• It makes for easier management of host and user control access from a system administrators point of view.

    系统管理员角度来看,这样容易管理主机用户访问控制

    youdao

  • Enable host control access is the whole point of wrappers, so make sure it is uncommented.

    启用主机控制访问wrappers关键之处,所以确定注释。

    youdao

  • Now, let's go over some examples of how TCP Wrappers can control access via SSH to a host.

    现在我们通过一些示例了解TCPWrappers如何控制主机SSH访问

    youdao

  • The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.

    acl访问控制列表文件位于 KDC主机,它控制Kerberos数据库的访问。

    youdao

  • The next article in this series shows you how to design access control policies, how to host them on a directory service, and how to configure Acegi to read your access control policy.

    系列下一文章将展示如何设计访问控制策略,如何将它们托管目录服务中,以及如何配置Acegi读取的访问控制策略。

    youdao

  • New! Botnet Detection -prevents others from taking control of your PC to access your private information or use it to host an attack.

    僵尸网络检测阻止他人控制电脑存取私人信息使用举办一次攻击

    youdao

  • Figure 8 shows a protected version-control repository used to host files that only authorized people or systems should access.

    8展示了一个受保护版本控制储存库,它用于存放只有已授权人员系统可以访问文件

    youdao

  • The hub repeater is responsible for managing connectivity on a per packet basis, while the hub controller provides status and control, and permits host access to the hub.

    集线器中继负责管理基于连接集线器控制器则提供状态信息控制操作支持主机访问

    youdao

  • This paper proposed a simple and secure access control mechanism that can effectively control mobile agents updating and creating ability in native host.

    本文提出了一个简单安全存取控制机制可以有效地控制移动代理本地主机更新创建权限。

    youdao

  • From the host machine from the absolute access, flexibility to achieve Responder veto control, timing can differentiate by cheating Responder Responder act to ensure the fairness of the process.

    主机绝对访问权限可灵活实现抢答否决控制能够按时序区分作弊抢答行为保证抢答过程中的公平性

    youdao

  • Also, you cannot use code access configuration to limit access for control designers since they must always run in the design host with full trust.

    此外不能使用代码访问配置限制控件设计器的访问,因为这些设计器必须总是完全信任级别运行设计宿主中。

    youdao

  • Finally, the solution of access control in host-network security is given.

    最后主机网络安全访问控制给出了实现方案

    youdao

  • A host can control all code access to thread tokens by both the CLR and user code.

    宿主控制CLR用户代码线程标记所有代码访问

    youdao

  • A host can control all code access to thread tokens by both the CLR and user code.

    宿主控制CLR用户代码线程标记所有代码访问

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定