Permissions set in this way use up to four octal digits.
按这种方法设置的权限使用高达4位八进制数字。
To save a query as a team query, you must have the appropriate permissions set.
您必须已设定适当的权限,才能将查询储存为小组查询。
Any existing content in that state won't have the new workflow permissions set on it.
所有处于那个状态但已经存在的内容不会顺应新的工作流。
Let's say we want to make sure any file created by file_put_contents has certain permissions set.
假设我们需要确保file _ put_contents创建的任何文件具有某些权限集。
Permissions set at the folder level are propagated to subfolders created or moved to a folder.
在资料夹层级设定的使用权限会传播至已建立或移至资料夹的子资料夹。
To avoid this redirection, you can export the file to a location where you have permissions set.
若要避免此重定向操作,可以将该文件导出到您拥有权限集的位置。
Only those users with appropriate permissions set can view, edit, delete, copy or manage the query folders and team queries.
只有设定适当使用权限的使用者,才能检视、编辑、删除、复制或管理查询资料夹和小组查询。
It takes little effort and is usually accomplished by simply exploiting an Internet Information Server (IIS) that has its permissions set incorrectly.
它不费多少力气,通常只要通过利用未正确设置其权限的InternetInformationServer (IIS)就可以完成。
All the forms involve some kind of required permissions set and some type of identity; the form in these tests USES a MockPrincipal object for identity.
所有形式都包含一些类型的必需权限集和一些类型的标识;这些测试中的形式将MockPrincipal对象用于标识。
At this point, the V6 migratedServer profile on the hard disk has permissions set by the operating system to allow only the root user to access the files.
此时,硬盘上的V6migratedServer 配置文件具有操作系统设置的只允许根用户访问文件的权限。
If you want to set all the permissions at once, use numeric file modes.
如果您希望一次设置所有的权限,可以使用数值文件模式。
Instead of sending the complete access key to another user, you can also set access permissions on individual files residing on EFS.
您还可以为efs中的单个文件设置访问权限,而不是将完整的访问密钥发送给另一个用户。
Then, set the permissions to match the directory.
然后,设置与目录匹配的权限。
A role can represent multiple users, but it also represents the permissions that a set of users can perform.
一个角色可以代表多个用户,但它也代表一个用户集可以执行的权限。
Special system calls, or requests to the UNIX kernel, allocate and free the memory and set permissions; common read and write operations put and get data from the region.
用特殊的系统调用(即对UNIX内核的请求)分配和释放内存并设置权限;通过一般的读写操作读写内存段中的数据。
You can also set permissions using octal Numbers instead of symbols.
您还可以使用八进制取代符号设置权限。
Now that you can add or remove permissions, you may wonder how to set just a specific set of permissions.
现在已经可以添加或者删除权限了,您可能会想,怎样才能只设置一些特殊权限。
Additionally, you set viewing permissions based on these distinctions.
此外,你可以根据这些不同分别设置查看权限。
Create the directory and set the same permissions and ownership as the original directory.
创建目录,并将其权限和所有权设置为与原始目录相同。
First, for a large set of environments, most applications will need a common set of additional permissions.
首先,对于很多环境而言,大部分应用程序都将需要一个公共的附加权限集。
Simply change the + to a -, and you remove any of the specified permissions that are set.
简单地将+改变为-,就能删除任何已设置的指定权限。
The service allows you to set 'read' and 'write' permissions for folders.
你还可以设定目录的操作权限是只读还是可写。
Using numeric permissions is very handy when you want to set all the permissions at once without giving the same permissions to each of the groups.
当您想要一次设置所有权限,而不给予每个组相同权限时,设置使用数字权限非常方便。
Each entry in the ACL's list of permissions grants a set of permissions on the resource to a principal or group.
ACL的权限列表中的每个条目将资源上的权限集授予一个主体或组。
A set of flags and permissions is defined (including group and owner).
接着定义一组标志和权限(包括组和所有者)。
The permissions of these files are set at DB2 UDB installation time.
这些文件的权限在DB 2udb安装时设置。
The basic algorithm for arriving at the final, applicable set of permissions is to compute the intersection of all Pis.
最后得到的一组适用权限的算法是要计算所有权限的交集。
Set the correct permissions on both the nodes, ha1 and ha2.
在ha1和ha2节点上设置正确的权限。
Even if permissions are set correctly, if the DMZ processes for your Web or proxy server are running as root admin, they have access and can fetch and return them.
即使权限设置是正确的,如果您的Web或代理服务器的DMZ进程以rootadmin身份运行,它们也拥有访问权限,并且可以获取并返回敏感文件。
Even if permissions are set correctly, if the DMZ processes for your Web or proxy server are running as root admin, they have access and can fetch and return them.
即使权限设置是正确的,如果您的Web或代理服务器的DMZ进程以rootadmin身份运行,它们也拥有访问权限,并且可以获取并返回敏感文件。
应用推荐