用過的口令 的英文怎麼說

中文拼音 [yòngguòdekǒulìng]
用過的口令 英文
passwords used
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : 過Ⅰ動詞[口語] (超越) go beyond the limit; undue; excessiveⅡ名詞(姓氏) a surname
  • : 4次方是 The fourth power of 2 is direction
  • : Ⅰ名詞1 (人或動物進飲食的器官; 嘴) mouth 2 (容器通外面的地方) mouth; rim 3 (出入通過的地方) ...
  1. You don ' t know that ? some say that in world war two, a u. s. marine commander taught a special marine unit the chinese battle cry " gung ho "

    那是二戰時一個美國海軍陸戰隊教他士兵中國戰鬥號?你真是越說越懸乎了。不,你為什麼對反戰活動不積極呢?你不是討厭這場戰爭嗎?
  2. M : you don ' t know that ? some say that in world war two, a u. s. marine commander taught a special marine unit the chinese battle cry " gung ho "

    那是二戰時一個美國海軍陸戰隊教他士兵中國戰鬥號?你真是越說越懸乎了。不,你為什麼對反戰活動不積極呢?你不是討厭這場戰爭嗎?
  3. However the db2 universal driver that network server uses does require a userid and password. since the initial verification done by the db2 universal driver must be passed, these values are required

    然而db2通驅動程序需要userid和,因為必須通db2通驅動程序初始身份驗證,所以需要這些值。
  4. Soft client server is secretly installed on isp, wan, host computer of important and sensitive part needed to be controlled to collect network data. after transmitting in real - time to email monitor center, pop3, information such as smtp and web - mail from these data are analysis and retrievable, password intercepted, classified and alert, mean wile the center can monitor in real - time on over 1000 nodes by controlling working status and filter condition and software refreshment etc. the system occupies less than 4 percent of system recourse under the condition of without losing package

    客戶端採隱蔽式安裝方式在需要控制敏感地區isp 、局域網、網吧以及上網主機上安裝,對進出網路數據進行採集,然後將採集數據實時發送至電子郵件監控中心,電子郵件監控中心對這些數據中pop3 、 smtp以及web - mail電子郵件信息進行分析還原、截獲、歸類及報警,並根據情況對客戶端工作狀態、濾條件、軟體更新等進行控制操作,從而實現了對高速網路( 100mbps以上) 、 10000個監控節點以上網路數據實時有效監控。
  5. We pulled easily, by silver s directions, not to weary the hands prematurely ; and, after quite a long passage, landed at the mouth of the second river - that which runs down a woody cleft of the spy - glass

    按照西爾弗,我們劃得不很力,以免早消耗完體力。經相當長路程后,我們在第二條河就是從望遠鏡山樹多那面斜坡上流下來那條河處登上了岸。
  6. For the real time performance need of the low speed speech compress algorithm and the asic implement of the transfer process between programs, the design is put forward in the paper, in which state registers control the cross access between operator and memory, register windows are used for the parameters transfer, and the technique of hardware controlling is used to avoid pipeline conflict, so that the main problems of the transfer process in tr600 are solved effectively

    摘要針對低速率語音壓縮演算法對處理器系統實時處理復雜運算性能要求,就程序調asic實現問題進行了對比與分析,進而提出了層次狀態寄存器控制存取運算元對存儲體交叉訪問方法,並結合運寄存器窗傳遞參數功能,以及利空指硬布線處理流水線沖突方法,有效地解決了tr600晶元中調程存在主要問題。
  7. 6. presenting an authorization - based encryption algorithm, which using two encryption parameters, a public secret key and a private secret key, and converting user password into pc to save in database by exclusive - or logical operation

    ( 6 )提出了一種針對cms戶權限加密演算法,該演算法具有公匙和私匙兩個加密參數,通異或等邏輯運算將加密成偽碼再進行存儲。
  8. We can use these early years profitably to establish a secure background by introducing new sights, new sounds, and constructive exercises, including the use of voice commands and body language to reinforce actions

    我們可以利早期這些年通景象,新聲音,以及積極訓練,包括使和肢體語言來增強行動有利地建立一個安全背景。
  9. User name, password : these can be any values needed to pass db2 universal driver security, mentioned earlier

    戶名、:這些是任意值(如前面提到,需要通db2通驅動程序安全性) 。
  10. On the theoretical basis above, we achieve an secure electronic exchange system based ssl protocol, which use object - oriented programming design, cryptography technology and com technology. we put forward a new model - scm ( secure component model ) in our system design, which realizes a two levels authentication system by using user ' s password authentication and the public key cryptographic digital signature authentication together ; which realizes stronger and selectable encryption algorithms ; which realizes information integrity and non - repudiation. at the same time, we explore a new way which combine com and cryptography technology to implement secure electronic exchange

