客户使用有效用户ID和密码登录。
输入有效用户ID和密码。
其中包括数据库名称、有效用户ID和口令。
This includes the database name, a valid user id, and password.
它还需要编校服务器的有效用户ID和密码。
It also requires a valid user id and password for the redaction server.
按钮,并使用您操作系统的有效用户替换其中的值。
Button, and replace the value with a valid user of your operating system.
这10个用户不在工作负载运行时的有效用户列表中。
The 10 users are not in the active user list in the workload run.
它确保只有有效用户才可以使用应用程序(身份验证)。
It ensures that only valid users can use the application (authentication).
在LocalOS下为您的系统定义一个有效用户ID。
记住,我们是通过检查会话中的用户信息来识别有效用户的。
Remember, we recognize validated users by checking the session for their user information.
在任何一种情况下,对于有效用户,这都会造成极大的不便。
In both cases, this can be a major inconvenience to the valid user.
服务器用户“%s”不是数据库“% s”中的有效用户。
Username:用于访问CICS系统的有效用户ID。
连接建立后,任何有效用户都可以使用该可信连接,无需重新验证。
Once established, any valid user can use the trusted connection without re-authentication.
连接建立后,任何有效用户都可以重用该可信连接,无需重新验证。
Once established, all valid users can reuse this trusted connection without re-authentication.
学习有效用户界面的设计,最好的办法是看看其他设计师是如何做的。
There's no better way to learn how to design effective user interfaces than to see how other designers do it.
在Linux手册页上指出:setuid设置当前进程的有效用户id。
From the Linux man pages: setuid sets the effective user id of the current process.
字典攻击——根据字典词汇,使用蛮力搜索的方式推测一个有效用户的密码。
Dictionary attack — Guessing the password of a valid user using a brute force search through dictionary words.
本例中的用户不应该与安全服务器ID(要求使用注册表中的有效用户)相同。
The user in this example should not be the same as the security server id (the requirement for which is a valid user in the registry).
完全隐藏允许SSH访问的事实,要求根据特殊的“敲门”序列识别有效用户。
Completely hiding the fact that you even allow SSH access and requiring a special "knock" sequence to be recognized as a possible user.
任何提供了有效用户ID和密码的用户都能够执行public组有权执行的操作。
Any user that supplies a valid user id and password has the ability to perform any operation the PUBLIC group has been granted.
这确保了对AmazonSQS的请求无法被攻击者捕获并回放以模拟有效用户。
This ensures that the request to Amazon SQS cannot simply be captured by an attacker and replayed, thus mimicking the valid user.
假如全球最大的社交网络Facebook面临关闭的话,其5亿有效用户该怎么办?
What would Facebook's 500 million active users do if the world's largest social network were to be shut down?
使用该请求的Web服务首先尝试验证该令牌;即,查看请求者是否为系统中的有效用户。
The Web service consuming the request first attempts to authenticate the token; that is, find out if the requestor is a valid user in the system.
它维护安全数据库,该数据库中列出了所有有效用户、组和包含安全域的组织。
It maintain the security database which list all the valid user, group, and organization that comprise the secure domain.
完成系统包括标准的功能和完成特性——例如,系统上的有效用户、主目录、主机、网络等对象的查找。
The completion system includes standard functions and completions — for example, lookups of valid users on the system, home directories, hosts, networks, and so on.
因此,字符串samuelclemens 满足条件,但是它的长度显然超出了有效用户名的范围。
Thus, the string samuelclemens fits the criteria, but it is obviously too long for a valid user name.
sem_perm . cuid和sem_perm . uid被设置为调用进程的有效用户id。
Sem_perm.cuid and sem_perm.uid are set to the effective user id of the calling process.
这时,进程的有效用户ID必须和文件的拥有者ID一致,或者进程必须拥有文件的写权限。
To do this, either the effective user ID of the porcess must equal the owner ID of the file, or the process must have write permission for the file.
验证权限时,要求合并代理程序的登录为有效用户,该用户在发布数据库中具有适当的权限。
Verifying permissions requires that the Merge Agent login be a valid user with the appropriate permissions in the publication database.
调用进程的有效用户ID必须是超级用户,或者可以与该信号量集的创建者或所有者匹配的用户。
The effective user ID of the calling process must be that of the super-user or match the creator or owner of the semaphore set.
应用推荐