"Keychain" is not found on TREX in Chinese-English direction
Try Searching In English-Chinese (Keychain)

Low quality sentence examples

选择KeychainAccess(钥匙串访问)>CertificateAssistant(证书助理)>RequestaCertificateFromaCertificateAuthority(从证书颁发机构请求证书.
Go to Keychain Access> Certificate Assistant> Request a Certificate from a Certificate Authority.
Keychain恢复.
Keychain Recovery.
启动KeychainAccess应用程序。
Launch the Keychain Access application.
启动KeychainAccess应用程序。
Launch the Keychain Access app.
AppleKeychain和屏幕时间.
Apple Keychain and Screen Time.
Keychain不接受空密码。
Keychain does not accept an empty password.
启动KeychainAccess应用程序。
Open up“Keychain Access” application.
启动KeychainAccess应用程序。
Launch the Keychain Access program.
启动KeychainAccess应用程序。
Open the Keychain Access app.
启动KeychainAccess应用程序。
Open the Keychain Access application.
如果你用Mac机,那就应该对Keychain比较熟悉。
If you use Apple products, you might be familiar with Keychain.
监视对Keychain的系统调用可以帮助确定是否有可疑进程试图访问它。
Monitoring of system calls to the keychain can help determine if there is a suspicious process trying to access it.
Mac的keychain和Windows的凭据系统用来确保你的详细信息安全可靠。
The Mac's keychain and Windows's credential system are used to make sure your details are kept safe and secure.
Mac的keychain和Windows的凭据系统用来确保你的详细信息安全可靠。
Keychain Mac and Windows system credentials are used to ensure that your data is kept safe.
把证书添加到KeyChain中后,右键点击这个证书,然后选择Export“…”选项.
Once you locate the new certificate in the Keychain, right click on it, and then click to the Export“…” option.
另外,它还会在keychain中安装一个新的受信任的根证书。
Additionally, it installed a new trusted root certificate in the keychain.
Duk一样,这一版本的恶意软件在Keychain中安装了一个信任证书。
Dok, this one installs a trust certificate in the Keychain.
苹果公司于2013年引入了一项被称为iCloudKeychain的密码管理服务。
Apple introduced a password management service called iCloud Keychain in 2013.
另外,它还会在keychain中安装一个新的受信任的根证书。
The malware also installs a new trusted root certificate in the keychain.
Apple设计了iCloudKeychain和Keychain恢复功能,以便用户密码在以下条件下仍然受到保护.
Apple designed iCloud Keychain and Keychain Recovery so that a user's passwords are still protected under the following conditions.