应该用相应的文件权限保护这个文件。
This file should be protected with respective file permissions.
这些键集通过它们的键,提供了对保护数据的读写权限。
These keysets provide read and write access to the data protected by their keys.
所有其他访问,无论是来自交互式用户还是其他队列管理器,都应该使用受低权限mCAUSER保护的通道。
All other access, whether from interactive users or from other queue managers, should arrive over a channel protected by a low-privileged MCAUSER.
FOAF信息聚合者在其操作权限以内必须承担数据保护法律下的什么法律义务呢?
What legal obligations do aggregators of FOAF information have under the data-protection law in the jurisdiction under which they operate?
实际上,帐号、密码和权限只能在遵守固定规则的操作系统环境中保护您的数据。
The fact is accounts, passwords, and permissions can only protect your data in the context of an operating system that obeys stated rules.
通过前面所描述的机制,可以为键不安全的内核扩展授予广泛的数据访问权限,这种机制是一种保护门类型,我们将其称为隐式保护门。
The mechanism described earlier that grants broad data access rights to a key-unsafe kernel extension is a type of protection gate called an implicit protection gate.
这类信息无需严格保护,任何系统用户都有足够权限阅读公共信息。
This type of information is not strictly protected, and any system user usually has enough privileges to read public information.
从一个未经身份验证的客户机或权限低于所要求权限的帐户试图访问受保护的对象将会分别导致一个登录提示或“HTTP 401 ”错误。
Accessing protected objects from an unauthenticated client or an account with lower privileges than required will return a login prompt or "HTTP 401" error, respectively.
访问控制列表是权限列表或保护资源的权限集。
An access control list is a list of permissions or sets of permissions securing a resource.
豁免权使原本安全标签权限不足的用户可以访问受保护数据。
An exemption allows users access to protected data that the user's security labels might have otherwise prevented from accessing.
应用程序可以定义它们自己的定制权限,以保护应用程序资源。
Applications can define their own custom permissions to protect application resources.
权限必须被请求,定义了定制的权限,文件和内容提供者就可以受到保护。
Permissions must be requested, customized permissions defined, and file and content providers protected.
“端口”是用于任务之间通信的受保护的消息队列;任务拥有各自端口的发送和接收权限。
A "port" is a protected message queue for communication between tasks; tasks own send and receive rights to each port.
因此,每一个类或者对象“属于”一个ProtectionDomain,安全策略对这个保护域授予了某种访问权限。
Therefore, each class or object "belongs to" a ProtectionDomain, to which certain access permissions have been granted by the security policy.
mqm用户ID和组基本上不能受到OAM实施的安全保护,因为不能回收它们的访问权限。
The MQM user ID and group are essentially exempt from security enforced by the OAM, since their access cannot be revoked.
默认情况下,Android应用程序没有被授予权限,这通过不允许它们访问设备上的受保护API或资源,确保了它们的安全。
By default, Android applications have no permissions granted, making them safe by not allowing them to gain access to protected APIs or resources on the device.
第一个方法是编写自定义wsadmin脚本,并使用操作系统权限对其进行保护,以确保每个管理员只能为其所属的服务器运行这些脚本。
The first approach is to write custom wsadmin scripts and protect them using operating system permissions to ensure that each administrator can only run the scripts for his servers.
我们将使用资源一词来表示可以使用权限保护的最细粒度的功能;例如,We b页或EJB方法调用。
We'll use the term resource to refer to the finest grain of functionality that we can secure with a permission; for example, a Web page or EJB method call.
其他应用程序想要访问一个应用程序的受保护资源,就必须通过它们自己的manifest文件请求适当的权限。
Other applications wanting to access an application's protected resources must request the appropriate permissions through their own manifest file.
keytab文件夹必须由进程访问权限进行保护。
It is imperative that the keytab file is protected by process access permissions.
除了我们已经考虑的两个之外,最常用的是用户名和密码,它们验证您对可能受保护的JNDI存储的访问权限。
The most common ones, aside from the two we've looked at, are the user name and password that authenticate you for access to JNDI stores that may be secure. These parameters are
当前任务或事务userid需要保护替代userid的替代用户配置文件的UPDATE访问权权限,以便获得使用它的授权。
The current task or transaction userid needs UPDATE access to the alternate user profile that protects the alternate userid, in order to be authorized to use it.
SugarSync可以使你对网页上的你的文件拥有更多控制权限,你可以直接打开并编辑文件,或加密保护个人文件或文件夹。
SugarSync also gives youmore control over your files on the web, allows you to open and edit filesdirectly, or password protect individual files or folders.
资源的访问控制政策提供授予对资源的用户或组的访问权限,并将属性来保护这些资源分配的功能。
Resource access control policies. Provide the ability to grant access to resources by users or groups and assign attributes to protect those resources.
这并不会保护数据以防可以监听用户输入密码的根权限入侵,它可以为丢失的没有文件系统加密的设备提供保护。
While this does not protect data from a root compromise that can monitor the user inputting the password, it can provide protection for a lost device without file system encryption.
将默认根权限应用于OS磁盘分区并传播到未受保护的子分区。传播时间由未受保护的子分区数决定。
Applies default root permissions to the OS partition and propagates them to unprotected children. Propagation time depends on the number of unprotected children.
我们要求这些组织担当保护个人的信息和一定的法律权限内使用它而且他们有着明确的使用目的。
We require these organizations to undertake to protect personal information and to only use it in accordance with applicable laws and for the purposes for which they are specifically engaged.
它不再局限于系统9系统文件夹,而是分布在多个文件夹,其中大部分是无法访问(看不见的,受保护的或没有权限)。
It is no longer confined within the System 9 System folder, but is distributed all around multiple folders, most of them being inaccessible (invisible, protected or permission denied).
警告:这个页面已经被保护,只有拥有管理员权限的用户才可以修改。
WARNING: This page has been locked so that only users with sysop privileges can edit it.
警告:这个页面已经被保护,只有拥有管理员权限的用户才可以修改。
WARNING: This page has been locked so that only users with sysop privileges can edit it.
应用推荐