Examples of using Unauthorized changes in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
Unauthorized changes to systems or programs;
Analysts should monitor these Registry settings for unauthorized changes.
Unauthorized changes in the fund usage plans; 5.
If successful, an attacker could make unauthorized changes to the system configuration;
To prevent unauthorized changes, click the lock at the bottom of the preferences pane.
If successful, an attacker could make unauthorized changes to the system configuration;
To prevent unauthorized changes, click the lock at the bottom of the preferences pane.
User Account Control(UAC) can help prevent unauthorized changes to your computer.
You can detect unauthorized changes that are the result of human or malicious intent.
By default, all cells are locked to protect them from accidental or unauthorized changes.
Verify that no unauthorized changes have occurred due to either malicious intent or human error.
User Account Control(UAC) can help you prevent unauthorized changes to your computer.
If any unauthorized changes are detected, BitLocker requests a recovery key on a USB device.
The file isstored on security-enhanced servers that help preventany unauthorized changes to it.
There was therefore a risk that unauthorized changes to the system could be made without being detected.
User Account Control(UAC)is a Windows feature that helps to prevent unauthorized changes to the system.
Such unauthorized changes would be untested, undocumented and could affect the viability of current disaster recovery procedures.
The block is added to the existingblockchain database in such a way as to exclude the likelihood of unauthorized changes.
Unauthorized changes to a know clean server configuration is a sure sign that someone has gained unauthorized access to your server.
Far From the Tree' deals with gay issues, andI will press the publisher very hard not to make unauthorized changes,” Mr. Solomon said.
The risk existed that the programmers could make unauthorized changes, which could lead to fraud being perpetrated and financial loss to UNRWA.
The manager will continue to compare the current configurations of your devices to its reference store,making it able to spot any unauthorized changes.
The view wasexpressed that there was no need to distinguish between authorized and unauthorized changes and thus the words" any change" would suffice.
But second, Windows 64-bit offers a feature called Kernel Patch Protection,which protects the Windows kernel from unauthorized changes.
Earlier this month AT&T said it would pay $105million to settle FTC allegations that it put unauthorized changes on customers' mobile phone bills.
The Department of Internal Oversight Services noted that at theLebanon field office central pharmacy unauthorized changes had been made with regard to quantities issued.
The Active Reasoning platform operationalizes standards such as ITIL& COBIT, detecting,validating and reporting unauthorized changes and out-of-policy actions on the IT infrastructure.
Unauthorized change of the three pack certificate;
The statement also commented on the unauthorized changing of geographical names.
It enables companies to identify vulnerabilities, detect unauthorized change, and address compliance requirements to reduce ICS cybersecurity risks and improve process safety.