• 应该相应文件权限保护这个文件。

    This file should be protected with respective file permissions.

    youdao

  • 此外没有权限保护内存访问必须遵循严格类型安全

    Additionally, while not protected by a permission, memory access must be confined to strict type safety.

    youdao

  • 传回数值表示是否允许不受限制存取使用权限保护资源

    Returns a value indicating whether unrestricted access to the resource protected by the permission is allowed.

    youdao

  • 开始步骤有一步确定究竟计划自定义权限保护什么资源

    One of the first steps is to determine exactly what resource your custom permission is designed to protect.

    youdao

  • 虽然希望避免两个权限保护同一资源但在某些情况下无法合理地予以避免。

    Although you want to avoid having two permissions that protect the same resource, in some situations you cannot reasonably avoid it.

    youdao

  • 我们使用资源表示可以使用权限保护粒度功能例如We bEJB方法调用

    We'll use the term resource to refer to the finest grain of functionality that we can secure with a permission; for example, a Web page or EJB method call.

    youdao

  • 如果代码调用公开保护资源安全系统不必因为库公开了一个权限保护的资源而请求权限

    If your code simply calls a secure system library that exposes a protected resource, you do not need to demand a permission just because the library exposes the resource protected by that permission.

    youdao

  • 这些通过它们的提供保护数据读写权限

    These keysets provide read and write access to the data protected by their keys.

    youdao

  • 实际上帐号密码权限只能遵守固定规则操作系统环境保护数据

    The fact is accounts, passwords, and permissions can only protect your data in the context of an operating system that obeys stated rules.

    youdao

  • FOAF信息聚合者操作权限以内必须承担数据保护法律什么法律义务呢?

    What legal obligations do aggregators of FOAF information have under the data-protection law in the jurisdiction under which they operate?

    youdao

  • 应用程序可以定义它们自己的定制权限保护应用程序资源

    Applications can define their own custom permissions to protect application resources.

    youdao

  • 通过前面所描述机制,可以键不安全的内核扩展授予广泛的数据访问权限这种机制一种保护类型,我们将其称为隐式保护门。

    The mechanism described earlier that grants broad data access rights to a key-unsafe kernel extension is a type of protection gate called an implicit protection gate.

    youdao

  • 信息无需严格保护任何系统用户足够权限阅读公共信息。

    This type of information is not strictly protected, and any system user usually has enough privileges to read public information.

    youdao

  • 豁免权使原本安全标签权限不足用户可以访问保护数据

    An exemption allows users access to protected data that the user's security labels might have otherwise prevented from accessing.

    youdao

  • 权限必须请求定义了定制权限文件内容提供者就可以受到保护

    Permissions must be requested, customized permissions defined, and file and content providers protected.

    youdao

  • 第一方法编写自定义wsadmin脚本使用操作系统权限进行保护确保每个管理员只能所属的服务器运行这些脚本。

    The first approach is to write custom wsadmin scripts and protect them using operating system permissions to ensure that each administrator can only run the scripts for his servers.

    youdao

  • keytab文件夹必须进程访问权限进行保护

    It is imperative that the keytab file is protected by process access permissions.

    youdao

  • 因此每一个或者对象属于ProtectionDomain安全策略对这个保护授予某种访问权限

    Therefore, each class or object "belongs to" a ProtectionDomain, to which certain access permissions have been granted by the security policy.

    youdao

  • mqm用户ID基本上不能受到OAM实施安全保护因为不能回收它们访问权限

    The MQM user ID and group are essentially exempt from security enforced by the OAM, since their access cannot be revoked.

    youdao

  • 当前任务事务userid需要保护替代userid替代用户配置文件UPDATE访问权限以便获得使用授权

    The current task or transaction userid needs UPDATE access to the alternate user profile that protects the alternate userid, in order to be authorized to use it.

    youdao

  • SugarSync可以使网页的你的文件拥有更多控制权限可以直接打开编辑文件加密保护个人文件或文件夹。

    SugarSync also gives youmore control over your files on the web, allows you to open and edit filesdirectly, or password protect individual files or folders.

    youdao

  • 所有其他访问无论是来自交互式用户还是其他队列管理器,都应该使用受低权限mCAUSER保护通道

    All other access, whether from interactive users or from other queue managers, should arrive over a channel protected by a low-privileged MCAUSER.

    youdao

  • 访问控制列表权限列表保护资源权限

    An access control list is a list of permissions or sets of permissions securing a resource.

    youdao

  • 未经身份验证客户机权限低于要求权限帐户试图访问保护对象将会分别导致登录提示或“HTTP 401 ”错误

    Accessing protected objects from an unauthenticated client or an account with lower privileges than required will return a login prompt or "HTTP 401" error, respectively.

    youdao

  • 端口用于任务之间通信保护消息队列;任务拥有各自端口的发送接收权限

    A "port" is a protected message queue for communication between tasks; tasks own send and receive rights to each port.

    youdao

  • 默认情况下,Android应用程序没有被授予权限,这通过允许它们访问设备保护API资源确保了它们的安全

    By default, Android applications have no permissions granted, making them safe by not allowing them to gain access to protected APIs or resources on the device.

    youdao

  • 其他应用程序访问一个应用程序保护资源就必须通过它们自己的manifest文件请求适当的权限

    Other applications wanting to access an application's protected resources must request the appropriate permissions through their own manifest file.

    youdao

  • 除了我们已经考虑两个之外,常用用户密码,它们验证可能保护JNDI存储访问权限

    The most common ones, aside from the two we've looked at, are the user name and password that authenticate you for access to JNDI stores that may be secure. These parameters are

    youdao

  • 资源访问控制政策提供授予资源用户的访问权限属性保护这些资源分配的功能。

    Resource access control policies. Provide the ability to grant access to resources by users or groups and assign attributes to protect those resources.

    youdao

  • 资源访问控制政策提供授予资源用户的访问权限属性保护这些资源分配的功能。

    Resource access control policies. Provide the ability to grant access to resources by users or groups and assign attributes to protect those resources.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定