师是为您服务! xtdownload.com 1. After a few hours he was released when he gave away his email and blog passwords. 经过数个小时,当他交出他电子信箱与部落格的密码后,他就被释放了。 zh.globalvoicesonline.org 2. We were favorably surprised by how much time we saved by using our fingerprint, rather than typing passwords into various Web sites. 我们很高兴地发现,使用指纹认证登录网站而非输入密码能节省大量时间。 www.englishfree.com.cn 3. There she found many giants standing in line to get out of the city, waiting to give their passwords to the gatekeeper. 她发现很多巨人排着队等着出城,要把他们的口令说给门卫。 www.bing.com 4. Attempts to break passwords with a dictionary file. Used by clicking on the password box with the program running. Not always Successful. 破解密码的字典文件。运行程序后点击密码框。不一定奏效。 tieba.baidu.com 5. Until I read Nielsen's blog post, I felt that masking passwords was just a necessary part of the process. 在读到尼尔森的博文之前,我一直觉得屏蔽密码本来就是过程的一部分。 www.bing.com 6. He said : "I suggest that customers were all down in the network account passwords property planning document. " 他说:“我建议客户,把网络帐号的密码统统抄录在财产规划文件里。” www.anti-spam.cn 7. However, I would say that learning and memorizing user names and passwords in this digital age is just as important of a responsibility. 不过我认为身处数字时代,掌握用户名和密码,并牢牢记住它们,恰恰就是一项重要的责任。 www.bing.com 8. The stored passwords can only be accessed by the use of a master password or other authentication method defined by the user. 存储的密码只能访问使用一个主密码或其他身份验证方法由用户定义。 www.orderble.com 9. Your tool would need some sort of secure repository that contains the users' ID files and passwords to read from. 该工具需要某种类型的安全知识库,其中包含了要读取的用户ID文件和密码。 www.ibm.com 10. If your family's used to using just one account, it might sound like a big deal to ask everyone to use separate accounts and passwords. 如果你们家习惯使用同一个账户,就需要询问每个人的帐户和密码,这样会变得很麻烦。 blog.sina.com.cn 1. Part of the reason is that even a well-designed password-based system is usually easy to break since users almost always pick bad passwords. 部分原因是,即使一个设计很好的基于密码的系统也通常易于攻破,因为用户几乎总是选择使用容易被破解的密码。 www-128.ibm.com 2. The bottom line is put some effort into choosing good passwords, especially for important accounts like the root user. 底线是要花点力气选择一个优良的密码,尤其对于像root用户这样的重要帐户,更应如此。 www.ibm.com 3. User can double click on any of the entry to visit the website which makes it easy to verify sign-on passwords. 用户可以双击条目的任何访问该网站,可以很容易地验证登录密码。 www.jisuxz.com 4. Now for the unsexy talk of good passwords, which might have prevented at least some Hollywood Leaks attacks, based on the group's claims. 根据一项集体声明,好的密码使不少人免受“好莱坞泄密”组织的攻击。 dongxi.net 5. Until I made it a habit to put the passwords into a separate file, I revealed my access codes more than once. 在我养成把密码放到单独的文件之前,我不止一次泄露过我的登陆代码。 wiki.perlchina.org 6. The author used to be in the habit of choosing passwords that could be typed with one hand at different positions on the keyboard. 作者过去选择密码的习惯是可以用单手在键盘上的不同位置键入。 www.ibm.com 7. Without such restrictions, people tend to pick passwords that are easy to remember, easy to type--and easy to guess. 没有此类限制,人们倾向于选择易记、易打同时也是易猜的密码。 www.bing.com 8. Standard PDF Encryption with owner and user passwords used to be the only PDF protection. 标准的PDF加密与用来保护PDF格式的唯一拥有者和用户密码。 www.jisuxz.com 9. This sort of table is commonly used when employing forms authentication, and in many applications the passwords are stored as clear text. 使用窗体身份验证时通常使用此类型的表,而且在许多应用程序中,密码以明文形式存储。 www.cnblogs.com 10. That sounded reassuring but raised a bunch of questions: Why would hackers post people's passwords on an Internet forum for all to see? 这似乎让人松了一口气,不过又引出了一大串疑问:黑客把大家的密码放出来给所有人看,这葫芦里究竟卖的是什么药? www.bing.com 1. However, the company stressed that user accounts were not hacked, so there was no need for users to change their passwords. 但,该公司强调用户的帐户信息未受攻击,因此用户无需更改密码。 www.bing.com 2. Still, if it's true that complex passwords do not increase security, then why the heck should we bother using them? 但是,假如复杂密码真的无法增加安全性的话,我们又何苦费力不讨好呢? www.bing.com 3. Because the majority of passwords are often simplistic, running a dictionary attack is often sufficient to to the job. 因为大多数密码通常是简单的,所以运行字典攻击通常足以实现目的了。 www.ibm.com 4. Depending on the setup of your MySQL server and its security settings and passwords, your command might vary a bit. 根据MySQL服务器的设置及其安全设定和口令,命令可能略有不同。 www.ibm.com 5. In the announcement, the Chrome team did not specify if passwords will be synced as well. 在这消息中,Chrome团队并没有说明密码是否也可以同步。 www.bing.com 6. If you suspect that this account is being used fraudulently , change the account password immediately using complex passwords . 如果怀疑此帐户的使用存在欺骗性,应立即使用复杂密码更改帐户密码。 www.bing.com 7. It is not necessary to store the original passwords to be able to compare them with user-provided passwords. 我们没有必要存储原始密码,以使得能够将它们与用户提供的密码进行比较。 www.ibm.com 8. Use passwords that have at least eight characters and include numbers or symbols. The longer the password, the tougher it is to crack. 您的密码至少应该由八个字符(包括数字和符号)组成,且密码越长越安全。 www.yiai.org 9. We do not recommend or permit You to share Your account with anyone, and advise You to safeguard Your passwords. 