• 如果自己IP地址那么我们就可以网络使用接入点本身这样做的安全要差一些,用于演示方面会有趣

    If it has its own IP address, we can use the access point itself over the network; this is less secure, but more fun to use for a demo.

    youdao

  • 黄色稳定自发颜色所以如果暗示稳定性安全应避免使用黄色。

    Yellow is an unstable and spontaneous color, so avoid using yellow if you want to suggest stability and safety.

    youdao

  • 无论如何这项研究提供信息评估手机使用安全中具有巨大的价值

    However, this study provides information that will be of great value in assessing the safety of cell phone use.

    youdao

  • 这样设置免除连接安全使用非常小心或者根本不要使用。

    A setting like this, which exempts a connection from security, should be used with great caution, or not at all.

    youdao

  • 材料之间结合决定了电池的特性包括能量功率密度以及安全使用寿命和成本。

    The combination of materials determines the characteristics of the battery, including its energy and power density, safety, longevity and cost.

    youdao

  • 我们示例中,人工任务没有使用安全允许任何人请求执行任务。

    In our example, the human task does not use security and allows anyone to claim or work on the task.

    youdao

  • 这些运行时环境应该配置使用全局安全而且应该配置为通过相同LTPA密钥进行LTPA身份验证

    These runtime environments should be configured to use global security, and they should be configured to use LTPA authentication with the same LTPA key.

    youdao

  • 链接安全使用中时,所有请求获得一个链接用户ID定义授权

    When link security is in use, all requests are given an authority defined by the link user ID.

    youdao

  • 尽可能地使用安全基础架构运行组织

    Engage security, infrastructure and operational organizations as soon as possible.

    youdao

  • 生成使用传输安全密钥时,会出现两个问题

    When generating keys for use with transport security, two issues arise.

    youdao

  • 部署过程中,将检查消息使用安全配置文件是否存在

    During the deployment process, the existence of the security profiles used in the message flows is checked.

    youdao

  • 这个总线操作系统后台进程使用安全非常好,以使得任意应用程序不能欺骗系统事件。

    This bus is used by the operating system and daemons and is tightly secured so that arbitrary applications cannot spoof system events.

    youdao

  • 可以配置数据源使用集成安全以便可以使用当前用户帐户进行数据库连接

    Data sources can be configured to use integrated security so that database connections are made using the current user's account.

    youdao

  • 使用属于全局安全所用注册表任何用户ID进行身份验证

    Authenticate using any user ID that is part of the registry used for global security.

    youdao

  • 必须启用全程安全才能够使用特性

    End-to-end security must be enabled to use this feature.

    youdao

  • 而从 8.2开始以上每种情况可以使用安全插件

    Starting with Version 8.2, security plug-ins can be used in each of these situations.

    youdao

  • 默认情况下,全局安全使用本地操作系统用户注册表进行身份验证

    By default, global security USES the local operating system user registry for authentication.

    youdao

  • 使用安全插件优点

    Advantages of using security plug-ins.

    youdao

  • 使用安全插件的常见问题

    Common problems working with security plug-ins.

    youdao

  • 如果关心安全,那么使用pam_permit . so,这会允许任何请求

    Likewise, if you do not care about security, use pam_permit.so instead, which happily allows any request!

    youdao

  • 我们使用以下安全配置运行测试

    The tests were run using each of the following security configurations.

    youdao

  • EAR部署描述符创建安全角色使用RoleMapping按钮

    To create the security roles in the EAR deployment descriptor, use the role Mapping button.

    youdao

  • 可以消息安全(WS - Security)结合使用。

    It can be applied in combination with message level security (WS-Security).

    youdao

  • 运行使用EJB安全示例应用程序

    Run the sample application with EJB security

    youdao

  • 第4使用内部安全”(securityfromwithin)方法

    Step 4 refers to using a "security from within" approach.

    youdao

  • 本文所述安全技术非常的简单所以 Acegi使用这些技术实现安全性。

    The security technique described in this article is fairly simple, and so are the Acegi facilities used to implement it.

    youdao

  • 运行使用Run - asejb安全示例应用程序

    Run the sample application with run-as EJB security.

    youdao

  • ReportingServices安全使用熟悉的基于角色的模型

    Reporting Services security uses a familiar role-based model.

    youdao

  • 本文描述如何设计开发一种特定类型安全插件这种安全性插件使用DB2数据库存储身份验证信息

    This article describes the design and development process of a specific type of security plug-in, one that uses a DB2 database to store authentication information.

    youdao

  • 本文描述如何设计开发一种特定类型安全插件这种安全性插件使用DB2数据库存储身份验证信息

    This article describes the design and development process of a specific type of security plug-in, one that uses a DB2 database to store authentication information.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定