weak password meaning in English
脆弱密码
弱口令
通行码
Examples
- And providing a weak password or none at all can put your system at risk
)安装db2 udb并使用弱口令(或者根本没有)可能将系统置于风险中。 - Many computer viruses , worms , and trojan horses are designed to exploit weak passwords
很多计算机病毒、蠕虫和特洛伊木马的设计都利用了弱口令。 - W32 . fujacks . e is a worm that spreads by copying itself to network shares protected by weak passwords
E是一种蠕虫病毒传播复制自己,以网络股的保护弱密码。 - It is recommended that you implement a strong password policy to avoid any weak passwords being disclosed under brute force or dictionary attacks
建议使用强密码策略来某些弱口令被暴力破解或字典攻击。 - Host - based scanning tools are run on each host to scan for a wide range of system problems including : unauthorized software , unauthorized weak passwords , dormant viruses , and inappropriate access permissions
主机型扫描工具在没个主机上运行以便扫描一个很宽范围的系统问题,包括:未授权软件,未授权的弱密码,隐匿的病毒及不正当的存取许可。