• ACLs use access control entries (ACE) to control user and group access and denial. Though more commonly known as rules, they are.

    ACL使用访问控制条目(ace)控制用户的访问权。

    youdao

  • But with denial of service attacks, attackers don't need to gain access to a system.

    进行拒绝服务攻击时,攻击不必获得对系统的控制权。

    youdao

  • Attack An attempt to circumvent the security measures in place on a network either to gain unauthorized access to the system or to force a denial of service.

    试图破解网络某一安全防护措施以便在未获得授权情况下访问系统或者是遭到服务拒绝

    youdao

  • Eleven percent involved scans, probes and attempted access and 0.1 percent were denial-of-service attacks.

    事件中有11%涉及扫描探测企图获取信息,0.1%拒绝服务攻击

    youdao

  • Only legitimate users can access the services (including the denial of spoofing schemes).

    只有合法用户访问服务(包括拒绝欺诈阴谋)。

    youdao

  • It is manifested in restricted access to health, education and other essential services and, too often, by the denial or abuse of other fundamental human rights.

    表现获得保健教育其他必要服务机会受到限制往往表现在其他基本人权遭到剥夺践踏

    youdao

  • Although distributed denial of service attacks do not harm a database, they are generally carried out to prevent people having access to an Internet site or to prevent a service from functioning.

    分布式拒绝服务攻击没有用来侵入后台数据库攻击多用来阻止用户正常进入某些网页,或者阻止一些功能性服务的正常使用。

    youdao

  • ACE, the rules governing extended permissions of access or denial, can be confusing.

    ACE控制授予拒绝扩展权限规则,它们可能不容易理解。

    youdao

  • ACE, the rules governing extended permissions of access or denial, can be confusing.

    ACE控制授予拒绝扩展权限规则,它们可能不容易理解。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定