应该用相应的文件权限保护这个文件。
This file should be protected with respective file permissions.
此外,在没有权限保护时,内存访问必须遵循严格的类型安全。
Additionally, while not protected by a permission, memory access must be confined to strict type safety.
传回数值,表示是否允许不受限制地存取受使用权限保护的资源。
Returns a value indicating whether unrestricted access to the resource protected by the permission is allowed.
开始的步骤中有一步是确定究竟计划让您的自定义权限保护什么资源。
One of the first steps is to determine exactly what resource your custom permission is designed to protect.
虽然希望避免让两个权限保护同一资源,但在某些情况下,您无法合理地予以避免。
Although you want to avoid having two permissions that protect the same resource, in some situations you cannot reasonably avoid it.
我们将使用资源一词来表示可以使用权限保护的最细粒度的功能;例如,We b页或EJB方法调用。
We'll use the term resource to refer to the finest grain of functionality that we can secure with a permission; for example, a Web page or EJB method call.
如果您的代码仅调用公开了保护的资源的一个安全系统库,则不必仅因为该库公开了一个权限保护的资源而请求该权限。
If your code simply calls a secure system library that exposes a protected resource, you do not need to demand a permission just because the library exposes the resource protected by that permission.
这些键集通过它们的键,提供了对保护数据的读写权限。
These keysets provide read and write access to the data protected by their keys.
实际上,帐号、密码和权限只能在遵守固定规则的操作系统环境中保护您的数据。
The fact is accounts, passwords, and permissions can only protect your data in the context of an operating system that obeys stated rules.
FOAF信息聚合者在其操作权限以内必须承担数据保护法律下的什么法律义务呢?
What legal obligations do aggregators of FOAF information have under the data-protection law in the jurisdiction under which they operate?
应用程序可以定义它们自己的定制权限,以保护应用程序资源。
Applications can define their own custom permissions to protect application resources.
通过前面所描述的机制,可以为键不安全的内核扩展授予广泛的数据访问权限,这种机制是一种保护门类型,我们将其称为隐式保护门。
The mechanism described earlier that grants broad data access rights to a key-unsafe kernel extension is a type of protection gate called an implicit protection gate.
这类信息无需严格保护,任何系统用户都有足够权限阅读公共信息。
This type of information is not strictly protected, and any system user usually has enough privileges to read public information.
豁免权使原本安全标签权限不足的用户可以访问受保护数据。
An exemption allows users access to protected data that the user's security labels might have otherwise prevented from accessing.
权限必须被请求,定义了定制的权限,文件和内容提供者就可以受到保护。
Permissions must be requested, customized permissions defined, and file and content providers protected.
第一个方法是编写自定义wsadmin脚本,并使用操作系统权限对其进行保护,以确保每个管理员只能为其所属的服务器运行这些脚本。
The first approach is to write custom wsadmin scripts and protect them using operating system permissions to ensure that each administrator can only run the scripts for his servers.
keytab文件夹必须由进程访问权限进行保护。
It is imperative that the keytab file is protected by process access permissions.
因此,每一个类或者对象“属于”一个ProtectionDomain,安全策略对这个保护域授予了某种访问权限。
Therefore, each class or object "belongs to" a ProtectionDomain, to which certain access permissions have been granted by the security policy.
mqm用户ID和组基本上不能受到OAM实施的安全保护,因为不能回收它们的访问权限。
The MQM user ID and group are essentially exempt from security enforced by the OAM, since their access cannot be revoked.
当前任务或事务userid需要保护替代userid的替代用户配置文件的UPDATE访问权权限,以便获得使用它的授权。
The current task or transaction userid needs UPDATE access to the alternate user profile that protects the alternate userid, in order to be authorized to use it.
SugarSync可以使你对网页上的你的文件拥有更多控制权限,你可以直接打开并编辑文件,或加密保护个人文件或文件夹。
SugarSync also gives youmore control over your files on the web, allows you to open and edit filesdirectly, or password protect individual files or folders.
所有其他访问,无论是来自交互式用户还是其他队列管理器,都应该使用受低权限mCAUSER保护的通道。
All other access, whether from interactive users or from other queue managers, should arrive over a channel protected by a low-privileged MCAUSER.
访问控制列表是权限列表或保护资源的权限集。
An access control list is a list of permissions or sets of permissions securing a resource.
从一个未经身份验证的客户机或权限低于所要求权限的帐户试图访问受保护的对象将会分别导致一个登录提示或“HTTP 401 ”错误。
Accessing protected objects from an unauthenticated client or an account with lower privileges than required will return a login prompt or "HTTP 401" error, respectively.
“端口”是用于任务之间通信的受保护的消息队列;任务拥有各自端口的发送和接收权限。
A "port" is a protected message queue for communication between tasks; tasks own send and receive rights to each port.
默认情况下,Android应用程序没有被授予权限,这通过不允许它们访问设备上的受保护API或资源,确保了它们的安全。
By default, Android applications have no permissions granted, making them safe by not allowing them to gain access to protected APIs or resources on the device.
其他应用程序想要访问一个应用程序的受保护资源,就必须通过它们自己的manifest文件请求适当的权限。
Other applications wanting to access an application's protected resources must request the appropriate permissions through their own manifest file.
除了我们已经考虑的两个之外,最常用的是用户名和密码,它们验证您对可能受保护的JNDI存储的访问权限。
The most common ones, aside from the two we've looked at, are the user name and password that authenticate you for access to JNDI stores that may be secure. These parameters are
资源的访问控制政策提供授予对资源的用户或组的访问权限,并将属性来保护这些资源分配的功能。
Resource access control policies. Provide the ability to grant access to resources by users or groups and assign attributes to protect those resources.
资源的访问控制政策提供授予对资源的用户或组的访问权限,并将属性来保护这些资源分配的功能。
Resource access control policies. Provide the ability to grant access to resources by users or groups and assign attributes to protect those resources.
应用推荐