| 1. | Data whose meaning is concealed from unauthorized users 对于非授权用户其意义是隐蔽的数据。 |
| 2. | Also , the key must be kept secret from unauthorized users 并且,密钥必须对未经授权的用户保密。 |
| 3. | An unauthorized user id must not be able to launch an application 未经授权的用户id必须禁止启动应用程序。 |
| 4. | Caching may allow unauthorized users or processes to read sensitive data 缓存可能允许未经授权的用户或进程读取敏感数据。 |
| 5. | This backdoor capability allows unauthorized users to access and manipulate infected systems 后门功能可使未经授权的用户访问并控制受感染的机器。 |
| 6. | These features block unauthorized users from making changes to protected parts of a document 这些功能可以阻止未经授权的用户更改文档中受保护的部分。 |
| 7. | The asp . net configuration system helps protect configuration files from access by unauthorized users Asp . net配置系统有助于防止未经授权的用户访问配置文件。 |
| 8. | Code - access - permission objects are used to protect resources and operations from use by unauthorized users 代码访问权限对象用于保护资源和操作,以免被未经授权的用户使用。 |
| 9. | When you use the export feature of web parts , sensitive data could potentially be exported to unauthorized users 使用web部件的导出功能时,可能会将敏感数据导出给未经授权的用户。 |
| 10. | In data security , the transmission of data to unauthorized users by processes with legitimate access to data 在数据保密学中,通过合法访问数据的进程将数据传输给未授权的用户的过程。 |