access password 中文意思是什麼

access password 解釋
訪問口令
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  • password : (密碼):此項為「 」(加密)說明有密碼,為保密,因此內容不予顯示。如果為
  1. The ra can then register users and manage certificate requests without having direct access to the certifier id and password

    於是這個ra可以注冊用戶並管理證書請求,而不需要直接訪問證明者id和口令。
  2. Jed liked the idea that he did not need to provide direct access to the certifier id and id password to each administrator

    因為不需要向每個管理員提供證明id和id口令的直接訪問權,所以jed喜歡這種方法。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  4. The cooperation provides greater convenience to pps users by allowing them to open accounts, make account enquiries and change telephone access code or set up internet password through the extensive esd

    提供多項服務,包括開設繳費靈戶口設定繳費靈網上密碼,以及復查和更改繳費靈戶口資料。
  5. Specify anonymous access or provide a user name and a password

    指定採用匿名訪問還是提供用戶名和密碼。
  6. Without the password the user cannot access or run the package

    如果沒有密碼,用戶將無法訪問或運行包。
  7. " the year 2000 bug may cause erroneous calculations in date - dependent applications, such as project scheduling, access password regeneration, file backup procedures, automatic inventory reordering and services charges calculations

    與日期有關連的電腦應用程式,可能因千年蟲問題而在計算上出錯,例如計劃程序表、存取密碼的設定、檔案備份程序、自動盤存紀錄及服務費計算等。
  8. If your internet service provider requires you to use secure password authentication ( spa ) to access your news server, select the log on using secure password authentication option

    如果您的internet服務提供商要求您使用安全密碼驗證( spa )才能訪問新聞服務器,請選擇「使用安全密碼驗證進行登錄」選項。
  9. With the e - portal, clients may access their password protected e & m engineering facilities database in emstf maintained venues, anywhere, anytime. they can also send us an email anytime requesting a quote for specific services, reporting faults or asking questions

    有了電子網站,客戶可利用密碼,隨時隨地進入營運基金服務場地的機電工程設施數據庫、發送電郵要求我們就某服務報價、報告故障或提出查詢。
  10. You should pay attention to both the physical security of your mobile device and access control at the software level such as password protection, personal firewall settings and data encryption

    請留意擺放好你的流動設備,和啟動所需的軟體設定,例如加設密碼、安裝個人防火墻,及把有需要的數據加密,防止他人擅用你的資料。
  11. You need to have a username and password to access

    您必須擁有一組帳號和密碼才能點選
  12. Hence in the following steps, you are required to choose the security level and provide a profileusername and password to be stored for identification and access permissions

    因此以下幾個步驟會要求您選擇安全等級,及提供使用者名稱及項目密碼,儲存以後作認明身份和存取許可之用。
  13. File management has the function of 2 - level password management, including passwords of developers and users. this function allows developer to manage the access right to hardware and issue different access control rights to different users. 1

    檔管理系統具有2級密碼管理功能,包括開發商口令和用戶口令,開發商可以使用此功能對硬體的訪問許可權進行管理,可以對不同的用戶開放不同的訪問控制許可權。
  14. For example, sensitive data, such as a social registration number or a password, needs to be protected from access by any component that did not set it

    例如,身份證號或密碼這樣的敏感數據需要受到保護,以防止不設置它的其他組件訪問它。
  15. Sql server mobile also provides multiple - connection access to a database, multiple - column indexes and matching index limits, transaction support, referential integrity, 128 - bit file - level encryption and password protection, and a query optimizer

    Sql server mobile還提供對數據庫的多連接訪問、多列索引和匹配的索引限制、事務支持、引用完整性、 128位文件級加密以及密碼保護和查詢優化器。
  16. Put forward the account management model based on lazy consistency protocol. on the basis of this model, employ the unified password authentication to identify the user. in order to implement high efficiency, security and flexibility, we use temporary account to access the remote cluster

    四、提出基於懶惰一致性協議的帳戶管理模型,並在此基礎上,採用統一口西北工業大學博卜學位論義令認證機制來解決用戶身份認證問題,設計了清求協議及認證演算法;為了提高川) 』吧『劃!
  17. Services for unix provides file sharing, remote access and administration, password synchronization, common directory management, a common set of utilities, and a shell

    面向unix的服務提供文件共享、遠程訪問和管理、密碼同步、公共目錄管理、一組通用實用工具和一個外殼。
  18. In technological part, it begins with maintaining physical security, network security, system security, data security, application security and user security, and then takes proven actions, that include authentication, password checking, access control, anti - virus, firewall, leak scan, ids, security audit, anti - hacker, backup mechanism and etc. in organization sketch part, the different positions are arranged by insisting the rule of the minimum right. in management sketch part, a series of effective regulations are settled, according to the chinese governmental laws and the regulations of the agricultural bank of china. now, the plan has been preliminarily applied into the practice

    在技術層面上,從維護銀行網路信息系統物理安全、網路安全、系統安全、應用安全、用戶安全等方面出發,採用了成熟、適用的安全技術措施,包括;身份認證、密碼、訪問控制、防病毒、防火墻、漏洞掃描、入侵檢測、安全審計、防黑客入侵、同城災難備份等技術;在組織結構上,堅持權限最小化原則,設置不同的崗位,對每個崗位的安全職責進行了明確的界定;在管理體繫上,依據法律法規,制定了行之有效的規章制度。
  19. Access to and use of password protected and or secure areas of the site is restricted to authorized users only

    本網站中受密碼保護及或保安之區域只供獲授權之使用者進入及使用。
  20. Access denied because username and / or password is invalid on the domain

    訪問被拒絕是因為在本局域網中用戶名或者密碼無效。
分享友人