我们不建议您还是让你分享任何帐户,劝你维护你的密码。 64.233.179.104 10. Because hashed passwords cannot be recovered , users at sites that use hashed passwords can only reset their passwords . 由于无法恢复哈希密码,站点上使用哈希密码的用户只能重置密码。 www.bing.com 1. Jack: It's very easy to break it. There is a report in the newspaper about the top 10 worst passwords, you would read it yourself. 它很容易被破解。报纸上有一篇关于10大最烂密码的报道,你自己看看吧。 www.bing.com 2. If you're sharing passwords, change them the minute you think a breakup is about to happen. 如果你共享密码了,在分手那一刻开始就得去改密码。 cnbeta.com 3. None of these protocols allowed for internationalization, all sent passwords in plain text, and none of them were easily extensible. 这些协议都不支持国际化,都使用明文传递口令,都不容易扩展。 www.ibm.com 4. The fact is accounts, passwords, and permissions can only protect your data in the context of an operating system that obeys stated rules. 实际上,帐号、密码和权限只能在遵守固定规则的操作系统环境中保护您的数据。 www.ibm.com 5. You put up a fence by making me login to comment. I have too many passwords already and I don't know you well enough to add one to my list. 你设下一道围墙,非让我登录才能评论。我的用户名和密码已经够多了,而你还让我再加一个。 blog.hjenglish.com 6. CHAOS Generator is an application designed to generate passwords of any length and character content. 混沌发生器是一种应用程序设计用来产生密码的任何长度的字符和内容。 xtdownload.com 7. User passwords are the only guarantee of the integrity of a user's edit history. 而用户密码是用户保存这种历史完整性的唯一保障。 meta.wikimedia.org 8. Common security features are ensuring passwords that are at least six characters long and encryption of sensitive data. 一般的安全特性是确保至少六个字符的密码,并且对敏感数据进行加密。 www.ibm.com 9. Use any form of authentication that requires encrypted passwords. Do not encrypt data. 使用要求加密的密码的任何格式的身份验证。不要加密数据。 angel.w15.5tom.cn 10. All connection information, including passwords, must be provided every time that OPENDATASOURCE is called. 每次调用OPENDATASOURCE时,都必须提供所有的连接信息(包括密码)。 technet.microsoft.com 1. Passwords must be at least 7 characters long, and at least one of the characters must be non-alphanumeric. 密码必须至少为7个字符,并且其中至少有一个字符为非字母数字字符。 msdn2.microsoft.com 2. Although passwords can be used to maintain confidentially in E-mail , some systems have no such security measures. 在电子邮件中虽然也可用密码来保密,但不少系统均无这一类的安全措施。 www.hotdic.com 3. Furthermore, if you hash incoming passwords manually AuthComponent will not be able to log you in at all. 此外如果你手动给密码进行加密,验证组件不会让你登陆。 www.bing.com 4. He and other security experts recommend people change or rotate passwords a few times a year. 他和其他安全专家建议人们每年更改或轮换几次密码。 c.wsj.com 5. Given the popularity of passwords, how can you choose one that are sufficiently complicated to be secure yet are simple enough to remember? 密码流行起来后,你怎样选择密码,密码才能足够复杂以保证安全但又足够简单以方便记忆? www.fdkaoyan.com 6. Enter usernames and passwords one namespace at a time, clicking the Save icon next to that namespace entry after each one. 逐个为名称空间输入用户名和密码,然后在每次输入完毕后单击名称空间项旁的Save图标。 www.ibm.com 7. One of the passwords also opened the company's corporate Google account. 其中一个密码同时可打开该公司的谷歌企业账号。 www.bing.com 8. With users' passwords traveling over the network in plain text, you do not meet the requirement for secure authentication. 由于用户密码是在网络上以正文文本格式传输的,因此这并不能满足安全身份验证的需求。 www.ibm.com 9. With only a few clicks, administrators can create and delete users and groups, modify group memberships, and change user passwords. 只需要少许单击操作,管理员便可以创建和删除用户和组、修改组成员以及更改用户密码。 www.ibm.com 10. Someone needs to be around to feed passwords to any software needing encryption keys. 旁边需要一个人来为需要加密密钥的任何软件提供密码。 www.ibm.com 1. This access is usually accomplished through passwords, user IDs, and other application-level security. 这存取通常透过密码、使用者ID和其他应用层安全方法。 dictsearch.appspot.com 2. As you'll see later, this can seriously damage network security allowing attackers to capture passwords and sensitive data. 正如您稍后将会看到的,这可能严重地损害网络安全性,使攻击者捕获密码和敏感数据。 www.ibm.com 3. Passwords enable authorized users to remove protection from the document; because there is no password, protection cannot be easily removed. 密码使经过授权的用户可以移除文档的保护;因为如果没有密码,就不太容易移除保护。 msdn2.microsoft.com 4. Electronic money (in the form of digital bits) requires a complex set of codes, passwords, firewalls, etcetera. 电子货币(形式的数位比特)需要一套复杂的代码,密码,防火墙,等等。 www.cyut.edu.tw 5. "Google detected and has disrupted this campaign to take users' passwords and monitor their emails, " the company said on Wednesday. 谷歌在周三表示,“公司探测并阻止了这些行动。” www.bing.com 6. Which means a database is going to be used to retrieve usernames and passwords. 这意味着要使用数据库来检索用户名和口令。 www-128.ibm.com 7. Passwords are the first line of defense against intruders, so setting strong passwords is essential to the security of your system. 密码是抵御入侵者的第一道防线,因此设置强密码对于系统安全是绝对必要的。 technet.microsoft.com 8. As I said just now, you can't store passwords in clear text, and they must be encrypted or hashed. 前面提到,密码是不能用明文储存的,必须经过加密或者散列处理。 www.jukuu.com 9. Some system passwords every minute changes, users often in a specified time, unable to complete the importation. 