impersonation
[im.pə:sə'neiʃən]
n.扮演,装扮,模仿, 准则
例句与用法:
He was caught trying to impersonate a military officer.
他企图冒充军官,但当场被抓获。
He can impersonate many well-known politicians.
他能饰演许多著名政治家的角色。
词形变化:
名词: impersonation | 动词过去式: impersonated | 动词过去分词: impersonated | 动词现在分词: impersonating | 动词第三人称单数: impersonates |
n.
1. 扮演; 模仿
2. 人格化
impersonation
词形变化:
名词: impersonation | 动词过去式: impersonated | 动词过去分词: impersonated | 动词现在分词: impersonating | 动词第三人称单数: impersonates |
同义词:
objectively | coolly | detachedly | carefully | neutrally | anonymously | greyly | grayly | impassively | coldly | frostily | distantly | remotely |
反义词:
词义辨析:
同义参见:
acting
impersonationimpersonation[imˌpə:səˈneiʃən]n.1.■使人格化2.■体现3.■模仿; 扮演; 假冒
impersonation
名词 impersonation:
a representation of a person that is exaggerated for comic effect
同义词:caricature, imitation
pretending to be another person
同义词:imposture
imitating the mannerisms of another person
同义词:personation
impersonation
■The ASP.NET application needs only to verify that impersonation is set to true in the ASP.NET configuration file; no ASP.NET security code is required.
ASP.NET应用程序只需验证是否在ASP.NET配置文件中将模拟设置为true;不需要ASP.NET安全码。
■DCOM determines the impersonation level, using its normal security-negotiation algorithm.
DCOM使用其常规安全协商算法确定模拟级别。
■Kerberos is essentially a secure network authentication protocol that employs a system of shared secret keys and is able to provide robust security against impersonation and reply attacks.
Kerberos实际上是一种安全网络认证协议,采用共享密钥的系统,并且能提供健壮的安全性,以防止伪装攻击和恢复攻击。
■The caller of the REVERT statement must be in the same database where the impersonation occurred.
REVERT语句的调用方必须位于发生模拟的同一数据库中。
■SAKA protocol does not achieve key-compromise impersonation .
SAKA协议不具有密钥泄露安全性。
■The SQL Server Database Engine security functionality includes highly granular authentication, authorization, and validation mechanisms; strong encryption; security context switching and impersonation; and integrated key management.
SQL Server数据库引擎安全功能包括高粒度身份验证、授权和验证机制;增强加密;安全上下文切换和模拟以及集成的密钥管理。
■Windows 2000 Security Patch: Service Control Manager Named Pipe Impersonation Vulnerability also downloaded
Windows 2000安全修补程序:服务控制管理器命名管道模拟漏洞
■Defines security impersonation levels. Security impersonation levels govern the degree to which a server process can act on behalf of a client process.
[本主题是预发布的文档,在将来发布的版本中可能会有更改。空白主题是为将来预留的。
■false impersonation
[法] 假冒他人, 冒充, 冒名
■Download details: Windows 2000 Security Patch: Service Control Manager Named Pipe Impersonation Vulnerability
下载详细信息:Windows 2000安全修补程序:服务控制管理器命名管道模拟漏洞
■The scope of impersonation, when execution context is at the database level, is as follows
下面是执行上下文处于数据库级别时模拟的作用域
■Also flows as part of the information that flows across the asynchronous points, which means that if an impersonation context exits it will flow as well.
也作为流经异步点的信息的一部分流动,这意味着如果模拟上下文退出,它仍会流动。
■He also faces charges of harassment, reckless endangerment and criminal impersonation ?for allegedly telling parking lot employees he was a federal agent.
他也面对困扰的费用,卤莽的危及和犯罪的扮演 ?对于据说有效的停车场职员他是联邦探员。
■she has the gift of impersonation too!
他很有模仿的天分!
■He does a brilliant impersonation of the President.
他模仿总统模仿的很出色。
■His impersonation of enthusiasm never rings true.
他模仿的积极性从来没有真正的戒指。
■He did an extremely convincing impersonation of the singer.
他模仿那位歌手维妙维肖。
■Convinced of his own righteousness, he was the perfect impersonation of a man of rectitude.
他确信自己很正直,可以完美地扮演刚正不阿的人。
■He is charged with impersonation of a police officer.
他被指控冒充警官
■impersonation attack
伪装攻击
■However, in certain scenarios it may be useful to selectively extend the scope of impersonation beyond the database.
但是,在某些情况下,有选择地将模拟作用域扩展到数据库之外可能会非常有用。
■But here's the kicker: impersonation isn't necessary for ACL authorization.
但是存在以下隐患:对于ACL授权来说,模拟是不必要的。
■When should I use programmatic impersonation?
何时需要使用可编程的模拟?
■You seem to forget that, but for me and but for my little impersonation, you probably wouldn't be here at all tonight.
你好象忘了,要不是我,要不是我那小小的一招,你今晚大概就来不了这儿。
■You of when cat cat and companion together play, impersonation what role?
你的猫猫与同伴一同玩耍时,扮演何种角色?
■I do an impersonation.
