Примеры использования User's password на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
The user's password“Admin” is“Admin”.
Do not use nismap to change a user's password.
User's password is changed on some, but not all, computers.
That operation is normally performed after changing user's password.
Setting up a user's password To set up a user's password.
The administrator has the right to change a user's password at any time.
With the user's password and without it. We, certainly, want the latter.
Choose the text in the Password column to change the user's password.
This was addressed by requiring the user's password when prompting for keychain access.
If you want to avoid this type of data loss, do not reset a user's password.
The LM hash is computed as follows: The user's password is restricted to a maximum of fourteen characters.
Ensure that the ypcat password command does not show X in the user's password field.
The option to change a user's password is not available if the user has a Seagate Access account.
If you specify the-u option but omit the-p option,you are prompted for the user's password.
If a user's password cannot be synchronized from Windows to UNIX, it cannot be synchronized from UNIX to Windows.
The VIPole Team administrator can set or change any user's password for accessing the server.
Saving the user's password and password in the internet browser when we frequently access a website that requires registration/ authentication….
In this method,after logging in by the desired user, when you enter sudo you should enter the user's password again.
In Password andConfirm password, type the user's password, and then select the appropriate password options.
Windows Password Recovery, for example, can decrypt a Master Key from its local backup andwouldn't even need the user's password to do that.
As a result, if a nonconforming domain controller accepts a user's password change, it might not be able to change the password on UNIX computers.
It was discovered that there was a CSRF vulnerability in mailman, a web-based mailing list manager,which could allow an attacker to obtain a user's password.
The administration has no technical possibility to restore user's password or data if password is lost.
When an RODC makes a request to replicate a user's password, the writable Windows Server 2008 domain controller that the RODC contacts allows or denies the request.
For example, if bit 3 of this field is set,the decryption key for the Master Key(from user's password) will be created using the SHA1 algorithm.
If you want to change the Windows user's password when the corresponding UNIX-based computer user's password is changed, you must install the pluggable authentication module(PAM) on the UNIX-based computer.
To connect to the created baseis used database name, username and user's password, that were set by creating database.
The administrator-defined password does not circumvent the user's password since the user password is still required to be entered following successful entry of the administrator lock-out password. .