篡改文件 的英文怎麼說

中文拼音 [cuàngǎiwénjiàn]
篡改文件 英文
tamper with a document
  • : 動詞(奪取, 多指篡位) usurp; seize
  • : Ⅰ動詞1 (改變) change; transform 2 (修改) revise; alter; modify 3 (改正) rectify; correct 4 ...
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : Ⅰ量詞(用於個體事物) piece; article; item Ⅱ名詞1. (指可以一一計算的事物) 2. (文件) letter; correspondence; paper; document
  • 篡改 : (用作偽的手段改動或曲解) distort; misrepresent; tamper with; falsify
  • 文件 : 1 (公文、信件等) document; file; papers; instrument 2 [自動化] file; 文件保護 file protection; ...
  1. These rogue executives ' alleged lapses or criminal acts included fraudulent accounting, tampering with financial records, destroying incriminating documents and other serious breaches of sound accounting and regulatory practices

    這些高級行政人員所涉嫌的失誤或犯罪行為,包括會計欺詐手段、賬目記錄、銷毀足以指控他們的和嚴重違反會計和管理條例。
  2. Sparks of this paper are as follows : 1 ) a much improved security audit log is presented, which supports log file in main systems and ensures orginal log files before system intruding happens are protected from being tampered or deleted so that they can be saved completely to be used as investigation clues and evidence souces of great importance ; 2 ) a log file base including different kinds of log files is established to support log file collecting and analyzing ; 3 ) correlation analysis is applied to effectively identify latent clues

    的創新點在於: 1 )提出了一種較為完善的支持計算機取證的安全審計日誌方法,它可以支持目前常見系統的日誌,確保系統被入侵攻擊前的日誌記錄不被、刪除,使得入侵者在入侵攻擊系統前留下的「痕跡」能被完整的記錄下來,作為取證人員重要的調查線索和證據來源; 2 )對各類系統不同日誌組成日誌庫,為獲取和分析日誌的記錄提供支持; 3 )對各類日誌的記錄採用關聯分析,更有效的提取潛在的計算機犯罪線索。
  3. These digital media including images, characters, audio and video digitalized works are easy to store, design, transmit and duplicate, and accelerate communication and transmission of knowledge and information. while it offered convenience to some illegal persons who can distort, attack and pirate the achievement maliciously at the same time

    這些數字化的圖形、字以及音頻、視頻作品的易存儲加工、易傳輸復制的優點加快了知識與信息的交流與傳播,但同時也為一些非法者提供了惡意、攻擊、盜用他人勞動成果的便利條
  4. Now the csp modules that we can free avail all come from the software csp shipped with the windows system. these software csps are portable in that they can be carried as an executable file, but they inevitably have some limitations : the software csps have the less tamper - resistant and would be inconvenient in the fields of the interactive logon, e - mail signing, e - mail decryption and remote access authentication ; ' they have the lower level degree of security

    但鑒於我們現在可獲得的一系列的csp模塊,均來自windows系統自帶的軟體csp ,軟體csp可以以可執行性的形式存在、具有易攜帶性的優點,但是它在防、遠程登陸、用戶的身份認證等領域有其不可克服的缺陷,安全等級比較低。
  5. A security issue has been identified that could allow an attacker to tamper with the file transfer location on your computer when using the microsoft windows ftp file transfer protocol client

    現已確認存在一個安全問題,在使用microsoft windows ftp傳輸協議客戶端時,攻擊者可能會利用此問題計算機上的傳輸位置。
  6. Some alter or replace system files. these need careful handling and are best left to experts or automated tools

    一些木馬或者替換系統。這樣的需要仔細的處理,最好是給專家或者利用工具解決。
  7. We deeply studied the requirement of the security email and the procedure of the transportation of emails over the network, and give out during the period that we worked on this subject, we first studied the status of the current internet email system and the requirement of security email in detail, then studied every period that the emails exist on the internet, the threats facing them, and the imaginable applications of the security email in real life. we have read many materials those relate to the security of information transporting on the internet, and we have refer to many network information security modules and experiences of the other email service providers. based on all of these, we give out a whole solution from the client side to the server side, we not only provide the confidential service for the email users, but also provide the signature, anti - deny and anti - impose security services

    在課題開發的過程中,我們首先深入詳細地調研了整個郵系統的現狀以及對郵安全的需求,然後從網路信息安全的角度,對郵傳輸的各個環節、每個環節所面臨的安全隱患、以及安全郵在現實生活中可能的應用進行了深入的研究,我們先後查閱了與網路信息安全郵相關的大量獻,參考了許多現有的網路信息安全模型,並且參照了現有其它郵服務提供商的web安全郵的一些安全做法,分析了它們系統的優缺點;在此基礎上,結合中國的實際情況,我們提出了web安全郵系統的從客戶端到服務器端完整的解決方案,方案中不僅為用戶提供了郵保密性服務,還提供了郵簽名,防抵賴,防等安全業務,滿足了人們對郵安全的迫切需要。
  8. The permissions prevent the files from being tampered with should they reside in a directory that has open permissions

    這些權限可以防止當駐留在具有打開權限的目錄中時被
  9. The cache performs these integrity checks to ensure that an assembly has not been tampered with, for example, when a file has changed but the manifest does not reflect the change

    緩存執行這些完整性檢查以確保程序集未被(例如,當已更但清單未反映此更時) 。
分享友人