有些系统中的密码每分钟都在变,用户经常在规定时间内无法完成输入。 www.brar.cn 10. You can use it to get back passwords you might have forgotten and some other purposes (use your imagination here). 你可以使用它来找回你可能已经遗忘的密码,以及其他的目的(这里使用你的想象)。 www.bing.com 1. Change your main account's password along with any other passwords that are involved (mail accounts, FTP accounts). 改变你的密码,随着主要帐户密码,涉及任何其他(邮箱帐号、ftp帐户)。 bbs.idcspy.com 2. User accounts can be unlocked but cannot be locked. Accounts are locked out by too many logon attempts with bad passwords. 用户帐户可以解锁但不能锁定。帐户已因为使用错误密码登录次数太多而被锁定。 angel.w15.5tom.cn 3. Kaspersky Password Manager securely stores your passwords and personal data in a dedicated, encrypted database on your computer. 卡巴斯基安全密码管理器存储您的密码和个人数据在专用的加密数据库在计算机上。 www.orderble.com 4. The software allows you to sort passwords into groups which then can be modified or deleted at any time. 该软件可让您排序密码群体然后可以修改或删除任何时候。 bbs.dospy.com 5. Do not use this utility for illegal activity, and do not use it for getting passwords of a computer that is not yours. 请勿将本工具用于非法活动,请勿用于获取他人电脑上的密码。 bbs.houdao.com 6. It can also recover the passwords stored in Credentials file of external drive, as long as you know the last log-on password. 它也可以恢复证书的外部驱动器在文件中存储的密码,只要你知道最后登录密码。 www.jisuxz.com 7. Hackers 'will take the first 100 passwords on the list and go through the entire user base' of a website to crack a few accounts, he says. 他说,黑客“会使用名单上的前100个密码攻击网站上的所有使用者数据库”,以攻破一部分帐户。 c.wsj.com 8. Theft of game passwords was rife in Asia, where online games were highly popular, he said. 特纳表示,在网络游戏十分流行的亚洲,盗取游戏密码的行为非常普遍。 www.ftchinese.com 9. However, if you store the passwords on your computer, anyone who has access to your computer also has access to all of the passwords. 但是,如果将密码存储在计算机上,则访问计算机的任何人也都可以访问所有密码。 windowshelp.microsoft.com 10. A typical example is stealing passwords, but information disclosure can involve access to any file or resource on the server. 一个典型的示例是偷窃密码,但信息泄露可以涉及对服务器上的任何文件或资源的访问。 msdn.microsoft.com 1. Using LDAP policy will fail because Workplace Services Express uses simple passwords, which do not meet the password policy. 使用LDAP策略将会失败,因为WorkplaceServicesExpress使用简单密码,不满足密码策略。 www-128.ibm.com 2. Description: Passwords is a useful application that enables you to store different username and password pairs . 说明:密码是一个有用的应用,使您可以存储不同的用户名和密码对。 dictsearch.appspot.com 3. Samba stores a lot of information at run time, from local passwords to a list of clients it is expecting to hear from. 在运行时,Samba存储许多信息,从本地密码到希望从中收到信息的一系列客户端。 www.ibm.com 4. Win Sniffer allows network administrators to capture passwords of any network user. 赢得嗅探器允许网络管理员密码捕获的任何网络用户。 xtdownload.com 5. This ensures security while still being able to verify future passwords against the cached item. 这确保了安全并同时仍能可以根据所高速缓存项而验证未来的密码。 www.ibm.com 6. Most instance-level operation commands do not accept user IDs or passwords as part of the input. 大多数实例级操作命令不会接受用户ID或密码作为输入部分。 www.ibm.com 7. So-called brute force attacks, by which hackers try to guess individual passwords, also appear to be on the rise, Mr. Barrett says. 巴雷特说,所谓的暴力破解攻击,即黑客试图猜出个人密码的行为,似乎也正在增加。 c.wsj.com 8. Allied Irish Bank (AIB) had an all-too-familiar and costly problem two years ago: its employees kept forgetting their passwords. 两年前,爱尔兰联合银行(AlliedIrishBank)出现了一个十分常见、成本又高的问题:员工总是忘记密码。 www.ftchinese.com 9. Social Engineering is the tricking of an unsuspecting administrator into giving the account ID and passwords over to an attacker. 社交工程是哄骗一个毫无疑虑的管理员向攻击者说出帐户标识和密码的欺骗方法。 www-128.ibm.com 10. Microsoft clients pass passwords around the network as a Microsoft-specific hash rather than plain text or a UNIX password hash. Microsoft客户端以Microsoft专用的哈希而不是纯文本或UNIX密码哈希形式在网络中传递密码。 www.ibm.com 1. To help you create digested passwords for this example, a utility called encode. jar is included in the download materials. 为了帮助您为这个示例创建摘要密码,在下载资料中提供了名为encode.jar的实用工具。 www.ibm.com 2. At this point, you have to take it on trust that Topify has a more sustainable business model than simply scraping twitter passwords. 在这一点上,你必须要信任认为Topify拥有较简单的密码刮叽叽喳喳更可持续的商业模式。 terminal.blackmailedslave.com 3. Basically, what these applications do is remember your passwords and store them in an encrypted database behind one master password. 基本上,这些软件所做的就是把您的密码储存在一个加密的数据库里,然后您只需记住一个主密码即可。 www.bing.com 4. Attackers know that the simplest way to break into a computer system is not to "crack" passwords or access codes. 攻击者知道,侵入计算机系统的最简单的方式不是“破解”密码或访问码。 www-128.ibm.com 5. Simply run each cell with a different operating system user ID, different encryption keys, and different administrative passwords. 直接使用不同的操作系统用户ID、不同的加密密钥和不同的管理密码运行每个计算单元即可。 www.ibm.com 6. Consequently, he says, "I don't use a password manager; I write my passwords down on paper, slightly obfuscated. " 因此,他表示:“我不使用密码管理器,我把我的密码写在纸上,并略微加以模糊处理。” dongxi.net 7. Note: To ensure maximum security this number must be equal to or greater than the number of passwords required for the tasks that follow . 