• You've illegally accessed and misused confidential security files.

    已经非法获取盗用了机密文件

    《柯林斯英汉双解大词典》

  • To repair security, you must manually edit the security files to remove the custom security object.

    修复安全系统,必须手动编辑安全文件移除定义安全对象。

    youdao

  • Users are managed either from file-based user and group security files or populated from a Lightweight directory Access Protocol (LDAP) directory.

    用户或者基于文件用户安全文件进行管理,或者一个轻量级目录访问权限协议(LDAP)目录中产生。

    youdao

  • The kernel usually has some sort of security model that manages access to devices, files, processes, and objects.

    内核通常具有某种类型安全模式管理设备文件进程对象的访问

    youdao

  • Therefore, the security mechanism to run these commands is based on the operating system permissions of the files.

    因此运行这些命令安全机制文件操作系统权限为基础。

    youdao

  • The default Settings disable macros from loaded documents by default to enhance security, but you need to run the macros from saved files, so you modify this preference setting.

    为了提高安全性默认设置默认的情况下禁用已加载文档中的但是需要保存文件运行宏,因此,需要修改首选设置

    youdao

  • PDF files include a variety of security options - from access restrictions to electronic signatures - that help protect sensitive company information.

    PD F文件包括多种安全选项——访问限制电子签名——帮助保护敏感公司信息

    youdao

  • These files specify security configuration to use in RMI-IIOP communication with the server.

    这些文件指定了RMI - IIOP与服务器通信使用安全配置

    youdao

  • Providing correct security on your files or directories can be troublesome.

    文件目录提供正确安全设置麻烦。

    youdao

  • Making files immutable is often done as part of a security or intrusion detection effort.

    使文件不可通常安全或者入侵检测工作一部分

    youdao

  • Packages stored in JAR files can be optionally sealed to enforce version consistency and security.

    存储JAR文件中的包可以选择进行密封增强版本一致性安全性

    youdao

  • The LDAP database is loaded with the user and group information from the localhost's security database files.

    使用本地主机的安全数据库文件中的用户信息装载ldap数据库。

    youdao

  • It makes use of IBM extension files to indicate what security is provided or required by a service.

    使用IBM扩展文件指出服务提供了或者要求什么样安全性

    youdao

  • It also allows you to customize your security via the XML configuration files and the command line.

    允许通过XML配置文件命令定制安全设置。

    youdao

  • These are system-critical files and loss of their integrity threatens overall system security.

    这些文件系统关键型文件,它们失去完整性会威胁到总体系统安全性

    youdao

  • Discusses the message flow, WS-Security configuration, and the associated files for point-to-point Web services without an intermediary

    讨论没有中间层的情况下点Web服务消息WS-Security配置以及关联文件

    youdao

  • Shows you the message flow, WS-Security configuration, and the associated files with an intermediary.

    介绍采用中间层消息WS - Security配置以及关联文件

    youdao

  • However, the Flash Security model doesn't allow local files to access network resources and vice versa.

    不过FlashSecurity模块允许本地文件访问网络资源反之亦然

    youdao

  • LBAC security cannot be imposed on external table data files.

    LBAC安全性不能施加外部数据文件上。

    youdao

  • Linux and UNIX environments enforce strong security at the user level; the files and processes associated with one user account are not directly accessible by other users.

    LinuxUNIX环境用户级上强制实施高安全策略,一个用户帐户关联文件和进程不能其他用户直接访问

    youdao

  • Include the security plug-in header files in your plug-in.

    安全性插件文件包括到插件中。

    youdao

  • The application requires tight integration of object-level security and security for HTML and JSP files, servlets, and client logins.

    应用程序要求对象级安全性同htmlJSP文件servlet客户机登录安全性紧密集成

    youdao

  • These areas included rules for enabling remote services, IP security filtering, and more granular control for startup files, which included inittab, rc.tcpip, and inetd.

    这些领域包括启用远程服务规则IP安全性过滤启动文件,包括inittabrc.tcpip 和inetd细粒度控制

    youdao

  • Services-config.xml: the top-level configuration file that references the other configuration files and also provides security constraints, channels, and logging.

    services - config . xml:引用其他配置文件提供安全约束通道日志记录顶级配置文件

    youdao

  • Answer: the Version 5 Tech Preview does not express security requirements in the Web Services Description Language (WSDL) files.

    版本5技术预览并不Web服务描述语言(Web Services Description Language,WSDL)文件表达安全性需求

    youdao

  • For more information on security considerations when using.vsdisco files, see Resources.

    有关使用.vsdisco文件安全注意事项请参见参考资料

    youdao

  • The final three.jar files provide other supporting classes, such as security principals, for talking with Geronimo.

    最后的三个.jar文件提供了其他支持比如Geronimo对话安全主体

    youdao

  • Figure 5 shows the location of the two required header files for implementing security plug-ins on a Windows system.

    5展示了在Windows系统实现安全性插件所需两个文件位置

    youdao

  • Step 1: Include the security plug-in header files in your plug-in.

    步骤1:将安全性插件文件包括到插件中。

    youdao

  • Step 1: Include the security plug-in header files in your plug-in.

    步骤1:将安全性插件文件包括到插件中。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定