This could manifest itself as a boot failure, hang, or loss of system access.
这会导致引导失败、挂起或无法访问系统等问题。
The primary value of this approach is to control file system access by applications.
这种方法的主要价值在于控制应用程序对文件系统的访问。
This also allows users with minimal system access levels to safely run the application.
这还将允许具有最低系统访问级别的用户安全地运行应用程序。
On the ground, he clears the rubble away from a panel that reads, “UTILITY SYSTEM ACCESS.”
在地面上,他清除了一块铁板上面的碎石,铁板上的字显示为“公用设施通道”。
Choosing this location also allows users with minimal system access levels to safely run the application.
选择此位置还允许具有最低系统访问级别的用户安全地运行应用程序。
In the case of inappropriate configuration, problems can occur such as a boot failure, hang, or loss of system access.
如果采用不适当的配置,就会出现引导失败、挂起或系统访问失败等问题。
The trusted device network approach provides an organization with a higher level of control over critical system access.
可信任硬件网络策略提供了一种可以更高效控制临界系统接入的组织结构。
If a data entry clerk leaves the company, it is easy to remove their system access by removing them from the group.
如果某个数据录入员离开公司,可将其从组中删除,方便地删除其系统访问权限。
You should limit file system access to WebSphere Application Server's files by leveraging operating system file permissions.
应该利用操作系统文件权限来限制对WebSphereApplicationServer文件的文件系统访问。
Let's look at some of the best practices for controlling system access with sudo while still allowing users to be productive.
让我们来看看利用sudo控制系统访问权限且用户依然能保有效率的一些最佳实践吧。
The successful system access rate estimation system can be used as one of the important methods to estimate the network quality.
系统接通率评估体系可以用来作为网络质量评估的一种重要手段。
There is a System access Facility (SAF) check during the Register API call for the user's access to the target server's CBIND SAF class.
在RegisterAPI调用期间,存在系统访问工具(System Access Facility,SAF)检查,了解用户对目标服务器的CBIND saf类的访问权限。
However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.
不过您也不必担心安全问题,因为文件系统访问控制机制通常都可以提供充分的保护。
This covers vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.
这包括恶意的人都能够获得系统的访问,并与本地用户的权限执行任意代码的漏洞。
In this paper, we proposed a formal security database system access model including a multilevel relation model and a element-level authorization.
提出了一个安全数据库访问控制模型,包括一个多层关系模型和一个用以增强自主访问控制能力的元素级粒度的授权。
What procedures are in place to ensure that system access and update capabilities to inventory management master files are limited to authorized personnel only?
采取什么程序以保证存货管理主文件的系统进入和数据更新功能仅限于获授权人事使用?
Modem signals will be transferred through the VHF communications system has a second modulation, through VHF communication system access to data communications.
调制解调器的已调信号通过VHF通信系统进行二次调制,通过VHF通信系统的信道实现数据通信。
The route attributes of the inet0 device will be applied to the new system, and if inappropriate, could manifest itself as a boot failure, hang, or loss of system access.
inet0设备的路由属性会应用于新系统,如果属性不合适,就会出现引导失败、挂起或无法访问系统等问题。
Configuring file system access along with user input is dangerous, so it's best to avoid it altogether by designing your application to use a database and hidden, generated file names.
同时配置用户输入和文件系统访问权十分危险,因此最好把应用程序设计为使用数据库和隐藏生成的文件名来避免同时配置。
A Destination is representative of any service the TCF client needs, including services outside the client (such as network actions) or services local to the client (such as file-system access).
Destination代表TCF客户机需要的任何服务,服务包括客户机外部的服务(如网络操作)或客户机本地的服务(如文件系统访问)。
This system helps speed up access times.
这个系统有助于加快读取数据的时间。
It's a complex system wherein data is copied to multiple intermediate devices, usually to speed up access to files when millions of people are trying to access the service at the same time.
这是一个复杂的系统,数据被复制到多个中间设备,通常是为了在数百万人同时试图访问服务时加快文件访问速度。
You need a password to get access to the computer system.
使用这个计算机系统需要口令。
You are allowed to get access to our computer system only if you get the manager's permission.
只要得到经理的许可,你就可以使用我们的电脑系统。
The objective was to reduce the time and effort needed to obtain access to essential goods and services through an improved rural transport system.
其目标是通过改善农村运输系统来减少获得基本物资和服务所需的时间和努力。
Intruders might invade your systems for one of two reasons: to gain access to information that they should not have or to alter the behavior of a system.
入侵者入侵您的系统可能是出于这两个原因之一:为了获取他们本不应该拥有的信息,或者为了改变系统的行为。
He'll need to do so without tripping the anti-jamming system, the details of which he almost certainly does not have access to.
他必须在不触发抗干扰系统的情况下这么做,而他几乎无法得知这一系统的技术细节。
However, he'll need to do so without tripping the anti-jamming system, the details of which he almost certainly does not have access to.
然而,他必须这么做的同时不触发抗干扰系统,因为他几乎无法得知这一系统的技术细节。
The New York State parks system wants to turn off the falls on the American side to replace two 115-year-old stone bridges that allow pedestrians, park vehicles and utilities access to Goat Island.
纽约州公园系统希望关停美国一侧的瀑布,以取代两座有115年历史的石桥,让行人、公园车辆和公共设施可以进入山羊岛。
The entire point of a computer application is to enable a person or another computer system to access its data.
计算机应用程序的核心是使某人或另一个计算机系统能够访问其数据。
应用推荐