注意:为确保最高安全性,此数目必须等于或大于下列任务所需的密码数目。 dictsearch.appspot.com 8. They say onerous requirements for passwords have given us a false sense of protection against potential attacks. 他们认为密码过分的要求给了我们抵御潜在攻击的虚假的安全感。 www.infoq.com 9. Users who changed their passwords after the system state backup was made will find that their most recent password no longer works. 在创建了系统状态备份之后更改密码的用户将会发现他们的新密码不再有效了。 support.microsoft.com 10. Choose passwords that are strong enough to make cracking them too time consuming for thieves to bother. 选择那种足够强大以至让那些盗贼要费许多时间才可破解的密码。 www.ecocn.org 1. The authentication realm is displayed to a user to show which one of several possible user names and passwords can be used. 将向用户显示身份验证领域,以表明使用多个可能的用户名和密码中的哪一个。 technet.microsoft.com 2. Pass phrases are several words long, at least three, and are far more secure than passwords. 短语型密码是一些长单词组成,至少是三个单词,它比口令型密码更安全。 www.bing.com 3. Don't keep all your passwords taped on the bottom of your stapler. 别把你的密码都用胶布贴在订书机底部啦。 sfile.ydy.com 4. Properties of the package to protect packages by encrypting all or part of a package using passwords or user keys. 属性,通过使用密码或者用户密钥加密包的全部或部分来保护包。 msdn2.microsoft.com 5. Once set, passwords will no longer be cached and all password authentications will result in a query of the registry. 设置之后,就不再缓存密码,对于所有密码身份验证,都要查询注册表。 www.ibm.com 6. We ve also touched upon the weaknesses of each method and possible avenues that can be used to crack those passwords. 另外我们还介绍了每种方法的局限性,以及可以用于破解这些密码的可能途径。 www.bing.com 7. In any case, your return to your regular workplace is likely to be a favorable time to update your passwords. 无论如何,回到日常的工作场所可能是更新密码的好时机。 www.ibm.com 8. Extended characters used in passwords are case-sensitive, regardless of the database sensitivity setting. 口令中使用的扩展字符区分大小写,而与数据库的区分大小写设置无关。 www.ianywhere.com 9. Passwords are a simple tool for controlling access to computers, networks and online transactions, but wrong doers can steal or guess them. 密码是控制电脑存取、网路及线上交易的简单工具,却可能被坏人盗取或猜出。 dictsearch.appspot.com 10. To create a secure system, make all users use strong passwords, and do not give them any access they do not absolutely need. 要创建安全的系统,让所有用户使用强口令,不要给他们任何他们不是绝对需要的访问权。 www-128.ibm.com 1. This mandate requires that the IT organization put in place a set of processes to create, and maintain, monitor, and enforce passwords. 这个要求需要IT组织设置一组创建,并维护、监控,和实施密码的过程。 www.ibm.com 2. Passwords you use often should be changed at least every six months. 经常使用的帐号至少每半年换一次密码。 www.fortunechina.com 3. Property to define the requirements for passwords that are used to validate user accounts on your Web site. 属性定义对用以验证网站用户帐户的密码的要求。 msdn2.microsoft.com 4. The growing frequency of these attacks has pushed companies to seek other forms of data protection than simple passwords. 这种黑客攻击变得越来越频繁,促使一些公司在简单密码之外寻找其他形式的数据保护措施。 chinese.wsj.com 5. A hole enabling a hand to be put in to input passwords is formed under the shielding device and is shielded by a soft cloth. 遮挡器下面有手能伸进去输入密码的洞口,洞口由软布遮挡。 ip.com 6. We each have multiple accounts and use multiple passwords on an ever-increasing number of computers and Web sites. 我们每人都有多个账号,在数量不断增加的计算机和网站上使用多个口令。 www.educity.cn 7. Any cracker with a packet sniffer can grab the data off the wire and take the passwords . 带有信息包嗅探器的任何解密高手都可以从线路上抓取数据然后获得密码。 www.bing.com 8. From the Web sites you visit to usernames and passwords, spyware can put you and your confidential information at risk. 通过您访问网站的用户名和密码,间谍软件可能使您和您的机密信息处于危险之中。 www.bing.com 9. The new and confirmed passwords do not match. Try specifying and confirming your new password again. 新的和确认的密码不匹配。请再次指定并确认您的新密码。 www.drados.com 10. The default form of HTTP authentication, "basic authentication, " sends passwords in plain text. HTTP身份验证的默认形式“基本身份验证”会以明文发送密码。 www.ibm.com 1. Some Web sites try to thwart the attackers by freezing an account for a certain period of time if too many incorrect passwords are typed. 如果在一定时间段内输入错误密码次数过多,一些网站就会锁定账户,希望以此来抵御黑客攻击。 www.bing.com 2. Oftentimes it is a matter of being careful about assigning passwords to people and of changing them when people leave a company. 保护安全常常也是谨慎地将口令分配与人,并且在他们离开公司时更换口令。 www.educity.cn 3. Digest authentication transmits passwords over the network as a hash value for additional security. 为获得附加安全性,摘要式身份验证将密码作为一个哈希值通过网络传递。 technet.microsoft.com 4. Sony stored over 1, 000, 000 passwords of its customers in plain text, which means it's just a matter of taking it. 索尼以纯文本的形式存储了超过千万的用户密码,这就意味着轻轻松松就能得到它。 www.bing.com 5. Advanced security firmware allows for pre-boot authentication in the form of biometrics, passwords or smart cards. 先进的安全固件允许开机前认证为形式的生物识别技术,密码或智能卡。 zhidao.baidu.com 6. Lawyers described the passing on of valuable passwords as a major change to the traditional way wills have been drawn up. 律师作为一个重大的改变传统的方式遗嘱传递已经制定了宝贵的密码。 