然而在一般情况下,通过密码就可以获得访问权限。
为了获得访问权限,用户将基于自己的需要请求对特定应用程序的访问,包括特定角色或访问级别。
To obtain access, the user requests access to a specific application, including specific roles or access levels, based on the user's needs.
获得访问权限涉及到两个安全问题中的第一个问题(请参阅安全性部分):对许可用户进行身份验证。
Gaining access involves the first of two security issues (see the following section, security) : authenticating permitted users.
然而user1通过一个通用概要文件获得访问权限,group1通过另一个通用概要文件获得访问权限。
However, user1 has access through one generic profile, and group1 has its access through a different generic profile.
参考手册说明了目标QMgr必须理解客户端通道提交的ID以获得访问权限,并且还详细描述了SSL配置。
The reference manuals explain that the ID presented by the client channel must be known to the target QMgr to gain access, and they also describe SSL configuration in detail.
他也可以设备上装些感兴趣的应用,但这些应用将永远无法获得访问权限或者升级为安全应用,因为它们完全被环境配置文件隔离了。
He can also have his fun apps on the same device, but they'll never be able to get access or break into a more secure app because of the complete segmentation of profiles.
这个“密码”文件非常容易读取,并且通过尝试和匹配敲打模式,可以获得对系统的访问权限。
It is comparatively easy to read this "password" file and simply try and match the knock pattern to gain access to this system.
这样可允许用户获得对其需要使用的各种IBM应用程序的访问权限。
This allows users to acquire access rights to a number of IBM applications that they need to use.
在发现数据源以后,下一步是获得对该信息的访问权限。
After discovery of the data source, the next step is to gain access to the information.
如何授予访问获得的数据的权限?
于是黑客就可以通过任意数量的常见姓氏,很容易地获得站点的访问权限。
A hacker could easily try to gain access to the site with any number of common last names.
为了保证你获得访问新立得的权限,当被问到你是否要在搭建期间自定义你的CD时候,回答“是”。
To ensure you gain access to Synaptic, answer 'Yes' when you're asked whether you want to customise the CD manually during building.
这允许用户获得修改GRUB配置的完全访问权限。
This allows users full access to change the GRUB configuration.
请考虑在获得对多个数据存储(其中所有数据存储都需要不同的身份验证技术)的访问权限时所存在的困难。
Consider the difficulty in gaining access to multiple data stores, all of which require different authentication techniques.
用户获得的对特定实体的实际访问权限为以下内容的交集。
The effective access the user gains on a particular entity is the intersection of.
通过跟踪这个恶意程序并获得对入侵者使用的服务器电脑的访问权限,McAfee识别出了72个受危害的公司和组织。
Through tracing this malware and also gaining access to a "command and control" computer server used by the intruders, McAfee identified 72 compromised companies and organisations.
但是你同时要提供一个“纸盒”选项:支付99美分,获得全天候的访问权限。
But you should also offer a "paper box" option: Pay 99 cents and get 24-hour access.
根据规则,表6列出了每个用户获得的访问权限。
Based on the rules, Table 6 lists the accesses gained by each user.
用户可以选择用他们的Intranet用户ID和密码来登录,以获得访问加密站点区域的权限。
Give the users the option to sign in with their Intranet user ID and password to gain access to secure site areas.
其中包含了很多有用的工具,以及大量知识库(黑客用来获得对您的系统的访问权限的方法)。
It carries tons of useful pentesting tools and a huge repository of exploits (ways for hackers to gain access to your system).
强制用户首先获得root(或作为操作系统的一部分)访问权限来限制此类风险的发生。
Forcing them to first gain root (or act as part of the OS) access limits the risk.
也就是说,通过欺骗在您的组织中工作的人员,攻击者可以获得权限以访问他们本不应该访问的系统和信息。
That is, by tricking the human beings that work for your organization, attackers are able to gain access to systems and information to which they should not have access.
被授予访问权限或由于在概要文件的访问列表中而被拒绝授予权限的用户ID和组将拥有它们已获得的访问权限,这是很明显的。
The user IDs and groups that had access granted or denied specifically because they are in the access list of the profile, would, obviously, have the access that they were granted.
也就是说,通过欺骗在组织中工作的人员,攻击者可以获得权限以访问他们本不应该访问的系统和信息。
That is, attackers are often able to gain access to systems and information to which they should not have access by tricking the human beings that work for an organization.
如果连管理员都无法访问这些文件,你该如何获得权限呢?
If even an administrator can't access the file, how do you take it back?
一旦获得了对远程数据源的访问权限,下一个问题就是数据传输。
Once you've gained access to a remote data source, the next issue is data transfer.
所有其他用户和组将获得分配给UACC的访问权限。
All other users and groups would have the access assigned to the UACC.
如果用户不在最匹配概要文件的访问列表中,那么它们将获得UACC提供的访问权限。
If the user is not in the access list for the best matching profile, then they get the access provided by the UACC.
入门级别的访问权限需要邀请才能获得。只有拥有最高级别访问权限的用户才可以访问敏感信息。
The baseline entrance level is only available by invitation; access to sensitive information is restricted solely to those users who have attained the highest levels.
用户实际获得的访问权限是编辑访问权。
应用推荐