It makes for easier management of host and user control access from a system administrators point of view.
从系统管理员的角度来看,这样更容易管理主机和用户访问控制。
Enable host control access is the whole point of wrappers, so make sure it is uncommented.
启用主机控制访问是wrappers的最关键之处,所以确定它未被注释。
Now, let's go over some examples of how TCP Wrappers can control access via SSH to a host.
现在,我们通过一些示例了解TCPWrappers如何控制对主机的SSH访问。
The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.
acl(访问控制列表)文件位于 KDC主机,它控制对Kerberos数据库的访问。
The next article in this series shows you how to design access control policies, how to host them on a directory service, and how to configure Acegi to read your access control policy.
本系列的下一篇文章将展示如何设计访问控制策略,如何将它们托管在目录服务中,以及如何配置Acegi以读取您的访问控制策略。
New! Botnet Detection -prevents others from taking control of your PC to access your private information or use it to host an attack.
新!僵尸网络检测,阻止他人控制你的电脑来存取您的私人信息或使用它来举办一次攻击。
Figure 8 shows a protected version-control repository used to host files that only authorized people or systems should access.
图8展示了一个受保护的版本控制储存库,它用于存放只有已授权人员或系统可以访问的文件。
The hub repeater is responsible for managing connectivity on a per packet basis, while the hub controller provides status and control, and permits host access to the hub.
集线器中继器负责管理基于包的连接,而集线器控制器则提供状态信息和控制操作以支持主机访问。
This paper proposed a simple and secure access control mechanism that can effectively control mobile agents updating and creating ability in native host.
本文提出了一个简单安全的存取控制机制,可以有效地控制移动代理在本地主机的更新及创建权限。
From the host machine from the absolute access, flexibility to achieve Responder veto control, timing can differentiate by cheating Responder Responder act to ensure the fairness of the process.
由主机对从机的绝对访问权限,可灵活实现抢答否决控制,能够按时序区分作弊抢答行为以保证抢答过程中的公平性。
Also, you cannot use code access configuration to limit access for control designers since they must always run in the design host with full trust.
此外,不能使用代码访问配置来限制对控件设计器的访问,因为这些设计器必须总是以完全信任级别运行在设计宿主中。
Finally, the solution of access control in host-network security is given.
最后对主机网络安全的访问控制给出了实现方案。
A host can control all code access to thread tokens by both the CLR and user code.
宿主可控制CLR和用户代码对线程标记的所有代码访问。
A host can control all code access to thread tokens by both the CLR and user code.
宿主可控制CLR和用户代码对线程标记的所有代码访问。
应用推荐