在文件破坏向后兼容性时,应该能够检测并报告错误。
Detect when the file breaks backward-compatibility and report an error.
如本地服务器文件破坏,数据会自动回复到上一次的备份点。
If corrupted local or server save files, data is now automatically restored from the last backup.
橡皮擦是一个文件破坏的工具可以让你彻底删除或擦除,企图使该文件无法恢复数据从硬盘驱动器,闪存驱动器或其它连接的磁盘敏感数据。
Eraser is a file destruction tool allows you to completely delete or erase sensitive data from your hard drive, flash drive or other attached disk in an attempt to make the file data unrecoverable.
如果这样做将会破坏文件系统,导致数据无法恢复。
Doing so can damage the file system, rendering your data irretrievable.
如果系统中发生了某种情况,管理员可以覆盖操作系统的文件,而无需担心会破坏本地数据。
If something happens to a system, the administrator can overwrite the operating system's files without worrying about destroying local data.
如果不谨慎地控制谁对文件系统有写访问权限,用户只需手工编辑配置文件,就可以破坏产品的安全性控制(比如审计)。
If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.
您可以定义您应用程序所需要的一组标签,然后允许客户将他们自己的数据以自己的命名空间添加到文件中,而不破坏您的节点树。
You can define a base set of tags for whatever your application needs, and then allow customers to add their own data into the file, in their own namespace, without disturbing your tree.
卷管理让您可以将存储空间添加到现有的文件系统,而不需破坏存储服务器。
Volume management allows you to add storage to the existing file system without disrupting the storage server.
此类数据恢复产品标价昂贵,并且,它是否能真正修复你的文件要取决于文档的遭破坏的范围大小。
Data recovery products like these can have a hefty price tag, and depending on the extent of the damage, they may or may not actually be able to repair your file.
如果操作系统缺陷、磁盘坏扇区或某些超级用户失误会破坏文件系统,使用多个卷可以把破坏的范围限制在一个卷。
If an operating system bug, bad disk sector, or even certain superuser errors cause corruption to a file system, using multiple volumes can limit that damage to just one volume.
常规的用户无法破坏重要的系统文件,除非您破坏了标准的权限设置。
Regular users can't destroy vital system files unless you've been mucking with the standard permissions.
您可能会问我为什么不直接使用文件系统中的时间标记;答案是我并不相信它,因为粗心的用户会破坏它。
You might ask why I don't just use the timestamp in the filesystem; the answer is that I don't trust it to survive careless users.
事实证明,如果您的服务器碰巧崩溃或者意外断电,XFS 1.0 . x有一种很不好的倾向,那就是会破坏最近修改过的文件。
It turns out that XFS 1.0.x had the unfortunate tendency of frequently mangling recently modified files if your server happened to crash or unexpectedly lose power.
如果某个文件(或一组文件)增长得太大了,就可能破坏整个计算机。
If an individual file (or set of files) grows too large, it can destabilize the entire computer.
如果您的脚本从两个不同的进程写入相同文件,最后可能导致信息会被破坏,或丢失信息。
If your script is writing to the same file from two different processes, you will end up either with corrupted information or missing information.
与说成类文件正“被破坏”或“被植入”相比,这个词似乎更好,不是吗?
Sounds much better than saying your class files are being "mangled" or "implanted", doesn't it?
通常,该文件在注入数字电影服务器时来认证数据是否以某种方式遭到破坏或者干扰。
This file is generally used during ingestion in a digital cinema server to verify if data have been corrupted or tampered with in some way.
通常,该文件在注入数字电影服务器时来认证数据是否以某种方式遭到破坏或者干扰。
This file is generally used during ingestion in a digital cinema server to verify if data have been corrupted or tampered with in some way.
如果没有这些信息,那么文件将被认为遭到破坏和不可用。
Without with this information, a file would appear corrupt and unusable.
英国安全与健康执行局的文件也破坏了主要几个石油公司的声明,那份声明宣称去年在墨西哥湾的深海地平线钻井平台发生的夺去11名工人声明的爆炸永远不会发生在他们身上。
The HSE documents also undermine claims by the major oil companies that last year's Deepwater Horizon explosion in the Gulf of Mexico that killed 11 workers was unlikely to ever happen to them.
在添加对其他文件类型的支持之前,应该确保TagLib重构没有破坏已有的功能。
Before you add support for other file types, you should make sure that your TagLib refactoring didn't break existing functionality.
由于使用JAR文件版本1的人在其代码中还存在对com . A的引用,如果只是简单地升级成新版本的库,无疑会破坏他们现有的代码。
Because people using version 1 of your JAR file have references to com.A in their code, simply upgrading to the new version of the library will break their existing code.
IndexWriter创建一个目录锁定文件,以通过同步索引更新保护索引不受破坏。
IndexWriter creates a lock file for the directory to prevent index corruption by simultaneous index updates.
可以在 config-store/index.properties 中找到可用配置,但一定不要更改该文件,因为这样可能破坏您的安装。
You can find available configurations in config-store/index.properties, but be careful not to change this file, because that might corrupt your installation.
Ext4文件系统被设计为具有向前和向后兼容性,但它具有许多新的高级特性(其中的一些特性破坏了兼容性)。
The ext4 file system is designed as a backward - and forward-compliant replacement for ext3fs but with many new advanced features (some of which break the compatibility).
你应该在指定的驱动器内先运行Chkdsk再运行Defrag,以确保文件不会被移动而破坏磁盘的分配。
You should run Chkdsk before you run Defrag on a given drive to assure that files are not being moved to corrupt portions of the disk.
导入已破坏的样例应用程序并下载本文包含的InvalidPolicy . ear文件。
Import the broken sample application and download the InvalidPolicy.ear file included with this article.
同样,这可能是因为出现了与只显示L类似的问题:正在加载,或者因boot . b文件被破坏、移动或删除而不能加载。
Again, this can be due to problems similar to just l: loading or if the boot.b file has been corrupted, moved, or deleted.
从那时起,任何人——甚至是管理员——都不能登录到该系统,因为口令文件已经被破坏了。
From then on, no one — not even the administrators — could log into the system, because the password file had been corrupted.
因此,如果您想对密码文件进行排序,就可以使用下列命令请注意,您不能将输出直接发送到输入文件,因为这会破坏输入文件。
So, if you want to sort your password file, you could just use the following. Note that you cannot send the output straight to the input file, because it will corrupt the input file.
应用推荐