• 电子邮件远程登录超级用户特权需要密码,这些密码最好不相同而且难以通过自动化攻击猜测推断出来

    To wit, e-mail, remote login, and superuser privileges all require a passwordpreferably disparate and each difficult to guess or derive using an automated attack.

    youdao

  • 使set-user-ID程序能够放弃所有用户特权执行一些特权操作然后恢复原来有效用户ID

    This allows a set-user-ID (other than root) program to drop all of its user privileges, do some un-privileged work, and then re-engage the original effective user ID in a secure manner.

    youdao

  • 方案集成过程中,需要一直记住的一个安全性规则就是不同用户角色拥有相应特权设置

    During the solution integration, one security rule you need keep in mind is to be certain that different user roles have their corresponding privilege sets.

    youdao

  • 信任上下文对象它为用户提供特定特权用户通过一个受信任的连接连接数据库时,便可以使用它。

    A trusted context is an object that gives users a specific set of privileges and is available when the user connects to the database through a trusted connection.

    youdao

  • 违背了最小特权原则一个基本安全设计原则,原则建议授予用户足够执行任务权利

    This violates the principle of Least privilege, which is a basic security design principle that recommends that users should only be granted enough privileges to perform their tasks.

    youdao

  • 模式具有关联特权使模式所有者能够控制哪些用户有权这个模式中创建修改删除对象

    Schemas have privileges associated with them, allowing the schema owner to control which users have the privilege to create, alter, and drop objects in the schema.

    youdao

  • PUBLIC实际上不是外部安全设施定义而是一种成功经过身份验证用户分配特权的方式。

    PUBLIC is not actually a group defined in the external security facility, but is rather a way to assign privileges to any user who successfully authenticates.

    youdao

  • 任何操作系统用户都有可能访问DB2但是除非他们授予给定DB 2权限特权,否则他们的事情不多

    Any operating system user can potentially access DB2; however, unless they have been granted a given DB2 authority or privilege, there is not much they can do.

    youdao

  • 他们可以创建删除用户项目以及管理储存库所涉及一切操作,另外他们还有项目管理员特权

    They can create and delete users, projects, and everything else permitted in management of a repository, plus they have the privileges given to the project administrators.

    youdao

  • 探测器操作系统内核级上监视所有数据库事务包括特权用户事务,而不依赖于数据库审计日志

    The probes monitor all database transactions, including those of privileged users, at the operating system kernel level without relying on database audit logs.

    youdao

  • 黑客可以伪装具有管理控制权特权用户,控制虚拟然后虚拟化系统管理程序执行恶意程序

    A hacker can become a highly privileged user with administrative controls and get out of a virtual machine and then execute malicious programs on the hypervisor.

    youdao

  • 使模式所有者能够控制哪些用户有权这个模式中创建、修改删除对象CREATEINALTERINDROPIN特权)。

    This allows the schema owner to control which users have the privilege to create, alter, and drop objects in the schema (CREATEIN, ALTERIN, DROPIN privilege).

    youdao

  • 用于访问外部权限IDS通过外部表用户访问特权治理受到由操作系统管理的数据文件权限的治理。

    The permissions used to access external tables is governed by the user access privileges on the external table by IDS as well as the data file permissions managed by the operating system.

    youdao

  • 关于能够授予用户各种数据库对象特权详细信息请参阅DB 2 UDb文当(参见参考资料)。

    For detailed information about all the various database object privileges that can be granted to users and groups, refer to the DB2 UDB documentation (see Resources).

    youdao

  • 例如黑客可以伪装成具有管理访问特权用户进入系统执行恶意操作,真正的系统管理员不会马上注意到

    For example, a hacker can enter in the guise of a privileged user with administrative access controls and perform malicious activities that a legitimate system administrator did not initially notice.

