illegal access 中文意思是什麼

illegal access 解釋
非法存取
  • illegal : adj. 不法的,非法的。 an illegal operation 墮胎(罪)。adv. -ly
  • access : n. 1. 接近;會面。2. 捷徑,門路〈指方法、手段〉;檢查孔;進路,入口;【自動化】(存貯器的)存取。3. (病的)發作;(怒氣等的)爆發。4. 增加。
  1. Argentina has lifted most restrictions on immigration from south america, again guaranteeing access to public health and education, even for illegal migrants

    阿根廷已對來自南美洲的移民解除了最大限制,再次承諾他們(甚至包含非法移民)享有公共醫療權和接受教育的權利。
  2. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  3. The cross - border and cross - territory economic criminals have gained access to china on lawful pretexts such as sight seeing, meeting relatives, official visits, investment and doing business. in fact, they are taking the opportunity of the rapid economic development in china to engage in illegal activities for illicit gains

    一些境外和國外經濟犯罪分子以旅遊、探親、訪問、投資、經商等合法途徑進入中國,借中國經濟高速發展之機,從事各類違法犯罪活動,謀取非法利益。
  4. An error in these data structures will cause it to execute an illegal instruction or access a non - existent address

    一旦這些數據結構中有錯,就會導致程序執行非法指令或者訪問不存在的地址空間。
  5. Secure operating system places its focus on controlling user ’ s access to prevent illegal operations, marking the user and authentication to guarantee the security and integrality. access control technology plays an important role to enforce operating system security. now, research on access control in embedded real time operating system ( ertos ) is just at the prime stage

    操作系統安全的主要目標包括根據系統安全策略對用戶的操作進行訪問控制,防止其對計算機資源的非法存取;標識用戶並進行身份鑒別;保證操作系統運行的安全性;保證系統自身的安全性和完整性。
  6. We implemented and improved the license management system for the operation of telecommunications services, the network access of telecommunications equipment and the philatelic market, and harshly cracked down on the illegal activities such as the telephone number - associated fraud and unauthorized use of international dedicated lines to operate international telephone services in order to safeguard the state interests and the legitimate rights of the consumers

    我們根據市場的需要實行和完善了對經營電信業務、電信設備進網和集郵市場的許可證管理制度;配合有關部門嚴厲打擊盜用電信碼號和非法利用國際專線經營國際電話業務等違法行為,維護國家利益和消費者合法權益。
  7. The movie is about a judge who handles illegal and legal immigrants in denmark, in a specific case he denies access to a supposedly terrorist

    在丹麥,一位法官負責處理移民的案件,在某個案件中,他拒絕一個相信是恐怖分子的入境。
  8. It is composed of two aspects : first, it uses the java sandbox to control the access of host resource, thus it can prevent the host resource from being accessed by agents without authority ; second, it adopts a authentication based mobile agent transfer protocol to control the transfer of agents in order to refuse the transfer request of invalid agent. thus, it can guarantee that the agent running in the host is valid, in other words, it avoids performing the illegal agent in the host. further more, it can be sure that the agent status data have n ' t been tampered or replaced in the course of transfer

    該方案主要包括兩個方面內容:一、利用java2沙箱控制主機資源的存取,防止主機資源被移動代理非授權訪問;二、採用一種基於證書的移動代理遷移協議,對移動代理的遷移過程進行控制,拒絕不合法移動代理遷移至主機的請求,確保主機上運行的移動代理具有合法身份,並且確保移動代理遷移狀態數據在遷移過程中不被篡改或替換。
  9. Theoretically, every user with access to the network could install a dhcp server to give out illegal ip numbers

    理論上,有網路的存取的每個用戶能安裝一個動態宿主配置協議服務器給出不合法的ip數字。
  10. Exterior threats include the malicious code, denial of service, stealing and juggling data during transmission ; internal threats include privacy leakage, illegal access and modification. all these threats must be solved during the system construction

    外部威脅包括數據在傳輸中可能被竊取和篡改,惡意代碼,和拒絕服務( dos ) ;內部威脅包括了對系統代碼的竊取和修改,員工有意和無意的訪問、修改一些他們沒有權限訪問的數據。
  11. In the last few years, the network attack technology has greatly changed from the scale to method, while the traditional packet - filtering firewall has many limitations to the modern network attack : 1. the traditional packet - filtering firewall filters the data flow according to the rules established beforehand to reject illegal access and accept the legal access

    近年來,網路攻擊技術在規模與方法上都發生了較大變化,傳統的包過濾防火墻在應對現代網路攻擊時,卻存在著許多的缺陷: 1 、傳統的包過濾防火墻都是根據一些事先規定好的過濾規則對網路的數據流進行過濾,從而阻止不合法的訪問,同時允許合法的訪問順利通過。
  12. As a part of is ( information security ), also one of the standard security services established by iso ( international standard organization ). access control is used to protect important resources, for instance, prohibits illegal user ’ s access to the confidential resources, restricts legal users ’ operation in their permitted set of operation and prevents resources from damages due to carelessness

    作為信息安全體系的一部分,同時也是國際化標準組織定義的五項標準安全服務之一,訪問控制在保護重要資源方面有相當重要的作用,包括防止非法用戶訪問機密信息,限制合法用戶的非法操作,以及由於疏忽所造成的誤操作對資源的破壞。
  13. Afcd conducted a site visit the following day and found that illegal excavation and construction of an access road on government land might be involved. the islands district lands office ( dlois ) and the islands district office ( dois ) were immediately notified in writing. on 31 october 2003, afcd conducted another site visit and, on the same day, requested in writing dlois and other relevant departments to take follow - up action within their respective ambit, including requesting the police to investigate the case so as to confirm whether any government property had been stolen

    翌日,漁護署派員到現場視察,發現事件可能涉及在政府土地上非法進行挖掘及建造通道,遂即時以書面通知離島地政處及離島民政事務處,並在十月三十一日再到現場視察,同日以書面要求離島地政處及其他有關部門就其權限范圍作出跟進,包括要求警方調查事件是否涉及盜取政府財物。
分享友人