The most serious reliability and security problems are those relating to the operating system.
最严重的可靠性及安全问题是与操作系统相关的那些。
Therefore, the security mechanism to run these commands is based on the operating system permissions of the files.
因此,运行这些命令的安全机制以文件的操作系统权限为基础。
An important aspect of security patches is that depending upon the operating system, downtime may need to be scheduled.
关于安全补丁的一个重要方面,就是需要根据操作系统来安排停机时间。
Usually, they want management through the operating system level, including OS patch management, and often want managed security services as well.
通常,他们需要操作系统级的管理、包括操作系统补丁管理、他们还需要受管的安全服务。
Rather it is a layer that extends the browser’s security model down into the operating system level.
它是构建在操作系统级别的一个服务层,以便扩展浏览器的安全模型。
With the usage and demand for different operating systems, made them to introduce the thread security and prevented direct access to the BIOS or Hardware.
对不同操作系统的使用和需求促使它们引入线程安全性,并阻止对BIOS或硬件的直接访问。
New access-control methods will also be introduced as research into operating system security continues.
随着对操作系统安全性的深入研究,将会引入新的访问控制方法。
This new version of NFS has better security, allows for more support across different operating systems, and has a reduced server daemon overhead.
这个新版本的NFS有更好的安全性,考虑了更多的跨不同操作系统的支持,并且减轻了服务器后台进程开销。
The idea of security starts with our own local operating system (OS) environment.
安全理念起源于我们自己的本地操作系统(OS)环境。
There are constantly changing standards for APIs, gateways, security methods, screens, operating systems, and browsers.
网关、安全性方法、屏幕、操作系统和浏览器的标准经常改变。
In each scenario, the operating system is called to perform security checks.
在以上每个场景中,都调用了操作系统来进行安全性检查。
The main way rogue programs get into a system is by exploiting security holes in the operating system.
恶意的程序进入系统的主要方法是利用操作系统的安全性漏洞。
Current operating systems violate this principle completely, resulting in the reliability and security problems mentioned above.
现有操作系统完全违反以上原则,结果就是造成众多可靠性及安全问题。
You can use this option to minimize the risk of security vulnerabilities in the AIX operating system.
可以使用这个选项尽可能降低AIX操作系统中的安全风险。
By default, global security USES the local operating system user registry for authentication.
默认情况下,全局安全性使用本地操作系统用户注册表进行身份验证。
The important point to remember is that these accounts are defined in a security facility outside of DB2 UDB — typically the operating system.
要记住的重点是,这些帐号是在DB 2UD b外的安全设施中定义的——通常是操作系统。
Therefore, you can use it to provide an extra layer of security in addition to that provided by the native operating system.
因此,可以用它在本机操作系统提供的保护之外再额外增加一层保护。
Other operating systems use more elaborate security models.
其他操作系统则使用了更精细的安全模型。
Network services requiring security and availability should benefit from this powerful operating system technology.
需要确保安全性和可用性的网络服务应该会受益于这种强大的操作系统技术。
Like all Macs, these computers have, in my opinion, a better operating system, better built-in software and better security than their Windows competitors.
我认为,与Windows电脑相比,这两款电脑就像所有苹果电脑一样,拥有更好的操作系统、内置软件和更高的安全性。
He chose Fedora as the operating system for its frequent security updates, its RPM-based package-management system, and its quantity of prepackaged software pertinent to servers.
他选择使用Fedora作为操作系统,用于管理常用的安全更新、基于RPM的包管理系统,以及与服务器相关的软件包。
The UNIX and Linux operating systems pose several security concerns from an enterprise perspective.
从企业角度看,UNIX和Linux操作系统显现出几个安全问题。
You can also set up local account to Kerberos V5 account mappings, which is necessary to inform the operating system how to authorize a specific security principal.
还可以为KerberosV 5帐户映射建立本地帐户,这对告知操作系统如何对特定的安全主体进行授权非常必要。
The NSA found that most operating systems' security mechanisms, including Windows and most UNIX and Linux systems, only implement "discretionary access control" (DAC) mechanisms.
NSA发现大部分操作系统的安全机制,包括Windows和大部分UNIX和Linux系统,只实现了“选择性访问控制(discretionary access control)”(DAC)机制。
Suppose you host your Web application on a "minority" operating system; you might rely on OpenBSD for its security, for example.
假设您在一个“非主流”操作系统上托管Web应用程序;比如,您可能会依赖OpenBSD来保证安全性。
Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.
漏洞攻击扫描有助于识别操作系统或LotusDomino配置中潜在的安全漏洞。
This may include such things as use of various operating system services, WebSphere Application Server security, backend systems, and others.
这可以包括各种操作系统的使用、WebSphereApplicationServer安全性、备份系统以及其他方面。
Informix integrates operating system security functions for user authentication and network permissions.
Informix集成了操作系统安全性功能来对用户进行身份验证和管理网络权限。
Informix integrates operating system security functions for user authentication and network permissions.
Informix集成了操作系统安全性功能来对用户进行身份验证和管理网络权限。
应用推荐