Using Libraries from Partially Trusted Code.
通过部分受信任的代码使用库。
How to: Run Partially Trusted Code in a Sandbox.
如何:运行沙盒中部分受信任的代码。
This member cannot be used by partially trusted code.
这个成员无法供部分信任的程序码所使用。
Access restrictions are ignored for fully-trusted code.
对于完全受信任的程序码来说,存取限制会忽略。
Without this declaration, only fully trusted code can use such assemblies.
如果没有此宣告,只有完全信任的程序码可以使用这类组件。
For an overview of this issue, see Using Libraries from Partially Trusted Code.
有关此问题的概述,请参见通过部分受信任的代码使用库。
Describes how to help protect methods from being called by partially trusted code.
说明如何协助保护方法不被部分受信任程序码呼叫。
I'll also show an example that USES partially trusted code and code access security.
并且同时举出一个部分使用可信任代码以及代码访问安全这两个特性的实例。
It allows systems to be configured to execute partially trusted code without prompting the user.
他允许在不提示用户的前提下将系统被配置为执行半信任代码。
Meanwhile, the partially trusted code is only allowed to do things appropriate to its level of trust.
同时,半信任代码仅仅被允许做在其信任度下相应的事情。
Using reflection mechanisms, highly trusted code that can reference your object can get and set private members.
通过使用反射机制,那些能够引用您的对象的、高度受信任的代码,可以获取和设置私有成员。
Sometimes your partially trusted code simply needs access to the file system without prompting the user for permission.
有时您的半信任代码仅仅需要在不提示用户需求权限的情况下访问文件系统。
The browser control and partially trusted code open the door to some very interesting possibilities using managed code.
浏览器控件与半信任代码为一些使用托段代码的非常有趣的可能的功能打开了大门。
Additionally, you must strike a balance between security and usability in all the expected scenarios using trusted code.
此外,在使用受信任代码的所有预期方案中,必须在代码的安全性和可用性之间达成一种平衡。
In such cases, your trusted code can be the go-between, similar to the managed wrapper or library code described in Securing wrapper code.
在这种情况下,受信任的代码可以充当中介,它类似于保护包装代码中所述的托管包装或库代码。
After I talk about what happened to the rich client, I will discuss trusted code and security as well as deployment of code that runs on the.
在我谈论完富客户端到底发生了什么,我将会导论可信任代码以及安全性以及运行在在。
It helps protect computer systems from malicious code and helps protect trusted code from intentionally or accidentally compromising security.
它有助于保护计算机系统免受恶意代码的攻击,并保护受信任的代码以使其安全性免受有意或无意的危害。
It is the backbone of partially trusted code and is not restricted to file access, but rather affects everything from network access to windowing and more.
他是半信任代码的基础并且不受限于文件访问,但是对于通过网络访问窗口或者其他的任何情况都有相当的影响。
The stack walk is designed to help prevent luring attacks, in which less-trusted code calls highly trusted code and USES it to perform unauthorized actions.
堆栈步旨在防止引诱攻击;在这种攻击中,受信程度较低的代码调用高度信任的代码,并使用高度信任的代码执行未经授权的操作。
A private, protected, or internal method that would not be accessible from normal compiled code is accessed from partially trusted code by using reflection.
无法从一般编译程序码存取的私用、受保护或内部的方法,可利用反映从部份信任程序码存取。
"Trusted code" runs in the control region, user application code runs in the servant region, which completely isolates application execution and transaction management.
“受信任的代码”在控制区域中运行,用户应用程序代码在服务区域中运行,从而将应用程序执行与事务管理完全隔离。
Meanwhile, partially trusted code can be barred from general access to the network and file systems, access to the registry, and other protected resources of the system.
同时半可信代码可以访问网络以及文件系统,访问注册表,以及其他系统保护的资源。
If you do not, publicly visible security-critical types and members are treated as security-safe-critical and can be called by partially trusted code outside the assembly.
如果不这样做,则公开可见的安全关键类型和成员将被视为是安全可靠关键的,并且可以由程序集外部的部分信任的代码调用。
Shows how to create and execute anonymously hosted dynamic methods from partially trusted code, and how to create an application domain for testing partially trusted code.
显示如何从部分信任程序码建立和执行匿名装载动态方法,以及如何建立应用程序定义域来测试部分信任程序码。
With these stores, you can read and write data that less trusted code cannot access and prevent the exposure of sensitive information that can be saved elsewhere on the file system.
使用这些存储区可以读取和写入不太受信任的代码无法访问的数据,并可以防止公开保存在文件系统其他位置的敏感信息。
If you do not expect your code to be executed from a partially trusted context or to be called by partially trusted code, you do not have to be concerned about the information in this section.
如果您不要指望从部分信任的内容中执行,或由部分受信任程序码呼叫您的程序码,您不必担心有关这一节中的资讯。
If you do not expect your code to be executed from a partially trusted context or to be called by partially trusted code, you do not need to be concerned about the information in this section.
如果您的代码预期不会在部分受信任的上下文中执行或被部分受信任的代码调用,那么您不需要关心本节中的信息。
While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website.
尽管限制浏览器只浏览信任站点可以减少受到攻击的风险,恶意代码可以被植入任何的网站。
The attraction of running an MQ application as trusted is that it gives a performance benefit through reduced code pathlength.
将MQ应用程序作为受信任对象运行的好处在于,这样可通过缩短的代码路径长度提供性能优势。
The attraction of running an MQ application as trusted is that it gives a performance benefit through reduced code pathlength.
将MQ应用程序作为受信任对象运行的好处在于,这样可通过缩短的代码路径长度提供性能优势。
应用推荐