www.kancaimi.cn 7. Passwords are case sensitive, must be at least 6 characters long and must contain at least one non-alphabetic character such as a number. 密码至少6个字母且至少包含一个非大写字母,比如数字。 xjuan.go2.icpcn.com 8. Some of the intercepted correspondence contained user names, passwords, and details of corporate networks. 有些被截获的邮件中甚至含有用户名、密码以及公司内部网络细节等信息。 treasure.1x1y.com.cn 9. The passwords you typed do not match. Type the password for this account in both text boxes. 您键入的密码不匹配。请在两个文本框内键入该帐户的密码。 angel.w15.5tom.cn 10. But passwords aren't foolproof, and a technically savvy crook could break through the defense. 但是仅仅使用密码并不是特别牢靠,懂行的盗贼能够突破这道防线。 chinese.wsj.com 1. It prevents transmission of clear text passwords over the network by encrypting authentication messages between clients and servers. 通过对客户端和服务器之间的身份验证消息进行加密,它可以防止在网络上使用明文来传输密码。 www.ibm.com 2. You did not specify a password. You should use passwords to prevent unauthorized access to your files. 没有指定密码。您可以使用密码来防止您的文件被未授权的用户访问。 www.fan6.net 3. Requiring that passwords include numbers, symbols, and mixed cases significantly increases the number of possible passwords. 要求密码中包含数字、字符、混合大小写显著增加了密码的可能数量。 www.bing.com 4. Use unique passwords for your accounts, especially important accounts like email and online banking. 给所有账户设置独立的密码,特别是像邮箱和网上银行这中重要的账户。 www.bing.com 5. Excel passwords can be up to 255 letters, numbers, spaces, and symbols. Excel密码最多可有255个字母、数字、空格和符号。 office.microsoft.com 6. Each of these use their own local storage format and proprietary encryption mechanism to store the login passwords. 其中每个用自己的本地存储格式和专有加密机制来保存登录密码。 www.jisuxz.com 7. Therefore, passwords do not have to be hard-coded into batch files. 因此,不必将密码硬编码到批处理文件中。 msdn2.microsoft.com 8. If encrypted passwords do not use a salt it is relatively simple to do a reverse lookup to find the plain text password. 加密的密码如果不使用salt,通过反向检索找到明文密码就相对简单。 www.infoq.com 9. WiKID is designed to be a secure alternative to tokens, certificates, and passwords. WiKID旨在成为令牌、证书、密码的安全替代品。 www.ibm.com 10. Password Generator allows you to generate secure passwords based on your preferences. 密码生成器可让您产生安全的密码根据您的喜好。 xtdownload.com 1. Password Generator allows you to generate secure passwords based on your preferences. 密码生成器可让您产生安全的密码根据您的喜好。 xtdownload.com 2. It is interesting that only 4% of these passwords were dictionary words and the great majority is actually alphanumeric. 有趣的是,这些密码里仅有4%是字典里的单词,并且绝大多数实际上是字母。 www.bing.com 3. To help users in both cases, the password manager waits for users to type their user names manually before filling in any passwords. 为了帮助这两种情况下的用户,在自动填入密码前,密码管理程序等待用户手动输入他们的名字。 blog.sina.com.cn 4. New authentication system: The updated app will tighten up the authentication system so that passwords are no longer sent in clear text. 新的验证系统:新版应用程序将收紧验证系统,密码不再以明文显示。 www.bing.com 5. The key to the security of a password manager is the algorithm for deciding when to reveal passwords to the current web page. 密码管理安全的关键是,决定什么时候将密码赋给当前页面的算法。 blog.sina.com.cn 6. Passwords are hashed using a one-way hash algorithm and a randomly generated salt value when stored in the database. 密码在存储到数据库时使用单向哈希算法和随机生成的salt值进行了散列。 msdn2.microsoft.com 7. Used to record general-use passwords, and should not contain passwords requiring security. Not repeatable. 用于记录通常使用的口令字,但不应包含有保密要求的口令字。不可重复。 www.datatrans.com.cn 8. Security is primarily administered by Microsoft, however access is still acquired by using userids and passwords. 安全性主要是由微软管理的,但是使用用户ID和密码仍然可以获得访问权。 www.infoq.com 9. The card and the passwords allow you to access all the information of the web. 这张卡和密码能让你获取这个网站上的所有信息。 blog.sina.com.cn 10. Users sometimes might want to change their passwords, and it is often impractical to perform this task by hand. 有时候用户可能想要更改密码,但是手动执行该任务通常不太实际。 msdn2.microsoft.com 1. They should also consider two-part authentication, which can combine passwords with a security key with a changing code. 他们还应该考虑双重认证,用不断变化的代码将口令与安全键码结合起来。 www.worlduc.com 2. The input keyboard ensures that the password is well protected and not stolen during the input of the passwords by a user. 本发明使用户在输入密码的过程当中,密码能够被较好的保护不被盗取。 ip.com 3. A determined, malicious user equipped with a network-monitoring tool can intercept user names and passwords. 一个蓄意破坏的用户可以使用网络监视工具截获用户名和密码。 www.kuenglish.info 4. Lifehacker has already gone over the tremendous security advantages to using KeePass, and protecting your passwords in general. Lifehacker已经介绍过使用Keepass的妙处,以及如何从总体上保护自己的密码。 www.bing.com 5. Something important to you as a child may be a theme throughout your passwords. 你作为孩子时候的很多重要的事情可以成为你的密码。 www.bing.com 6. Why do so many people continue to choose easy-to-guess passwords, despite so many warnings about the risks? 为什么这么多的网民对如此多的警告熟视无睹,用选用简单容易猜到的密码呢? www.bing.com 7. Now it's already much safer to store passwords, but there is still one additional step you can take to really make it secure. 储存散列处理以后的密码是比较安全的,但是还有一点要了解。 www.csask.com 8. we suggest you get rid of all his passwords as soon as possible, and with the cellphone, to ensure account security. 