    依據上述理論基礎,採面向對象程序設計方法,在ssl協議基礎上,探索了利com組件技術實現一個安全電子交易二次加解密組件系統。在對系統設計中提出了安全組件模型( scm ) ,該模型提供兩層認證機制和瀏覽器web服務器雙向身份鑒別。即第一通驗證;第二利雙方公鑰數字證書對握手連接信息進行數字簽名驗證。
  11. Beating his long muscular legs against his horse, as though he were to blame for it all, the colonel moved forward and commanded the second squadron, the one under denisovs command, in which rostov was serving, to turn back to the bridge

    上校他那肌肉豐滿長腿踢了踢馬,彷彿那匹馬總有罪,他開始挺進了羅斯托夫由傑尼索夫指揮,在第二騎兵連服役,這時候上校向第二騎兵連發出,要該連隊向橋上撤退。
  12. Although we are unable to flatten our ears and lunge at or nip to reprimand this behavior, we can instead use stern vocal commands and a dominant stance with the addition of firm handling or, if necessory, a pitch to the skin to mimic a nip

    盡管我們不能背起我們耳朵,沖去或者咬來譴責這種行為,我們可以嚴格和支配態度附加堅決操縱或者,如果有必要,扎一下皮來模仿嘴咬。
  13. In this system the packet filtering rules are controlled intelligently by combining the intelligent mechanism with the package filtering mechanism ; to the proxy server, we develop a ftp proxy server decrypting witch with petri net model ; lastly, otp authentication are applied in authentication server

    其中,本文將智能機制與包濾機制相結合,通推理機和知識庫對包濾規則進行智能化控制,實現了智能型包濾路由器;在代理服務器部分,本文引入petri網模型對ftp代理服務器功能進行形式化描述並給出其具體設計方案;最後,本文將一次性系統運於認證服務器,並對其進行了詳細設計。
  14. The password may also be specified by setting up an environment variable called passwd that contains the users password

    也可以通調設定好環境變量passwd部分來指定
  15. Industry standard authentication procedures, such as password authentication protocol ( pap ), challenge handshake authentication protocol ( chap ) and calling line identifier ( cli ) provide organizations with the ability to filter out unwanted and unqualified entries, while granting correctly authenticated users easy access

    工業標準認證程,如認證協議( pap ) 、挑戰握手協議( chap )和打入電話線認識器( cli )等給各單位提供了濾掉無或無資格入網能力,同時給認證戶提供正確方便訪問。
  16. Yudit uses a simple if somewhat idiosyncratic interface, with a gui - fied command - line at the bottom and the ability to enter unicode encodings in a window running under x. you can enter japanese and chinese characters from a u. s. or uk keyboard via some fairly ingenious keyboard mappings and character pick lists

    Yudit使一種有些特殊、但又很簡單界面,該界面底部有gui化行,您可以在x下運行一個窗中輸入unicode編碼。通一些相當有創意鍵盤映射和字元拾取列表,可以u . s .或者uk鍵盤輸入日文和中文字元。
  17. This is usually through a user name and password dialog prompt

    這通常是通戶名和對話框提示實現
  18. This system provides you with all the information and requirement you need to submit your papers and or track manuscript status. 2. for a new author or to submit manuscript for the first time, you are requested to register a new account with the system by pressing the register button below

    如果您是新作者即第一次投稿,請先注冊,並記住您戶名和,同時本系統還將把您設置戶名和密碼通您注冊e - mail發送給您。
  19. By the study of system security, during implement the mis, the paper shows a way of system management, including two key techniques in user popedom and system log, and shows some discusses in familiar problem of system management

    在開發管理信息系統程中,通對系統管理安全性方面研究,提出了利權限和操作碼2種關鍵技術來完成系統權限管理和日誌管理方法,並就系統管理中幾個常見問題做了一定探討和分析。
  20. Abstract : by the study of system security, during implement the mis, the paper shows a way of system management, including two key techniques in user popedom and system log, and shows some discusses in familiar problem of system management

    文摘:在開發管理信息系統程中,通對系統管理安全性方面研究,提出了利權限和操作碼2種關鍵技術來完成系統權限管理和日誌管理方法,並就系統管理中幾個常見問題做了一定探討和分析。
分享友人