这允许用户获得修改GRUB配置的完全访问权限。
This allows users full access to change the GRUB configuration.
获取或设置指定注册表项的完全访问权限。
不要试图生成新线程的一个实际原因是因为新线程对J2EE上下文没有完全访问权限。
A practical reason for not trying to spawn new threads is that new threads do not have full access to the J2EE context.
即使操作系统自身也没有被屏蔽储存的完全访问权限,所以入侵者即便控制了操作系统信息也是安全的。
Even if the operating system itself are not shielded stored fully access control, so the invaders even operating system information is safe.
其范围从完全无权访问、部分访问权限、完全访问权限,一直到因未首先收集任何可标识信息而不存在访问权限。
This can range from no access at all, to partial access, to complete access, to no access because you're not collecting any identifiable information in the first place.
如果您正在开发应用程序,并因此对包含静态字段的类型具有完全访问权限,则可以安全地禁止显示此规则发出的警告。
It is safe to suppress a warning from this rule if you are developing an application and therefore have full control over access to the type that contains the static field.
若要通过“Exchange系统管理器”向您的管理帐户授予对单个数据库中所有邮箱的访问权限而不管继承的显式拒绝,请执行以下操作:1 .启动“Exchange系统管理器”,然后找到要对其中存储的邮箱具有完全访问权限的数据库。
To grant your administrative account access through Exchange System Manager to all the mailboxes that are in a single database (regardless of inherited explicit denials), follow these steps.
DBADM权限允许用户在一个实例中的特定数据库上执行管理任务,还允许完全访问这个数据库中的数据和对象。
The DBADM authority allows a user to perform administrative tasks on a specific database in an instance and allows full access to the data and objects in that database.
他也可以设备上装些感兴趣的应用,但这些应用将永远无法获得访问权限或者升级为安全应用,因为它们完全被环境配置文件隔离了。
He can also have his fun apps on the same device, but they'll never be able to get access or break into a more secure app because of the complete segmentation of profiles.
默认到通道启动程序的用户ID将不提供完全的管理员访问权限。
Defaulting to the channel initiator's user id should not provide full administrative access.
它拥有对。NET类库以及底层操作系统完全的访问权限,没有任何其他HTML或者基于。NET的用户界面技术能够与之相提并论。
With full access to the.net libraries and the underlying operating system, no other HTML or.net-based UI technology can match it.
EmadOmara的并行合并排序算法假设了在排序操作的过程中(操作者)对计算机的所有CPU具有完全的访问权限。
Emad Omara's parallel merge sort algorithm assumes that you will have full access to the machine's CPUs for the duration of the sorting operation.
这是各种权限:读、写、完全控制、指定给用户、bucket或对象级别的访问粒度。
There are various permissions - read, write, full control - assigned to users, and access granularity established at bucket or object level.
如果添加了此类字段,那么在确定文档访问权限时,将该字段视为与其他所有ReaderNames字段完全一样的字段。
If such a field is added, then it is treated exactly the same as all other Reader Names fields with respect to determining document access.
然而,对于要对客户机和网络可以完全访问的特性丰富的客户机来说,all - permissions值是用于给予客户机完全访问的权限的。
However, for rich-featured clients that do want to have full access to the client machine and to the network, the all-permissions value is used to give the client complete access.
而且由于向导需要将所访问文件的属性修改为“读写”,您必须对该文件夹有完全的读写访问权限。
You must have full read-write access to this folder, because the wizard needs to change the attributes of all files to Read-Write .
您必须是该文档或工作簿的作者或具有“完全控制”访问权限,才能更改权限设置。
You must be the author of the document or workbook or have Full Control access to be able to change the permission Settings.
对您的解决方案中的文档或工作簿具有“完全控制”访问权限的任何用户都能够使用“信息权限管理”限制权限。
Anyone who has Full Control access to the document or workbook in your solution can use IRM to restrict permissions.
要解决此问题,必须由某位对于该文档或工作簿具有“完全控制”访问权限的用户对默认权限设置进行更改,以允许通过编程的方式访问该对象模型。
To fix the problem, someone with Full Control access to the document or workbook must change the default permission Settings to allow programmatic access to the object model.
在可能的情况下应避免使用完全信任,因为这会授予您的应用程序无限制访问资源的权限,例如访问文件系统和注册表。
Avoid using Full Trust if possible, because your application will be granted unrestricted access to resources such as the file system and the registry.
例如,文件访问需要完全信任权限时,如果应用程序请求文件访问权限,则它仅被授予文件访问权限,而不会被授予完全信任权限。
For example, where file access requires full-trust permissions, if the application requests file-access permission, it will only be granted file-access permission, not full-trust permissions.
例如,文件访问需要完全信任权限时,如果应用程序请求文件访问权限,则它仅被授予文件访问权限,而不会被授予完全信任权限。
For example, where file access requires full-trust permissions, if the application requests file-access permission, it will only be granted file-access permission, not full-trust permissions.
应用推荐