建议您尽快改掉自己所有的密码,并与手机绑定,确保账号安全。 it.zhishi.sohu.com 9. It does not require users to maintain their credentials manually, and also does not expose the credentials as usernames and passwords. 非可视的bean不需要用户手工维护其凭证,也不需要将凭证暴露为用户名和密码。 www.ibm.com 10. There is no further action to take other than a few passwords to set. 除了要设置几个密码,没有其他操作了。 www.ibm.com 1. After studying the security breach Imperva has come up with a list of the most commonly used passwords which website users should avoid. 在研究了安全漏洞之后,Imperva列出了一个最常用的密码列表,这些都是网络用户最应该避免使用的。 www.chinaenglish.com.cn 2. User names and passwords are often stored with each application, but cannot change on a regular basis and are not secure. 用户名及密码经常存储于各自的应用程序中,但不能在常规基础上进行改变并且也不安全。 www.ibm.com 3. At minimum, each time they logon, all PC users should be required to type in a passwords that only they and the network administrator know. 至少,每次登录时,所有pc机用户都被要求键入只有他们自己和网络管理员才知道的口令。 www.hotdic.com 4. Windows-based computers utilize two methods for the hashing of user passwords, both having drastically different security implications. 运行Windows的计算机使用两种方法对用户密码创建哈希,这两种方法在本质上有着不同的安全意义。 www.bing.com 5. Encrypted passwords are encrypted when stored and can be decrypted for password comparison or password retrieval. Encrypted密码在存储时进行了加密,可以在比较或检索密码时进行解密。 msdn2.microsoft.com 6. Also, passwords do not prevent overwrite of media with the FORMAT option. 同样,密码也不能防止通过FORMAT选项覆盖媒体。 msdn2.microsoft.com 7. You can even set passwords for your sensitive files allowing you a flexible and adaptable free file hosting system. 你甚至可以设置密码,为您的敏感文件,让你的灵活性和适应性免费档案托管制度。 zhidao.baidu.com 8. Fake websites to steal passwords and account login crack, is not trusted the common features of the network environment. 假冒网站、窃取密码和破解登陆账户,是不可信赖的网络环境的共同特征。 www.helicoptersbuyers.com 9. There are no secret passwords in medicine, no mysterious handshakes or signals to use when seeking the best care for a serious illness. 人们寻求严重疾病的良方,但医学中并没有什么秘密口令,也没有什么秘密的手势或暗号可用。 www.bing.com 10. Outfitted with a keystroke-capture mechanism, the Trojan horse records the user names and passwords. 自带了键盘输入机制的木马病毒就会记录下用户的网银账号和密码。 www.bing.com 1. In my experience, random generated passwords should only be used for application owner accounts. 根据我的经验,应该只对应用程序所有者账户使用随机生成的密码。 www.ibm.com 2. Don't leave notes with your passwords in plain site on your computer or desk. 别把写着你的密码的纸条放在电脑或桌子的明面。 www.bing.com 3. The most obvious advice is to try some of your other passwords! 最明显的建议是,尝试一些您的其他密码! www.bing.com 4. Finally, for security's sake, think about timing out the cache because passwords change and IDs can be revoked. 最后,为了安全起见,请考虑一下将高速缓存超时,因为密码更改和标识会被取消。 www.ibm.com 5. Does not send emails asking its customers to provide their passwords or verify their account information online . 此外,中银香港并不会透过电子邮件要求客户提供其密码或于网上核实其户口资料。 www.bing.com 6. Although this behavior is convenient for many users, it makes password-guessing attacks easier by reducing the number of possible passwords. 尽管此行为方便了很多用户,但由于它减少了可能的密码数,因此使得猜密码攻击变简单了。 technet.microsoft.com 7. The passwords you typed do not match. Please retype the new password in both edit boxes. 键入的密码不匹配。请在两个编辑框中重新键入新密码。 angel.w15.5tom.cn 8. As in the case of passwords, the AIX 5L administrator can configure the LDAP client to use a different group member attribute. 与密码中的情况一样,AIX5L管理员可以对LDAP客户端进行配置,以使用不同的组成员属性。 www.ibm.com 9. Passwords, session timeouts , and access control all create obstacles for a legitimate user. 密码、会话超时以及访问控制这些都给合法用户造成了障碍。 dictsearch.appspot.com 10. Many sites require you to have ID's and passwords. Why do we need to keep these safe? 许多网站要求你提供身份证件和密码,我们为什么要注意这方面的安全? blog.sina.com.cn 1. Another alternative is to use a custom user registry employing a file with the user ID and passwords for development environments. 另一个方法是使用自定义用户注册表,该注册表在开发环境中使用具有用户ID和密码的文件。 www-128.ibm.com 2. The Automatic Password Generator can be helpful in generating reasonably complex passwords. 密码自动产生器对于产生复杂而合理的密码,非常有用。 www.zzbaike.com 3. Password complexity policies are designed to deter brute force attacks by increasing the number of possible passwords. 密码复杂性策略通过增加可能密码的数量来阻止强力攻击。 msdn2.microsoft.com 4. Store your Passwords, Banking, Credit Card Information &Expense List on your phone or develop custom lists. 把您的密码、银行交易、信用卡信息、开支列表或自定义列表存入手机。 www.sooit.com 5. Gets a value indicating whether the current membership provider is configured to allow users to retrieve their passwords. 获得一个值,指示当前成员资格提供程序是否配置为允许用户检索其密码。 msdn2.microsoft.com 6. Most of these applications store the login passwords so that user don't have to remember and enter the password every time. 这些应用程序的大多数商店的登录密码,使用户不必记忆和输入密码每次。 www.jisuxz.com 7. This file, initialized and maintained by the net user command, is a database of AIX Fast Connect users (and their encrypted passwords). 这个文件由netuser命令进行初始化和维护,它是AIXFastConnect用户(及其加密密码)的数据库。 