1. Security assessments include checks on user passwords, file system, network set-up, end-user files and start-up parameters. 2. User password with invalid syntax supplied to PI. 3. Please supply a valid user password. 4. Space filled user password supplied to PI. 5. But other specialists say that once information is in a database, it is accessible to virtually anyone who has a user password and a little knowledge. |
每页显示:
共 6 句