unauthorized access 中文意思是什麼

unauthorized access 解釋
非特許存取, 越權存取
  • unauthorized : adj. 未被授權的;越權的;未經許可的,未經批準的;沒有根據的。 make an unauthorized change 擅自更改[修改]。
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  1. In computer security, a successful unauthorized access to an adp system

    在計算機安全學中,成功地非法進入自動數據處理系統。
  2. You expressly understand and agree that accoona shall not be liable for any direct, indirect, incidental, special, consequential or exemplary damages, including but not limited to, damages for loss of profits, goodwill, use, data or other intangible losses even if accoona has been advised of the possibility of such damages, resulting from : the use or the inability to use the service ; the cost of procurement of substitute goods and services resulting from any goods, data, information or services purchased or obtained or messages received or transactions entered into through or from the service ; unauthorized access to or alteration of your transmissions or data ; statements or conduct of any third party on the service ; or any other matter relating to the service

    您明確了解並同意,基於以下原因而造成之利潤、商譽、使用、資料損失或其他無形損失, accoona不承擔任何直接、間接、附帶、特別、衍生性或懲罰性賠償(即使accoona已被告知如前所述的賠償之可能性) ( i )本服務之使用或無法使用, ( ii )經由或透過本服務購買或取得之任何商品、資料、資訊或服務,或接收之訊息,或進行之交易所衍生之替代商品及服務之購買成本, ( iii )您的傳輸或資料遭到未獲授權的存取或變造, ( iv )本服務中任何第三人之聲明或行為,或( v )本服務其他相關事宜。
  3. You agree that sahaja yoga hk shall not be responsible or liable for any loss or damage of any kind incurred as the result of any such dealings or as the result of the presence of such advertisers on sahaja yoga hk. 7. you expressly understand and agree that sahaja yoga hk shall not be liable for any direct, indirect, incidental, special, consequential or exemplary damages, including but not limited to, damages for loss or profits, goodwill, use, data or other intangible losses, resulting from the use or inability to use the service ; unauthorized access to or alteration of your transmissions or data ; statements or conduct of any third party on the service ; or any other matter relating to the service

    7 .您明確了解並同意,基於以下原因而造成之損失,包括但不限於利潤商譽使用資料損失或其他無形損失霎哈嘉瑜伽不承擔任何直接間接附帶特別衍生性或懲罰性賠償即使霎哈嘉瑜伽已被告知前開賠償之可能性亦然: i本服務之使用或無法使用, ii經由或透過本服務購買或取得之任何商品資料資訊或服務,或接收之訊息,或進行之交易所衍生之替代商品及服務之購買成本, iii您的傳輸或資料遭到未獲授權的存取或變造, iv本服務中任何第三人之聲明或行為,或v本服務其他相關事宜。
  4. How is data protected from unauthorized access

    如何保護數據不受未授權的訪問?
  5. Identity permissions help protect code from unauthorized access

    從同一基類派生。
  6. Denial of service attacks ( dos ) use a networked computer or computers to bombard another networked computer or server communication traffic with the intention of disrupting or rendering the latter inoperable, or enabling unauthorized access

    妨礙信息傳送的攻擊是利用一部或多部聯網電腦連珠炮發地向另一部聯網電腦或伺服器傳送大量資料,意圖擾亂其運作、令其無法運作或擅自接達。
  7. No unauthorized access prohibited

    未經許可,禁止入內。
  8. For this reason, unauthorized access to sensitive data is a security risk that you must address

    出於這個原因,對敏感數據的未授權訪問是您必須解決的安全隱患。
  9. Protect confidential information from unauthorized access

    保護機密資料;
  10. A reporter was sentenced to three months imprisonment for offering bribes to a former security guard for unauthorized access to a location - shooting site of a film company

    一名雜志記者,提供利益予一名前護衛員,以獲得在未經許可下進入一間電影公司的拍攝場地,被判入獄三個月。
  11. We treat our data as assets that must be protected against loss and unauthorized access

    我們將客戶資料視為資產,致力保護以防遺失,並只有經授權人員才可使用。
  12. Using this mechanism, we can protect web resources from unauthorized access

    使用該機制,可以防止未授權用戶訪問web資源。
  13. A former security guard was charged for allegedly accepting and soliciting bribes from a reporter of a magazine for unauthorized access to a location - shooting site of a film company

    廉政公署落案起訴一名前護衛員,控告他涉嫌收受及索取利益,以容許一名記者在未經許可下進入一間電影公司的拍攝場地。
  14. You can take advantage of several security options in the websphere application server admin console to secure it from unauthorized access

    您可以利用websphere application server管理控制臺中的幾個安全性選項對其進行保護,使之免受越權的訪問行為。
  15. Ups web sites, and their supporting systems, employ generally accepted information security techniques such as firewalls, access control procedures and cryptography to appropriately protect confidential information from unauthorized access

    Ups網站及相關支援系統採用被廣泛接受的資訊安全技術,如防火墻存取控製程式及加密系統等,妥善保護機密資料,防止未經授權人員使用。
  16. In doing this it may change the state of the incoming or outgoing traffic to hide the identity of machines or prevent unauthorized access

    在執行過程中,它可能會改變輸入或輸入數據流的狀態,以此隱藏機器的具體信息或防止非法入侵。
  17. Not to use the software and services for chain letters, pyramid schemes, junk mail, spamming or any use of distribution lists to any person who has not given specific permission to be included in such a process, and further agree not to attempt to gain unauthorized access to other computer systems

    ( 8 )每位用戶都不得利用慧學英語軟體和服務發連環信、垃圾郵件、惡意郵件攻擊、不得給任何給予到特別允許的人散發傳單式郵件。用戶同意未經授權不得試圖進入其他電腦系統。
  18. H not to use the software and services for chain letters, pyramid schemes, junk mail, spamming or any use of distribution lists to any person who has not given specific permission to be included in such a process, and further agree not to attempt to gain unauthorized access to other computer systems

    8每位用戶都不得利用cleverlearn軟體和服務發連環信垃圾郵件惡意郵件攻擊不得給任何給予到特別允許的人散發傳單式郵件。用戶同意未經授權不得試圖進入其他電腦系統。
  19. Password security locks computers from unauthorized access. you may also assign simple hot - keys to switch between computers

    Intelliview不同的型號,可控制的電腦主機臺數也有所不同:
  20. The only significant extension of the current law that is proposed in this area is to create an offence of making an unauthorized and damaging disclosure of protected information obtained ( directly or indirectly ) by unauthorized access

    就這方面而言,將現行法例加以延伸的重要建議只有一個,就是把未獲授權下(直接或間接)取得的受保護資料作未經授權及具損害性披露的行為列為新訂罪行。
分享友人