x
uploads/keystroke.jpg

keystroke 【計算機】擊鍵。

keyway

There are online services that can be accessed only if the rhythm and other characteristics of your typing match a stored template of your “ keystroke dynamics ” 有的網上服務系統具有這樣的功能:把用戶打字的節奏及其它特征與該用戶的“擊鍵力學模式”相比對,只有兩相符合,系統才允許用戶進入。

When forestage dcs system or pid regulator happened fault , manipulator receiving failure signal immediately switch into manual control state , by keystroke controls operation signal output 可分別帶有一路pid控制輸出及一路變送輸出。具有多種曲線控制輸出功能:可實現曲線控制暫停清零步進等。

A predetermined sequence of commands programmed as one command during the assembly of a computer program . macros enable users to execute a number of commands with a single keystroke 中義電腦程式中將一串預先決定的指令組合成一個單一的指令。巨集讓使用者可以按一個鍵就執行一串指令。

Based on the previous study , we adopt svm ( support vector machines ) to recognize the individual keystroke pattern . through experiments we gain better results 在已有研究基礎上,提出采用svm ( supportvectormachines )進行鍵入模式識別,通過實驗得出了較好的識別結果。

The study of key generation was outlined from keystroke , voice and handwritten signatures and so on , and the security of key generation systems was introduced 從擊鍵特征、聲音和手寫簽名等生物行為特征詳細概述了生物特征生成密鑰的框架,并介紹密鑰生成系統的安全性。

You can use this property to process all keystrokes in your application and either handle the keystroke or call the appropriate control to handle the keystroke 可以使用此屬性處理應用程序中的所有的擊鍵事件,并可以處理擊鍵事件或調用適當的控件來處理擊鍵事件。

Digital set by panel soft push keystroke setting value of the parameter would be permanent maintenance after power to fail , setting value of the parameter is locked with password 面板輕觸式按鍵數字設定,參數設定值斷電后永久保存,參數設定值密碼鎖定

Keystroke loggers are available in either software or hardware versions . they can store everything a user types without the user ever knowing they ' re even there 擊鍵記錄者有軟件或硬件版本。它們可以在用戶不知其存在的情況下保存用戶輸入的一切。

Let ' s look at the different versions of keystroke loggers and discuss what you can do to protect your organization and your users from this threat 讓我們看看擊鍵記錄者的不同版本,并討論你可以采取什么措施來保護組織機構和用戶免受此威脅罷。

These keystroke loggers are physical devices that sit between the keyboard and the computer ? connecting the keyboard with the keyboard port on the computer 這些擊鍵記錄者是位于鍵盤和計算機之間的特殊設備? ?用計算機鍵盤接口連接鍵盤。

Many are standard key combinations used in most windows applications ; the table lists the specific function that the keystroke has in the ide 其中許多組合鍵是大多數windows應用程序中使用的標準組合鍵;該表列出了ide中鍵擊的具體功能。

When you type the opening brace after the selector for a style rule , a list of available style attributes appears on the next keystroke 如果在某一樣式規則選擇器之后鍵入左大括號( { ) ,下次擊鍵時將顯示一個可用樣式屬性列表。

Learn about the different versions of keystroke loggers , and get tips for protecting your organization and your users from this threat 來了解一下擊鍵記錄者的不同版本,并獲取一些保護組織機構和用戶免受此威脅的小貼士罷。

Even worse , nothing can detect a hardware keystroke logger , which can capture usernames and passwords as you log into your machine 更糟的是,無法檢測一個硬件擊鍵記錄者,它可以在你登錄機器時捕獲用戶名和密碼。

Some keystroke combinations may not work , some mouse activity may not work , or some events may not be raised as expected 某些按鍵組合可能不工作,某些鼠標活動可能不工作,或者某些事件可能不會按期望引發。

After the form s event handlers have completed processing the keystroke , the keystroke is then assigned to the control with focus 在窗體的事件處理程序處理完該擊鍵后,然后將該擊鍵分配給具有焦點的控件。

Some companies actually sell keyboards with built - in keystroke loggers , which means there ' s no way to visually detect them 一些公司實際上銷售帶內置擊鍵記錄者的鍵盤,這意味者無法從外觀上檢測他們。

Keystroke loggers are a particularly dangerous security threat because users typically don ' t realize they ' re even there 擊鍵記錄者是特別危險的安全威脅,因為他們即使存在,用戶通常也沒有察覺到。

To send keystrokes or combinations of keystrokes to the active application and wait for the keystroke messages to be processed 可以將鍵擊或組合鍵擊發送到活動應用程序,并等待處理鍵擊消息。