船安全绕过一个小岛。
船安全绕过一个岛。
豁免权为用户绕过一个安全策略中的一个或多个访问规则提供了一种方式。
Exemptions provide a way to allow users to bypass one or more access rules for a security policy.
如果被绕过的功能涉及系统安全,那么结果可能是灾难性的。
When the functionality bypassed is system security, the results can be disastrous.
这种类型的攻击甚至可用于绕过显式安全检查。
This kind of attack can even be used to bypass explicit security checks.
这允许使用一个可编程US B开发板和一个AT 90us B微控制器来绕过PS 3的安全系统,执行未签名的代码。
This apparently allows a programmable USB development board with an AT90USB microcontroller to be used to circumvent the PS3's security systems and execute unsigned code.
使用ThreadLocal使我们可以绕过为实现线程安全而对何时需要同步进行判断的复杂过程,而且因为它不需要任何同步,所以也改善了可伸缩性。
Using ThreadLocal allows us to bypass the complexity of determining when to synchronize in order to achieve thread-safety, and it improves scalability because it doesn't require any synchronization.
因此,定义QALIAS的权限允许用户绕过安全性,只应该允许最可信的管理员定义或更改QALIAS。
Therefore the authority to define a QALIAS can allow a user to bypass security, and only the most trusted administrators should be permitted to define or alter a QALIAS.
这些小偷翻过围墙,绕过警卫,穿过一楼阳台的安全网。
They scaled the compound walls, skipped past the guards and broke through a security grill on a first-floor balcony.
员工总能遭到绕过公司安全措施的法子。
Employees Will Find Ways to Route Around Corporate security.
这可能导致系统不安全,因为黑客可以编写代码来直接调用EJB,而得以绕过web层。
This can lead to an insecure system, as hackers may be able to write code to call the EJB directly and bypass the Web tier.
XULRunner可以在任何浏览器之外运行XUL文件,因此可以绕过严格的安全模型。
XULRunner can run XUL files outside of any browser, thus avoiding the stringent security model.
和安全我的意思是我们钩不能绕过。
它能绕过传统的网络安全防御,很难被发现。
It can bypass the traditional network security defense, it is difficult to be found.
有例子文件共享软件绕过公司的网络安全。
There have been examples of file sharing software bypassing a company's network security.
看上去这些行人像要撞击在一起一样,而实际上他们像旋转的芭蕾舞者,绕过彼此,最终安全地到达对岸。
It looks like they must crash, this sea of people, but they swerve and swing around each other, like dancers pirouetting, and they all get to the other side safely.
他说,这个项目接受的最多的是易受攻击的人,比如为美军工作过的伊拉克难民,但是不会允许他们绕过安全筛选。
He said the program accepts the most vulnerable cases, such as Iraqis fleeing after working for U. s. forces, but wouldn't allow any of them to bypass any security screenings.
“联邦调查局也许用了另一种措辞来形容这个工具,但不要被误导:构建一个采用这种方式绕过安全屏障的iOS版本,无疑就创建了一个后门,”库克写道。
"The F. B. I. may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a back door," Mr. Cook wrote.
联邦调查局说,他们的专家无法获取法鲁克iPhone上的数据,只有苹果才有办法绕过它的安全功能。
The F. B. I. said that its experts had been unable to access data on Mr. Farook's iPhone, and that only Apple could bypass its security features.
由于发生在主机或服务器上的所有活动都要使用操作系统,也就是说,即使攻击者绕过了其它某一种或几种安全防御系统,他们最终都必须使用操作系统。
All activities on a host or server must use operation system, even if attackers of the future discover ways to circumvent other defenses, they must still use the operation system.
一个后门程序可以绕过电脑的安全机制进入电脑。
A backdoor can gain access to a computer by going around the computer access security mechanisms.
举例来说,如果命令没有受到保护,则队列就不可能安全,这是因为任何人都可以定义QALIAS,然后使用QALIAS来绕过队列安全性。
As an example, if commands are left unprotected, then queues cannot be secure because if anyone can define a QALIAS, they can use the QALIAS to bypass queue security.
当你遇到危险的时候,比如我们在路上遇到的这条蛇,不要逞能扮英雄,绕过它,安全地走开。
When you find danger, like this snake that we encountered on our way, don't try to play hero. Go around it and have a safe walk.
在无线网络中,攻击者可以修改自己无线网卡的MAC地址为合法站点的地址,从而可以绕过访问控制列表,窃取网络信息,这给无线网络安全带来很大的危害。
In wireless network, intruders can change their MAC addresses to legitimate ones. Thus their wireless facilities can't be found by access control list, and they can steal network information.
在无线网络中,攻击者可以修改自己无线网卡的MAC地址为合法站点的地址,从而可以绕过访问控制列表,窃取网络信息,这给无线网络安全带来很大的危害。
In wireless network, intruders can change their MAC addresses to legitimate ones. Thus their wireless facilities can't be found by access control list, and they can steal network information.
应用推荐