訪問口令 的英文怎麼說

中文拼音 [fǎngwènkǒulìng]
訪問口令 英文
access password
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ名詞1 (人或動物進飲食的器官; 嘴) mouth 2 (容器通外面的地方) mouth; rim 3 (出入通過的地方) ...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. The ra can then register users and manage certificate requests without having direct access to the certifier id and password

    於是這個ra可以注冊用戶並管理證書請求,而不需要直接證明者id和
  2. Jed liked the idea that he did not need to provide direct access to the certifier id and id password to each administrator

    因為不需要向每個管理員提供證明id和id的直接權,所以jed喜歡這種方法。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源權限、應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. For the real time performance need of the low speed speech compress algorithm and the asic implement of the transfer process between programs, the design is put forward in the paper, in which state registers control the cross access between operator and memory, register windows are used for the parameters transfer, and the technique of hardware controlling is used to avoid pipeline conflict, so that the main problems of the transfer process in tr600 are solved effectively

    摘要針對低速率語音壓縮演算法對處理器系統實時處理復雜運算的性能要求,就程序調用過程的asic實現題進行了對比與分析,進而提出了用層次狀態寄存器控制存取運算元對存儲體交叉的方法,並結合運用寄存器窗傳遞參數的功能,以及利用空指硬布線處理流水線沖突的方法,有效地解決了tr600晶元中調用過程存在的主要題。
  5. File management has the function of 2 - level password management, including passwords of developers and users. this function allows developer to manage the access right to hardware and issue different access control rights to different users. 1

    檔管理系統具有2級密碼管理功能,包括開發商和用戶,開發商可以使用此功能對硬體的許可權進行管理,可以對不同的用戶開放不同的控制許可權。
  6. New access - rights model for protect read - only translation unit via user group password

    新的權限模型用於經由用戶組保護只讀翻譯單元。
  7. If the port number is accessible, you will see a blank command window after the telnet command

    如果埠號是可的,那麼在telnet命之後會看到一個空的命
  8. Contemporary, with the basic of ca authentication, digital signature, public - key cryptography and secret - key cryptography, this thesis bring forward a basic model of user registration and c / s, b / s resource accessing under the mechanism that using cryptography to transfer and memory the user ' s password

    同時,在結合pki模式中ca認證、數字簽名以及公開密鑰與對稱密鑰演算法技術的基礎之上,提出了密文傳輸和存儲機制下的用戶注冊和c s 、 b s模式資源的基本模型,以實現c s和b s的安全機制。
  9. Industry standard authentication procedures, such as password authentication protocol ( pap ), challenge handshake authentication protocol ( chap ) and calling line identifier ( cli ) provide organizations with the ability to filter out unwanted and unqualified entries, while granting correctly authenticated users easy access

    工業標準認證過程,如認證協議( pap ) 、挑戰握手協議( chap )和打入電話線認識器( cli )等給各單位提供了過濾掉無用或無資格入網的能力,同時給認證的用戶提供正確方便的
  10. You can think of the pending changes window as the source control command console ; it centralizes information about the status of your project and provides access to contextually - relevant source control, and work item management information and commands

    可以將「掛起的更改」窗看作是源代碼管理命控制臺;它集中有關項目狀態的信息,並提供對上下文相關的源代碼管理功能以及工作項管理信息和命
  11. In access control apopular form of knowledge test for access control. a password is a string of alphanumeric data or a phrase that must be entered int o a system to gain access to a physical area or a resource

    存取控制中一種測試控制權的常見方式,是由字母和數字組成的字元串或短語,它們必須輸入系統以獲得某一實際區域或資源的使用權限。
  12. Note : this is not where you log in to the ims ! only editors of this website need to log in here

    網站的這部分內容,您需要輸入您的用戶名和
  13. Traditionally, people gain access to secure places using something they know, such as passwords, or something they possess, such as security cards or bank automated teller machine ( atm ) cards

    傳統上,人們利用他們知道的東西,如,或者他們具有的東西,如安全卡或銀行的自動提款機卡,來獲得對保密地方的
分享友人