Examples of using
口令
in Chinese and their translations into English
{-}
Political
Ecclesiastic
Programming
您的数据是太宝贵了,最终在黑客只是因为你选择了像“Twinkletoes”或口令的手“密码1”。
Your data is too valuable to end up in the hands of hackers just because you chose a password like“Twinkletoes” or“Password1.”.
黑客从6个数据库中收集到了20年的数据,包含姓名、邮箱地址和口令。
Hackers collected 20 years of data on six databases that included names, email addresses and passwords.
但是,如果用户单击SMB链接,此行为仍会导致口令Hash泄漏。
If a user clicks on an SMB link, however, this behavior will still cause a password hash to be leaked.
在另一些国家,这类活动也包括在范围更广的电脑犯罪立法中,如涉及盗窃或非法占有口令的立法。
In other States, that activity might also be covered by more general cybercrime legislation, such as that covering the theft or illicit possession of passwords.
这会强制潜在的攻击者通过登录到机器上的服务如SSH或FTP来试图进行远程口令破译。
This forces a potential attacker to attempt password cracking remotely by logging into a network service on the machine, such as SSH or FTP.
这是一个服务程序,其作用是允许NIS客户机改变它们的NIS口令。
This is a daemon that will allow NIS clients to change their NIS passwords.
Kerberos是single-sign-on系统,意味着用户仅需要在会话开始时提供口令。
Kerberos is a single-sign-on system, meaning that a user needs to provide a password only at the beginning of a session.
他们可以为用户创建口令,或者让用户自行创建口令,但是校验该口令是否可被接受。
They can create passwords for the user, or they can let users create their own passwords, while verifying the passwords are of acceptable quality.
您可以选择加密口令或要求用户在连接时输入口令。
You can choose to encrypt passwords, or require users to enter them when connecting.
但是,如果没有装载特殊的安全性模块,则仅使用前8个字符来识别口令。
However, if no special security modules are loaded, only the first eight characters are used to discern the password.
只有系统管理员,即超级用户,才可以用chpass(1)改变其他用户口令和信息。
Only system administrators, as the superuser, may change other users' information and passwords with chpass(1).
但是,与第一种级别相比,第二种级别不需要在网络上传送口令。
However, the second level does not require a password to be transmitted over the network as compared to the first level.
比如,我们一般都希望对本地TCP/IP联接使用trust认证,而对远端的TCP/IP联接要求口令。
For example, one might wish to use trust authentication for local TCP/IP connections but require a password for remote TCP/IP connections.
最接近最终用户的SaaS的安全主题是口令和身份验证,但面临诸多挑战。
The SaaS security topic closest to end users is passwords and authentication, but the challenges are numerous.
中文
Bahasa indonesia
日本語
عربى
Български
বাংলা
Český
Dansk
Deutsch
Ελληνικά
Español
Suomi
Français
עִברִית
हिंदी
Hrvatski
Magyar
Italiano
Қазақ
한국어
മലയാളം
मराठी
Bahasa malay
Nederlands
Norsk
Polski
Português
Română
Русский
Slovenský
Slovenski
Српски
Svenska
தமிழ்
తెలుగు
ไทย
Tagalog
Turkce
Українська
اردو
Tiếng việt