接着登录脚本检查访问权限。
第一个变动相当地明显;这个表单指向了改进过的php登录脚本。
The first change is pretty obvious; this form points to the enhanced PHP login script.
清单9显示了这个简单的登录脚本,实际中的实现将远没有这么简单。
Listing 9 shows the simple login script, which is far more complex in practice.
由于用户的登录脚本路径是空的,所以向导无法创建登录脚本。
The wizard cannot create the login script because the user's logon script path is empty.
由于无法从注册表中读取登录脚本目录,所以向导无法创建登录脚本。
The wizard cannot create the logon script because it could not read the logon script Directory from the Registry.
你甚至可以创建一个登录脚本当它们启动时自动添加这些静态ARP到你的计算机中。
You can even create a login script that would add these static entries to your PCs as they boot.
用户可以在其个人Cron配置中使用这类调用,或者使用自己的登录脚本完成作业。
Users can place calls such as this in their personal Cron configurations, or they can use their login scripts to do the job.
主网络登录是检测用户名与密码、处理任何登录脚本、运行其他启动任务的客户程序。
The primary network logon is the client that is used to validate your user name and password, process any login scripts, and perform other startup tasks.
例如,您可以通过向用户登录脚本添加简单的脚本来替代中央服务器的文件,从而更改配置文件。
For example, you may be able to change a configuration file by adding a simple script to user logon scripts that replaces the file from a central server.
创建登录脚本在组策略对象(GPO),将gpo链接到您的服务器所在的组织单位(OU)。
Create a logon script in a Group Policy object (GPO), linking the GPO to the organizational unit (ou) where your servers live.
当Citrix客户端在Citrix服务器上登录时,登录脚本会运行用户登录命令(usrlogon . cmd)。
When Citrix clients log on to the Citrix server, the logon script runs the user logon command (usrlogon.cmd).
现在,当有用户使用Citrix客户端登录到RationalApplication Developer上时,登录脚本将会运行,而Citrix服务器s驱动器将会指向每一个映射到m驱动器上的客户机。
Now, when any user logs into Rational Application Developer using the Citrix client, the login script will run, and the Citrix server s drive will point to each client that is mapped to the m drive.
但是因为无法将您的密码编写在脚本中,所以您必须进行“手动”登录,是这样吗?
And you must log in "by hand," right, because there's no way to script your password?
因此,第一步需要在把登录表单指向这个脚本,如清单3所示。
So the first step is to point the login form to that script (see Listing 3).
因为注入脚本可以访问dom树的任何部分,所以它们可以从登录表单的文本字段中窃取密码信息。
Since injected scripts can access any part of the DOM tree, they can, among other things, steal password information from the text field of login forms.
现在,每当需要使用公钥登录到远程主机时,您可以结合使用个人密钥脚本和远程主机上该用户接受的密钥列表。
Now, whenever you need to log in to a remote host with your public key, you can use the script of your personal key with the list of accepted keys for the user on the remote host.
我们现在的脚本可以登录到远程服务器并上载所有本地系统中修改过的文件,但是脚本还只是仅仅能处理单一目录。
We have a script that will login to a remote server and upload all files which have changed on the local system, but the script will only do this for a single directory.
清单4中的脚本会生成这样的登录密码属性报告。
Listing 4 contains a script that will generate such a report on login password attributes.
因为根用户运行序言脚本,所以此用户被允许登录集群。
Since the root user runs the prologue script, the user will be allowed to log into the cluster.
运行这个脚本,您将获得 wtmp的登录信息。
Running this script gives you the login information for wtmp.
该脚本将使用setenv. pl文件中指定的登录名和密码创建一个用户。
The script will create a user with login name and password specified in the setenv.pl file.
设置这些别名的最佳位置是在登录期间执行的外壳初始化脚本中,例如. k sh、。profile或.bashrc。
The best place to set these aliases is in your shell initialization script that is executed during login, such as.ksh,.profile, or.bashrc.
完成更改之后,删除登录、用户配置文件或任何启动脚本中对ulimit命令的引用。
Once the changes have been made, remove references to the ulimit command in the login, user profiles or any startup scripts.
etc/init.d还包含切换到单用户模式的脚本,以便重新启动并关闭计算机,并禁止登录。
etc/init.d also contains scripts to drop to single-user mode, to restart and shut down the machine, and disable logins.
登录完毕之后,运行db2profile脚本,启动db 2命令行处理器(CLP),如图10所示。
After logging in, run the db2profile script and start up the db2 command line processor (CLP) as usual (Figure 10).
这个页面是一个PHP脚本,它能检查并确保在提供敏感信息之前用户已经登录。
That page is a PHP script that checks to make sure that the user is logged in before providing sensitive information. It works as follows (see Listing 5)
记着使用本文前面通过checksetup.plPerl脚本创建的管理员帐号/口令进行登录。
Remember to log in with the administrator account/password created with the checksetup.pl Perl script earlier in the installation.
通过包含会话cookie,Domino服务器会将您的脚本视为最近登录过、现正访问数据库的实际人类用户。
By including a session cookie, the Domino server thinks that your script is actually a human user who recently logged in and is now accessing the database.
在脚本的开始部分中,您可从登录页面提交的参数中获取用户名并存储在会话中。
At the top of the script, you get the user name from the posted arguments of the login page and store it in the session. The page then continues to load the invaluable prototype.js.
在脚本的开始部分中,您可从登录页面提交的参数中获取用户名并存储在会话中。
At the top of the script, you get the user name from the posted arguments of the login page and store it in the session. The page then continues to load the invaluable prototype.js.
应用推荐