做模仿表演。
■Service (DoS) attack and the impersonation attack.
兑换系统。
■Among the most anticipated: the Ultimate Elvis Tribute Artist contest starring winners of 25 preliminary Elvis impersonation competitions from as far away as New Zealand.
其中最值得期待的:最终猫王致敬艺术家主演的竞赛优胜者25初步猫王模仿比赛,从远如新新西兰。
■Secondly, the UAP protocol is analysed, because the key confirmation completely lies on the long-term private key, so it does not achieve forward secrecy, and resists key-compromise impersonation.
其次,对UAP协议进行安全分析,由于其确认密钥完全依赖于服务器的长期私钥,因此它不具有前向保密性和密钥泄漏的安全性。
■List as follows:Firstly, the SAKA protocol is analysed, because the authentication codes of the two protocol participants completely lie on the long-term shared key, so it does not resist key-compromise impersonation.
具体工作如下:首先,分析了SAKA协议,由于协议参与者双方的认证码完全依赖于长期共享密钥,因此它不具有密钥泄漏的安全性。
■defrauding insurance proceeds through impersonation
冒名骗赔
■The protocols provide known session key security,part forward secrecy,and there is no key-compromise impersonation,no unknown key-share and no key control.
协议满足前向安全性、会话密钥泄露的安全性、个人密钥泄露的安全性,无不明密钥共享,单方不能控制密钥生成。
■It does so even if impersonation is disabled.
即使禁用了模拟,它仍会这样操作。
■The latter approach provides better performance because it avoids impersonation altogether.
后一种方法提供的性能更佳,因为它完全避免了模拟。
■comedian Tina Fey, No. 51 in part for playing Sarah Palin, the 2008 Republican vice presidential nominee, in wildly popular TV impersonation s during the election campaign;
喜剧演员蒂娜?菲(第51位),她因总统大选期间在一档收视率很高的模仿秀节目中模仿副总统候选人莎拉?佩林而人气飙升;
■Therefore, if the Web site is configured to perform impersonation, you must grant the TCB privilege to the account that is running the Web server.
因此,如果网站配置为执行模拟,则必须向运行Web服务器的帐户授予TCB特权。
■In China, some with a long history of Daxing, often difficult to avoid the fate of Waizu impersonation.
在中国,一些具有悠久历史的大姓,常常难以避免被外族冒用的命运。
■Oscar is one rockin mama, as she performs a pretty mean Mick Jagger impersonation.
奥斯卡是一个母亲,正如她扮演漂亮的米克 贾格尔。
■10. In her habits, she was a living impersonation of order, method, and exactness .
她的生活习惯活生生地体现了井井有条,按部就班和精密细致等准则。
■How do I use programmatic impersonation?
如何使用可编程的模拟?
■Keep doing this until you can just blurt it out.If when you try really hard, and your impersonation matches the original by 90%, then when you are relaxed you should still be able to reach 85%.
如果你在刻意模仿的状态下近似度在90%左右,那么长时间下来,你在非刻意模仿的状态下近似度应该会潜移默化地停留在85%左右。
■If your custom data processing extension connects to data sources using impersonation, you must use the Open method on either the IDbConnection or IDbConnectionExtension interfaces to make the request.
如果您的自定义数据处理扩展插件使用模拟功能连接到数据源,则必须在IDbConnection或IDbConnectionExtension接口上使用Open方法来发出请求。
■If the managed code provides authentication services, it must obtain a Windows NT security token and do an impersonation before calling any COM objects.
如果托管代码提供身份验证服务,那么在调用任何COM对象之前,它必须获得Windows NT安全标记并进行模拟。
■If you laugh yourself after seeing the film, then that's a successful impersonation.
如果自己看完录影会笑出来,就算是次成功的模仿表演。
■These were fervent Brahmins, the bitterest foes of Buddhism, their deities being Vishnu, the solar god, Shiva, the divine impersonation of natural forces, and Brahma, the supreme ruler of priests and legislators.
婆罗门教里有三个转世活佛:第一个是回斯奴,他是太阳神的化身,第二个是希瓦,他是生灵万物主宰的化身,第三个是卜拉马,他是一切婆罗门教教长和立法者的主宰。
■Security impersonation levels govern the degree to which a server process can act on behalf of a client process.
安全模拟级别控制服务器进程可以在何种程度上代表客户端进程执行操作。
■For a man who is not supposed to be an ace, Chien-Ming Wang did quite an impersonation.
对一位不被认定是王牌投手的人来说,王建民模仿的可是真像啊。
■For client impersonation, ASP.NET will connect to the session-state store using the security credentials that were negotiated with the browser.
对于客户端模拟,ASP.NET将使用与浏览器协商的安全凭据来连接会话状态存储区。
■Do not use impersonation for reports that support subscriptions or that use schedules to generate report history or refresh a report execution snapshot.
对于支持订阅的报表,或按计划生成报表历史记录或刷新报表执行快照的报表,请勿使用模拟功能。
■Rather, impersonation and reverting change the token associated with the current operating system process.
对象。相反,模拟和恢复更改同当前操作系统进程关联的标记。