一个新的Explorer外壳重新启动,但是这是最初的受限用户的上下文环境。
A new shell will automatically start, running in the originating user context.
分发您的软件而保护本地操作系统不被更改,一些更改可能引起不稳定或破坏安全。即使受限用户账户也可以无需安装而安全地运行虚拟化应用程序。
Run any version of virtually any application on a single operating system without conflicts. You can even run multiple versions of the same application.
如果您以前使用过窗体身份验证,您会了解当用户访问受限资源时,他们将被自动重定向到指定的登录页面。
If you've used forms authentication before, you know that when the user visits a restricted resource, they are automatically redirected to a specified login page.
选择页面通常由一个或多个允许用户选择条件的选择组件构成。受限列表组件根据这些条件查看数据集。
Selection pages are often composed of one or more selection components that let the user select criteria by which a data set is viewed by constrained list components.
仅有9%的功能手机用户有这样的抱怨即使功能手机一般依赖于较慢的无限数据网络存在浏览器受限更多并且难于驾驭等问题。
Yet only 9% of feature phone users had the same complaint, even though feature phones typically rely on slower wireless data networks and have browsers that are more limited and harder to navigate.
这种方法往往比通过“受限制的演示”模式试用软件更好,因为演示模式要求用户在桌面计算机上安装他们可能不会购买的应用程序。
This tends to be a preferred method of trying out software in "restricted demo" mode compared to having to install an application on your desktop that you may not end up buying.
为了成为bob的好友,Alice首先得发送一个消息给fanout交换器iends,我们假设这个交换器是访问受限24的:普通用户不能够将队列绑定到它。
To become friends with a user Bob, user Alice sends a message to the fanout exchange iends. We assume that this exchange is somehow access restricted 24: ordinary users cannot bind queues to it.
logininputview生成一个登录表单,当用户试图访问一个受限action时会看到该表单。
The LoginInputView generates the login form that users will see when they try to access a restricted Action.
用户数据约束(user data constraint)满足了受限的请求应该经由受防护的传输层链接进行传输的需求。
A user data constraint establishes a requirement that the constrained requests be received over a protected transport layer connection.
bash还非常适合于安全性要求高的环境,它具有受限制的启动模式,可以把shell中的用户限制为只能执行一组确定的命令。
Bash is also ideal for secure environments, having a restricted start mode that can confine a user's ability within the shell to a brief, determinable list of commands.
那些从用户观点考虑测试的工具常常受限于一个具体的情况或环境(Swing、InternetExplorer,等等)。
The tools that do allow for testing from a user's perspective are often limited to one specific scenario or environment (Swing, Internet Explorer, and so on).
默认情况下,安全性是被禁用状态,允许不受限制数量的用户来访问这个项目。
By default, security is disabled, allowing unlimited user access to the project. Use the SecurityEnabled property of project object to enable or disable security of a project.
现在,如果用户delta(他不是受限制的组sun的成员)尝试通过su变成用户charlie而且他知道密码,那么身份验证会成功。
Now if user delta, who is not a member of the restricted group sun, attempts to su to user Charlie and knows the password, the authentication will succeed.
如果用户alpha(他是受限制的组sun的成员)尝试通过su变成用户charlie,那么会拒绝他访问。
If user alpha, who is a member of the restricted group sun, tries to su to the user Charlie, he will be denied access.
但是这并不意味着Geronimo用户受限于其发布周期;作为一个开源项目,专业用户随时可以到apache.org查看源代码的最新版本。
But that doesn't mean the Geronimo user is limited by its release cycle; being an open source project, a dedicated user can go to the source at apache.org for the latest version at any time.
离开办公室代理要求的受限制的权限级别不允许用户执行任何会对安全性造成影响的方法。
The restricted level of rights required by the Out of Office agent does not allow the user to perform any methods that impact security.
在这种情况下,当用户首次访问门户并请求一个受限制的应用程序或数据源时,CAS将执行身份验证。
In this case, cas will perform the authentication when the user first visits the portal and requests a restricted application or data source.
由于html视图是用于胖客户机的,我们将在其中显示用户名,但在wml视图中将省略用户名,因为这个是更受限制的客户机。
Since the HTML view is intended for a rich client, we will show the user name, but omit it from the WML view since this is a more constrained client.
这款集思广益的工具将想法组织归类到不同的页面,存储空间不受限制,允许用户评论。
This brainstorming tool organizes and categorizes ideas onto different pages, provides unlimited storage, and allows users to comment on topics and ideas.
这种方式有一点儿受限制,因为它不提供无状态性能——实际上是为每个用户使用一个单独的线程。
This approach is a little more limited, because it does not give you stateless performance — you are in fact using a separate thread per user.
通过使用可信上下文,可以在使用受限制的、敏感的特权时提供更强的控制,并且使中间层服务器或应用程序可以向数据库服务器确定用户的身份。
Using trusted contexts provides greater control while using restricted, sensitive privileges, and allows middle-tier servers or applications to assert the identity of the user to the database server.
默认情况下,用户将在受限制的语法模型下进行操作,因此支持迁移。
By default, users will operate in restricted grammar mode thus supporting migration.
它负责生成当用户试图访问受限制的操作时显示的登录表单。
It is responsible for generating the login form that users will see when they try to access a restricted action.
在用户应用程序受限于CPU的情况下,建立一个基准比较处理器的分配和合理的并发用户数非常理想。
In a very simplistic situation where a user-base application is CPU bound, it would be ideal to create a matrix that compares processor allocation to a reasonable number of concurrent users.
传统媒体中,内容总由“把关人”决定,而网络的开放式平台使用户可以自由创作、分享视频,不必再受限制;
Thanks to the Internet’s open platform, anyone can create and share video, meaning we’re no longer tethered to traditional media gatekeepers who decide what’s entertaining and who gets the spotlight.
在Domino表单或web页面中,可以使用选择列表来控制此类输入,这样用户就无法向受限制的字段中添加随机数据类。
On a Domino form or a Web page, we can control this sort of input using a selection list, so that users cannot add arbitrary data to a restricted field.
选择该配置来显示Domino7在不受限制的环境中的结果,还用于测试 Domino 7 在单一 Domino分区中支持更多用户方面的新增功能。
This configuration was selected to show Domino 7 results in an unconstrained environment, and was also used to test the new capabilities of Domino 7 to support more users in a single Domino partition.
选择该配置来显示Domino7在不受限制的环境中的结果,还用于测试 Domino 7 在单一 Domino分区中支持更多用户方面的新增功能。
This configuration was selected to show Domino 7 results in an unconstrained environment, and was also used to test the new capabilities of Domino 7 to support more users in a single Domino partition.
应用推荐