然而,在英语中,狼是不可信任的。
远程数据源上的身份断言对象为建立可信出站连接定义信任属性。
The identity assertion object on the remote data source defines the trust attributes for establishing a trusted outbound connection.
如果证书未经可信任的证书颁发机构签名,并且您信任此机构,您可以增加证书签名。
If the certificate was not signed by a trusted certification authority, you can add the certification authority if you trust the authority.
不要下载程序,除非它们来自可信任网站,例如苹果应用程序商店。
Don't download programs unless they come from trusted sources, like an Apple App Store.
将评估一系列信任属性以确定某个特定上下文是否可信。
A series of trust attributes are evaluated to determine if a specific context can be trusted.
建立信任,寻找听众,接受可信的消息来源要用可能几年的时间!
Building trust, establishing an audience and being accepted as a credible source of information can take years.
清单10中的命令创建了一个名为tcx1的可信任上下文。
The command in Listing 10 creates a trusted context called TCX1.
这在设计基于脚本的会话是可实现的——即使这里的会话标识今天是‘可信任的’。
This should be true in designing session based scripts -- even where the session tokens are 'trusted' today.
可靠的贡献者和可信任的测试人员必须有效、准确,且客观地评估产品的质量。
Solid contributors and dependable testers have to assess the quality of their products effectively, accurately, and objectively.
例如,一个可信任的程序可以在这样一个目录下创建一个文件,而一个不受信任的用户可以删除或者重命名它。
For example, a trusted program could create a file in such a directory, and an untrusted user could delete and rename.
要检验证书是可信任的,需要在连接建立之前提前加载一个可信任证书库。
Verifying that the certificate is trusted requires that a trust certificate store be loaded prior to establishing the connection.
建立一支可信任的专家队伍。
为了连接到可信任的上下文,您必须有一个客户端,比如ESQLC,JCC或者JDBC。
In order to connect to trusted context, you must have a client, such as ESQLC, JCC, or JDBC.
这些凭据是否可信取决于客户机是否信任对证书进行数字签名的证书颁发机构。
Whether or not these credentials can be trusted will depend on whether or not the client can trust the certificate authority that digitally signed the certificate.
连接由一个特定用户实现,并在可信任的客户端进行。
The connection is made by a specific user and made from a trusted client.
处理:确保您在使用由可信任的根证书颁发机构颁发的有效的、非过期的安全证书。
Workaround: Ensure that you are using valid, non-expired security certificates issued by a trusted root certification authority.
目标是形成决策者能够信任的数据—还要向他们提供数据可信的证明。
The goal is to build data that decision makers can trust-and also provide them with evidence that the data can be trusted.
如果打算使用目录存储可信任库,那么必须要以特定的方式命名文件。
If you are going to use a directory to store the trust store, the files must be named in a certain way.
当属性满足时,就允许可信任上下文。
When the properties are met, a trusted connection is allowed.
OpenSSL附带了一组可信任证书。
在我心中慢慢地成长起来的,主要的倒是这样的信念:只有可信任的人才会信任人。
What grew chiefly upon me, rather, was the conviction that only those who are trustworthy know how to trust.
反之,假如你的工作出现什么紧急状况,你是否有长辈或是可信任的朋友帮你照顾生病的孩子?
If not, is there a parent or a trusted person who could take care of your sick child as long as you go about your emergency?
我有一些客户认真地告诉我:按照定义,我们信任“可信内部网”中的任何东西,这也是我们称其为“可信内部网”的原因。
I have had clients quite earnestly tell me by definition we trust everything on the "trusted internal network", that's why we call it that.
在创建上下文结构之后,必须加载一个可信任证书库。
After the context structure is created, a trust certificate store must be loaded.
当传入连接请求的所有属性匹配DB2服务器上任何可信上下文对象的所有信任属性时,DB2 服务器隐式地授予一个可信连接。
When all attributes of an incoming connection request match all the trust attributes of any trusted context object on the DB2 server, the DB2 server implicitly grants a trusted connection.
可信任硬件网络策略提供了一种可以更高效控制临界系统接入的组织结构。
The trusted device network approach provides an organization with a higher level of control over critical system access.
不要信任可以被不可信用户控制的文件内容。
Don't trust file contents that can be controlled by untrusted users.
如果对第一个问题的回答是肯定的,将信任该拦截器,然后将要求它提供发出请求的可信任用户的用户名称。
If the answer to the first question is yes, the interceptor is trusted and is then asked to provide the user name of the authentic user that issued the request.
如果对第一个问题的回答是肯定的,将信任该拦截器,然后将要求它提供发出请求的可信任用户的用户名称。
If the answer to the first question is yes, the interceptor is trusted and is then asked to provide the user name of the authentic user that issued the request.
应用推荐