According to the ways and steps of the 3389 terminal installed in remote distance, it discusses some measures to prevent from invalid access for 3389 terminal.
并根据远程安装3389终端服务的方法和步骤,介绍了怎样阻止3389非法访问的具体措施。
Native code may attempt to access an object that has invalid input (such as a stale local reference) or that is coded incorrectly.
本机代码可能尝试访问具有无效输入(如过时的本地引用)或编码错误的对象。
For capture you want to ensure that the access to MQ message queue can be secured so that no invalid messages can be sent to RFIDIC.
对于捕捉,希望保护对MQ消息队列的访问,以避免无效的消息被发送给RFIDIC。
EasyOA further leverages LBAC to implement DBMS level security, so as to prevent invalid data access among tenants.
EasyOA还利用LBAC实现dbms级安全性以防止租户之间的非法数据访问。
So if a client sends a command such as: "look at actor with ID 200000" this will crash the server if unguarded since the server will attempt to access an invalid memory.
所以如果一个客户端发送一条命令类似:“查看 ID200000的角色”,这会使服务器当机,如果没有防备的话,因为服务器会访问非法的内存区域。
Unauthorized: Access is denied due to invalid credentials.
未经授权:因为认证无效而拒绝存取。
A race condition exists when a thread modifies a resource to an invalid state, and then another thread attempts to access that resource and use it in the invalid state.
当一执行绪将资源修改为无效状态,而接著另一执行绪尝试存取这个资源并在无效状态中使用它时,就出现竞争情形。
By using these constructs for indirect access to internal fields, you can guard against invalid input values.
透过以这些建构来间接存取内部栏位,您可以防范无效的输入值。
The access control list (ACL) structure is invalid.
访问控制列表(acl)结构无效。
The account you have attempted to access is currently locked out due to invalid login attempts. Please try again in 15 minutes.
这个你尝试进入的帐户现在已销上,原因是不正确的尝试,请15分钟后再试。
It puts forward a method that can access global trust value in distributed P2P system, and resolves signal peer invalid problem.
给出一种在分布式P 2 P系统中存取全局信任值的方法,解决了单点失效问题。
As an important mechanism in security services, access control can protect system resources from invalid usage.
访问控制是安全服务中一种重要的机制,它能够保护系统资源免遭非法使用。
As an important mechanism in security services, access control can protect system resources from invalid usage.
访问控制是安全服务中一种重要的机制,它能够保护系统资源免遭非法使用。
应用推荐