档案系统必须针对其本身的使用者权限进行管理。
A records system has to manage user permissions specific to itself.
这些攻击往往来自恶意程序码,而这些程序码常借由执行程序码的使用者权限而执行。
Often these attacks come from malicious code that executes with the permissions of the user running the code.
若要安装已启动载入的元件,使用者可能需要该电脑的系统管理或类似的使用者权限。
To install bootstrapped components, the user might need administrative or similar user permissions on the computer.
SID筛选可用来防止恶意使用者的攻击,这些使用者可能会尝试授与较高的使用者权限给其他使用者帐户。
SID filtering is used to prevent attacks from malicious users who might try to grant elevated user rights to another user account.
他们亦有权去关闭用户组连接、移除使用者权限、暂停使用者注册、停止论坛运作或者将论坛运作终止或移除。
They are also within right to close off membership group access, remove user rights, suspend new user registration, pause forum activity, and place the forum under suspension or deletion.
其可以采用组织为所有系统所设计的员工登录与使用者权限。然而,组织若不存在此一般性的使用者权限登录程序,则必须设计属于自己的登录程序。
It may draw on the organization's register of employees and user permissions for all systems, but where there is no general user-permissions registration procedure, it has to devise its own.
专有软件的使用是由使用者授权合约(EULA)限定的,而不只有版权限定,而且使用者没有源代码。
Proprietary software is restricted by EULAs, not just by copyright, and the users don't have the source code.
其确保只有那些拥有适当权限的使用者才可以执行所授权的档案工作。
It ensures that only those users with appropriate permissions are performing records tasks for which they have been authorized.
这样的程序通常是suid(设定uid)root,也就是即使一般的老使用者执行这个程序时系统也会按请求将特殊权限扩充给应用程序。
Such programs are generally suid (set uid) root, meaning that the system extends special privileges to the application upon request, even if a regular old user runs the program.
ArchLinux默认使用su,如果你还是愿意选择使用sudo来获得root权限,我们可以安装它,并且添加我们的用户到sudo使用者(sudoers)列表中,通过使用下面的命令。
Arch Linux USES su by default, but if you'd rather use sudo to gain root privileges, we can install it and add our user to the list of sudoers by using the following commands.
对于登陆数据库系统的使用者,采用不同的用户身份登陆以赋予其不同的权限。
For the users who login database system, different limits of authority are given by different user identities.
你可以针对不同的使用者角色,设定不同的阅读、建立和编辑页面的权限。
You can set the permissions that different user roles have to view, create, and edit pages.
预存程序可以利用拥有权链结提供对资料的存取,如此使用者即使没有明确的权限,也可以存取资料库物件。
Stored procedures take advantage of ownership chaining to provide access to data so that users do not need to have explicit permission to access database objects.
使用报表产生器或报表设计工具,即可让使用者更新报告,但不授与资料库的读取权限。
By using report Builder or report Designer, you can allow users to update reports without granting them read access to the databases.
如此可以让使用者存取该程序所使用的资料库资源,而不必为其授与资料库存取权或权限。
This gives users access to the database resources used by the procedure without granting them database access or permissions.
这是建议的方式,让没有管理权限的使用者或在可从共用执行应用程序时可以安装应用程序。
This way is recommended to enable installation of applications by users who do not have administrative rights or when it should be possible to run an application from a share.
应用程序尝试在“标准使用者”角色没有权限的登录机码上执行作业。
An application attempted to perform an operation on a registry key to which the Standard User role does not have permissions.
应用程序尝试对“标准使用者”角色没有权限的档案执行作业。
An application attempted to perform an operation on a file to which the Standard User role does not have permissions.
取得目前有活页簿写入权限的使用者名称。
The name of the user who currently has write permission for the workbook.
大部分的一般安全机制都是依据使用者的登入认证 (一般为密码) 来授与权限,并限制使用者允许存取的来源 (通常为目录和档案)。
Most common security mechanisms give rights to users based on their logon credentials (usually a password) and restrict resources (often directories and files) that the user is allowed to access.
为电脑、群组或使用者提供指定的存取权限。
Gives a computer, group, or user the specified access rights.
当使用者加入受限的使用权限时,根据预设,工作表的后置程序码将无法执行,而且工作表也不会填入资料。
When the user adds the restricted permissions, by default, the code behind the worksheet cannot run, and the worksheet will not be populated with data.
这样做的结果会提供更高的安全性,因为使用者不再是使用可遭恶意利用的不必要权限而执行的。
The result is greater security because users are no longer running with unnecessary privileges that can be maliciously exploited.
请注意,不受限制的使用者和企业层级并不会导致将不受限制的使用权限授与组件。
Note that unrestricted user and enterprise levels do not result in unrestricted permissions being granted to an assembly.
当您使用自订资料产生器时,它会以与现用使用者相同的权限来执行。
When you use a custom data generator, it runs with the same permissions as the active user.
已在安全性群组中加入或移除使用者,或更新使用权限。
Users are added to or removed from security groups or permissions are updated.
如果清除此核取方块,则会隐含性复制继承自父资料夹的使用者、群组和使用权限,而且可以进行修改。
When the check box is cleared, the users, groups, and permissions that are inherited from the parent folder are implicitly copied and can be modified.
当您执行已经使用某个凭证签署的预存程序时,授与凭证使用者的权限就会与呼叫端的权限合并。
When a stored procedure that has been signed with a certificate executes, the permissions granted to the certificate user are merged with those of the caller.
当您执行已经使用某个凭证签署的预存程序时,授与凭证使用者的权限就会与呼叫端的权限合并。
When a stored procedure that has been signed with a certificate executes, the permissions granted to the certificate user are merged with those of the caller.
应用推荐