www.ibm.com 8. But analysts say the leading products on the market are better than relying solely on passwords. 但是,分析师说,选择在市场上占领先地位的产品要好过单纯依赖密码。 chinese.wsj.com 9. User IDs and passwords stored in its local files and are meaningless in any other context, such as on a different server. 用户ID和密码存储在其本地文件中,并且在任何其他上下文(如在另一台服务器上)中是没有意义的。 www.ibm.com 10. The package protection levels that encrypt packages using passwords require that you provide a password also. 使用密码加密包的包保护级别还要求您提供密码。 msdn2.microsoft.com 1. You'll need to create a list of your user names and passwords and put it in a safe place. 你需要把你的用户名和密码记在一张纸上并置于不会遗失的地方。 www.elanso.com 2. Usability suffers when users type in passwords and the only feedback they get is a row of bullets. 当用户输入密码得到的反馈却是一行星号的时候,可用性受损了。 www.bing.com 3. You can use Folder Guard to lock your personal files and folders with passwords, to stop other users from peeking into your records. 你可以使用文件夹卫队使用密码锁您的个人文件和文件夹,阻止往你的记录偷看其他用户。 www.jisuxz.com 4. Your passwords do not match . Please reenter the password . 您的密码不匹配。请重新输入密码。 www.bing.com 5. A very common use is to feed in passwords, which typically should be unique to every deployment. 一项极普通的应用就是提供密码,这对于每种部署都应该是惟一的。 www.ibm.com 6. For additional protection, authentication can be implemented with user IDs and passwords. 如需附加的保护,可以使用用户标识和密码来实现认证。 www.ibm.com 7. and sometimes as a convenience, since it's much easier to swipe your finger than to remember a bunch of passwords. 有时则是因为它的便捷:按下指纹要比记住一大堆密码容易得多。 www.englishfree.com.cn 8. Software's built-in password generator allows you to instantaneously set up new passwords. 软件内置的密码生成器可以让您立即建立新的密码。 bbs.dospy.com 9. Business partners do not need to set up IDs and passwords for users, nor do the partners need to maintain these password systems. 业务合作伙伴并不需要为用户设置ID和密码,合作伙伴也不需要维护这些密码系统。 www.ibm.com 10. If you are storing the message link parameters externally, rather than in the database, you may wish not to save the passwords. 如果您从外部存储消息链接参数,而不是将它们存储在数据库中,则最好不要保存这些口令。 www.ianywhere.com 1. in computer security , searching for telephone numbers and passwords by successively trying various combinations of numbers and letters. 在计算机安全学中,以连续地试验数字和字母的各种组合来搜索电话号码或口令的方法。 www.ichacha.net 2. Application IDs are also associated with application passwords, which are configured in a resource bundle in ESSearchApplication. war. ApplicationID还与应用程序密码相关联,这是在ESSearchApplication.war中的资源束中配置的。 www.ibm.com 3. The US company said a campaign to obtain passwords originated in Jinan and was aimed at monitoring e-mail. 谷歌称,来自济南的黑客盗窃了密码,并意欲监控邮箱账户。 www.bing.com 4. This utility recovers all network passwords stored on your system for the current logged-on user. 此实用工具恢复所有网络上的密码存储在系统中当前登录的用户。 www.jisuxz.com 5. The MTA password is stored in encrypted form in Active Directory, but this does not mean that MTA names and passwords are secure. MTA密码以加密形式存储在ActiveDirectory中,但这并不意味着MTA名称和密码是安全的。 technet.microsoft.com 6. Nobody likes entering passwords. Nobody likes remembering passwords. Nobody likes forgetting passwords. 没人喜欢输入密码,也没人喜欢记住密码,更没人喜欢忘记密码。 www.bing.com 7. Robber changed their modus operandi, from the blatant looting their way into the network using hackers to steal passwords to obtain money. 强盗改变了他们的作案方法,从明目张胆的路上抢劫改为网络上利用黑客盗取密码取得钱财。 women.zhishi.sohu.com 8. also , make sure that you immediately change any passwords and continue to monitor your account activities. 此外,请立即更改您的密码,并密切留意帐户活动情况。 www.ichacha.net 9. Clicking to download the document directed users instead to a fake Gmail log-in page that captured their passwords. 点击下载这篇文章使用户进入一个伪造的Gmail登录页面从而盗取他们的邮箱密码。 www.bing.com 10. The Gold Card and Reader allow participants to generate unique passwords as a further complement to their existing username and password. 金卡和读卡器可让用户生成唯一的密码以完善现有的账户名称和密码。 dictsearch.appspot.com 1. Trojans are malicious programs that hide themselves on your PC, record your passwords, and then send them to the hacker. 木马程式是一种会潜入用户个人电脑、暗自记录用户密码,并将所收集资讯送回骇客手上的恶意程式。 www.chinapost.com.tw 2. The passwords you typed do not match. Type the same password in both text boxes. 你输入的密码不匹配。两次输入的密码必须一致。 bbs.360safe.com 3. The "Insurance" file is encrypted, nearly impossible to open until WikiLeaks provides the passwords. “保障”文件是加密的,若无维基解密提供的密码,它几乎是无法破解的。 www.oobang.com 4. No legitimate business asks for your credit card information or passwords by email. 没有哪家正规商家会用邮件问你的信用卡信息或者密码。 www.bing.com 5. NASA spent three months changing passwords and clearing out "trap door" programs that the intruders had planted to give them access. 后来宇航局花了三个月的时间,更换口令,清除这帮入侵者设置的‘迷藏’式进入程序。 www.thea.cn 6. The New York Times points out that an over-reliance on strong passwords takes the focus away from other concerns like keyloggers. 纽约时报(NewYorkTimes)的文章指出过分依赖强壮密码转移了我们对键盘记录器(keylogging)的担心。 www.infoq.com 7. It works by attempting every alphanumeric combination possible to try to crack passwords. 它的工作方式是通过尝试每个可能的字母数字组合试图破解密码。 