    youdao

  • 正如我们期望的一样,这个程序接收到SIGILL(信号编号4)信号,si代码5,这用户空间的程序执行特权操作产生的。

    As expected, the program has received a SIGILL (signal number 4) with an si code of 5, which is set when a privileged opcode is executed by a user-space program.

    youdao

  • 回想一下内核模式表示代码执行特权模式,用户模式则表示非特权模式(用于那些运行内核之外程序)。

    Recall that kernel mode represents the privileged mode for code execution, while user mode represents the non-privileged mode (for programs running outside the kernel).

    youdao

  • 清单3中,可以看出用户EMMA具有table1CONTROL特权以及所有其他可用的表特权包括这些特权授予其他人能力

    In Listing 3, you see that the user EMMA has CONTROL privilege on the table TABLE1 as well as all the other available table privileges, including the ability to grant those privileges to other users.

    youdao

  • 尽管大部分Linux主机进行了设置允许任何用户都可以启动vncserver,但是可能需要root特权有效地使用stunnel

    While most Linux hosts are set up so that any user can launch vncserver, it's very likely that you'll need root privileges to use stunnel effectively.

    youdao

  • snrdba中的所有用户拥有和SYSADM授权级别关联全部特权从而能够执行授权级别所需要全部管理任务

    All users in the snrdba group would then have all the privileges associated with the SYSADM authority level and thus be able to perform all administrative tasks requiring that authority level.

    youdao

  • 本文中,我们回顾DB 2UDB定义各种权限级别特权以及如何使用命令语法ControlCenter它们分配用户

    In this article, we have reviewed the different authority levels and privileges defined in DB2 UDB and how they can be assigned to users using command line syntax and the Control Center.

    youdao

  • 通过点击适当特权选择YesNoGrant,从而指定应该用户授予哪些特权

    You can specify which privileges should be granted to the user or group by clicking on the drop-down box for each privilege and selecting either Yes, No, or grant.

    youdao

  • 例如需要个别的root特权程序可能以root身份启动(比如说通过成为setuid root)然后切换到以较少特权用户身份运行

    For example, a program that needs a single root privilege may get started as root (say, by being setuid root) and then switch to running as a less-privileged user.

    youdao

  • TivoliSecurityPolicyManager——提供针对用户用户信息联合特权管理统一管理点。

    Tivoli Security Policy Manager - Provides a uniform point of administration of users, federation of user information, and privilege management.

    youdao

  • Linux系统如此安全一部分原因就是只有root用户才能拥有安装卸载软件其他重大改变特权

    Part of the reason Linux is so secure is that only the root user has the privileges needed to install or remove applications and make other big changes.

    youdao

  • 例如如果SECADM需要修改NewYork分公司特权,那么可以修改角色定义不必所有用户重复过程

    For example, if the SECADM needs to alter the privileges for the branch in New York, she can alter the definition for the role without having to replicate the process for all users.

    youdao

  • 查找现有用户以及用于对特权执行GrantallAllow allRevoke all操作选项按钮都受支持,可以方便地使用

    Look-up for existing users and groups as well as option buttons that perform actions to Grant all, Allow all, or Revoke all privileges are also provided for ease of use.

    youdao

  • 只要没有其他更新wells_pts的方法(必须所有其他用户那里撤消修改这个表的特权),那么引用完整性就是有保证的。

    As long as there is no other way to update wells_pts (that is, you must revoke privileges from all other users), referential integrity is guaranteed.

    youdao

  • 管理员需要编辑xa_config文件,将特权授予使用SybaseLRM用户分布式事务管理配置服务器

    The administrator needs to edit the xa_config file, grant privileges to the user for use of the Sybase LRM, and configure the server for distributed transaction management.

    youdao

  • 系统内核所使用内存空间通过特权(privileged code,2级或者更低)来标记,以防止用户模式的程序访问内核空间而发生页面错误

    Kernel space is flagged in the page tables as exclusive to privileged code (ring 2 or lower), hence a page fault is triggered if user-mode programs try to touch it.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定