1. The password should be invisible.
密码应该是不可见的。

www.ibm.com

2. He typed in his password to log in.
他打进自己的口令进行注册。

《21世纪大英汉词典》

3. Obviously, you should pick some other password.
显然,应该选择一些其他密码。

www.ibm.com

4. These instance variables are only used if the other two sources of username and password are null, and are not reset after each use, so they can potentially be used on every request.
如果用户名和密码的其他两个来源为空,并且在每次使用后不能重新设置,则只能使用这些实例变量,所以每个请求都可能会使用它们。

www.ibm.com

5. Password expiry is only used once but I like to create a variable for it and place the variable with the other user-edited fields.
密码期限只使用一次,但是我喜欢为它创建一个变量,并将变量与其他的用户可编辑字段放置在一起。

www.ibm.com

6. This allows him to customize his profile and password, and then start making connections!
这会允许他定制他的档案和密码,然后开始构造联系!

www.ibm.com

7. This means no restraint of password length or repeating characters.
这意味着不限制密码长度或重复字符。

www.ibm.com

8. If you do so, then any application within the cell can look up the resource, and then implicitly use the provided user ID and password.
如果这样做,计算单元内的任何应用程序就都可以查找该资源,然后将隐式地使用提供的用户ID和密码。

www.ibm.com

9. The password is only requested once when the certificate is loaded so that it can be decrypted and stored in memory.
在证书加载时,这个密码只会请求一次,这样它就可以进行解密并保存到内存中了。

www.ibm.com

10. We needed to ensure valid users get the pages they need, but without prompting for a username and password every time they request one -- just once per session.
我们需要确保有效的用户得到他们需要的页面,但不必在每次他们请求一个页面时都提示用户名和密码 ―每个会话只提示一次。

www.ibm.com

11. Enter user and password.
输入用户和口令。

www.ibm.com

12. You pass to this method the ID file, password, and server on which to check for changes.
您需要为这个方法传入三个参数,即ID文件、密码和用于检查更改的服务器。

www.ibm.com

13. You need to provide information about your keystore: file name, file type and password.
您需要提供关于您的密钥库的信息:文件名、文件类型和密码。

www.ibm.com

14. You must provide the same username and password for both the server and the tool, because the tool will only receive commands from that authenticated console user.
您必须对服务器和工具提供相同的用户名和密码,因为此工具将仅从该经过身份验证的控制台用户接收命令。

www.ibm.com

15. For example, if in some step the user enters a user ID and password, there are two variables.
例如,在某些步骤中,如果用户输入了用户ID和密码,这就产生了两个变量。

www.ibm.com

16. This proof could be a password or some security token.
这个证明可以是一个口令或者某种安全令牌。

www.ibm.com

17. Once it finds the right password, it infects the next computer, which joins the attacking ranks.
一旦它找到正确的密码,它感染的下一台电脑即加入到攻击的行列中。

article.yeeyan.org

18. For now, you must type your password, but this is the last time.
接下来,您必须输入您的密码,但这是最后一次输入了。

www.ibm.com

19. Finally, some ideas on how to properly secure yourself and your systems from the possibility of a password cracking attack were offered.
最后,提供了有关如何适当保护您自己和您的系统避免可能受到密码破解攻击的一些想法。

www.ibm.com

20. You may have to change the password for these logins accordingly.
因此,您可能需要更改这些登录的密码。

www.cnblogs.com

21. This property sets the password for the user specified above.
这个属性设置上面指定的用户的密码。

www.ibm.com

22. Messages are not secure because an outside observer can read the user name and password in them.
这样消息并不安全,因为外部查看者可以取读其中的用户名和密码。

www.ibm.com

23. You can rephrase login to take both username and password in one of your scenarios, and it will globally apply, even for the code.
你可以用另一种方式登录,在你的一个场景中同时接受用户名和口令,它会应用到全局,甚至是代码。

www.infoq.com

24. In all of the above cases, the system prompts you for a password for the remote host.
在上面所有的示例中,系统都会提示您输入远程主机的密码。

www.ibm.com

25. That’s your individual password.
那就是你的个人密码。

edu.sina.com.cn

26. In that request, you include your user name and password.
在该请求中,需要将您的用户名和口令包含在内。

www.ibm.com

27. For each apply server we need to have a password file.
对于每个应用服务器,都需要一个口令文件。

www.ibm.com

28. Suppose that the application authenticates a user given a user name and password.
假设这个应用软件鉴定了一个特定的用户名和密码。

www.ibm.com

29. Suppose that the application authenticates a user given a user name and password.
假设这个应用软件鉴定了一个特定的用户名和密码。

www.ibm.com