www-128.ibm.com 8. Users may be uncomfortable with providing their passwords to a third-party Web site. 用户可能会不愿意将自己的密码提供给第三方Web站点。 www.ibm.com 9. The SQL injection attack shown in Figure 3 resulted in the display of user names and passwords from the Users table. 图3所示的SQLInjection攻击导致显示Users表中的用户名和密码。 www.cnblogs.com 10. Problem is now that you'll need to figure out the encrypted passwords. 现在的问题是你要对加密的密码进行解密。 forum.e2002.com 1. These names and passwords may be incorrect or you may have signed into the services from somewhere else. 这些登录账号或密码有误,或者已在其他地方登录。 www.lifepop.com 2. The passwords you typed do not match. Type the new password in both text boxes. 您输入的密码不匹配。请在两个文本框内输入新密码。 www.fan6.net 3. Indicates whether the membership provider is configured to allow users to retrieve their passwords. 指示成员资格提供程序是否配置为允许用户检索其密码。 msdn2.microsoft.com 4. Business Intelligence Development Studio never stores passwords in its project files. BusinessIntelligenceDevelopmentStudio从不在其项目文件中存储密码。 technet.microsoft.com 5. Jeff concluded that the solution to protect your password from rainbow table attacks is to salt your passwords. Jeff得出结论,保护你的密码免于Rainbow表攻击的解决方案就是向你的密码中加入salt。 www.infoq.com 6. Passwords are a broken and obsolete model, yet everyone relies on them and pretends they do what they're supposed to do. 密码是容易攻破和过时的保护模式,但是每个人都依赖它,并且好像密码做了它们应该做的。 www.infoq.com 7. Passwords tend to be our main and sometimes only line of defense against intruders. 密码可以看作我们主要,甚至某些情况下唯一可用于防范入侵的防线。 www.bing.com 8. Agent passwords can be changed through agent properties dialog boxes and stored procedures. 代理密码可通过代理属性对话框和存储过程进行更改。 msdn2.microsoft.com 9. The standard security provided by PDF consists of two different methods and two different passwords. 标准所提供的安全PDF格式构成两种不同的方法和两个不同的密码。 xtdownload.com 10. The passwords you entered do not match . Please re - enter them . 您输入的密码不匹配。请重新输入。 www.bing.com 1. CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. 混乱生成器将创建字母,数字,字母或全部键盘字符的密码,用户定义的长度。 xtdownload.com 2. Reconfiguration needed to assign OS-specific parameters like network information: IP, hostname, passwords, etc. 通过重新配置分配与OS相关的参数,比如IP、主机名、密码等网络信息。 www.ibm.com 3. User names and passwords that you entered on websites are saved in your Keychain and retrieved when you try to log in later. 您在网站上输入的用户名和密码存储在您的“钥匙串”中,您以后登录时可重新获得这些信息。 docs.info.apple.com 4. What are your strategies for keeping passwords and online accounts safe? Any apps or utilities you tend to use most? Let us know below! 你有什么加强网络账户安全性的策略呢?什么应用或者软件是你用的最多的呢?在留言中留下你的方法吧! www.bing.com 5. Use strong, not simple, passwords for the server administrator and for user accounts. 服务器管理员和用户帐户应使用保护性强的密码,不能过于简单。 www-128.ibm.com 6. When generating passwords, pwgen will try and mix it up with a number and capital by default. 在生成密码时,pwgen在默认情况下尝试在密码中包含数字和大写字母。 www.ibm.com 7. Chrome can import settings from Firefox and Internet Explorer including bookmarks, search engines, saved passwords and history. Chrome可以导入Firefox和IE的设置,包括书签,搜索引擎,保存的密码和浏览历史。 www.bing.com 8. The passwords do not match. Please retype the passwords. 密码不匹配,请重新键入密码。 finer2.com 9. The passwords you typed do not match. Retype the trust password. 您键入的密码不相配。请重新键入信任密码。 www.drados.com 10. With the POST method, user names and passwords aren't part of the URL; therefore, they aren't visible in regular logs. 使用POST方法,用户名和口令不被作为URL的一部分,因此也不会显示在常规日志中。 www.ibm.com 1. Such security can be achieved using passwords with 12 symbols, drawn from the full set of 95 symbols on the standard American keyboard. 在美国标准键盘的整套95个符号中拿出12个,那这种安全设置才有可能实现。 www.ecocn.org 2. Yet the above technique is still vastly superior to storing passwords in clear text. 但是这样的技术仍然要比直接保存密码的明文好的多。 yihong678.blog.163.com 3. Having stated the previous, it may not be the security policy of some systems to divulge passwords to other users. 某些系统的安全策略可能不允许向其他用户泄露密码。 www.ibm.com 4. If they happen to contain encrypted passwords, reconstruction may be extremely time consuming or impossible. 如果配置文件包含加密的口令,则重新构建相当耗时,或者干脆就不可能。 www.ibm.com 5. Passwords can be the weakest link in a server security deployment. 在服务器安全部署中,密码可能是最薄弱的一个环节。 technet.microsoft.com 6. The password generator integrated into Kaspersky Password Manager can create strong passwords that are extremely difficult to crack. 密码发生器集成到卡巴斯基密码管理器可以创建强密码非常难以破解。 www.orderble.com 7. This makes it difficult to use login routines that quickly cycle through hundreds of different passwords until the right one is entered. 这使得那些快速循环使用上千个不同的口令、直到输入正确口令的登录例程变得难以应用。 www.ibm.com 8. No, you can still lock users out of the network by changing their passwords. 否,您仍然可以藉由变更其密码锁定出网路的使用者。 technet.microsoft.com 9. Clearing this field should allow you to use old passwords again. 清除这个字段可以使您又一次使用旧密码。 www-128.ibm.com 10. Examples of sensitive information include user names, passwords, connection strings, and encryption keys. 敏感信息的示例包括用户名、密码、连接字符串和加密密钥。 msdn.microsoft.com |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。