Gaining system privileges (" root privileges ") represents the first step toward fully customizing any Unix-based system like the G1 or the iPhone.
获取系统权限(root权限)代表着迈向完全修改所有像G 1或IPhone这样的基于Unix系统的第一步。
The directory should have read and write privileges for all users on the system.
系统上的所有用户都应拥有该目录的读写权限。
Just like tables, nicknames have an equivalent set of privileges that can control user access to the nickname objects on the federated system.
与表一样,昵称也有对等的一组权限,用于控制用户在联邦系统上对昵称对象的访问。
The permissions used to access external tables is governed by the user access privileges on the external table by IDS as well as the data file permissions managed by the operating system.
用于访问外部表的权限由IDS通过外部表上的用户访问特权治理,还受到由操作系统管理的数据文件权限的治理。
By design, the module lives in the IIS process and runs under the system account with administrative privileges. This account cannot be modified by developers and system administrators.
按设计这个模块被放在IIS进程中,运行在带有管理员权限的系统帐户下,该账户不能有编程人员和系统管理员修改。
This rule also applies to their definition — privileges associated with a global variable are also defined within the system catalog.
这条规则同样适用于全局变量的定义——与全局变量相关的权限也在系统编目中进行了定义。
For example, Listing 1 shows a subset of statements you can execute to revoke privileges from the system catalog views and other privileges implicitly granted to PUBLIC.
例如,您可以执行清单1中显示的语句来撤销系统编目视图上的特权和其他被授予PUBLIC的隐式特权。
On a single-user system, it's really much easier if you run with administrative privileges.
在单用户系统上,最好是要有管理员权限,这会使情况大大简化。
Always, always create (and use!) a regular user account for yourself on any system where you have root access when you need to do something that requires root privileges.
在任何具有管理员权限的系统中,您应该始终为自己创建(并使用!)一个常规的用户帐户。
This is because user mode instructions do not have sufficient privileges to cause the system to crash.
因为用户模式指令没有引起系统崩溃的足够权限。
CM system provides users with nearly 100 predefined privileges.
CM系统为用户提供了近100种预定义的权限。
Privileges, privilege groups, privilege sets and ACLs form the basis of the authorization system of IBM DB2 CM and are discussed in further detail later in the article.
权限、权限组、权限集合和ACL形成了IBMDB 2CM授权系统的基本结构,本文后面将详细讨论。
To find out all accounts with privileges, you can query each of the system catalog views and combine the results together using the UNION operator, as shown in Listing 4.
要查明具有特权的所有帐号,可以查询每个系统编目视图并使用UNION操作符将结果组合在一起,如清单4所示。
These accounts do need not any special operating system (OS) privileges.
这些帐户并不需要任何特殊操作系统(Operating System,OS)权限。
However, when they are installed locally in a browser in its chrome system as an extension, they receive special privileges to access local systems and bookmarks.
但是,当它们作为扩展而本地安装在其chrome系统的浏览器中时,条目将收到访问系统和书签的特殊权限。
Database systems, such as Oracle and MySQL, manage their own user accounts, roles, and privileges for system and object-level operations.
诸如oracle和MySQL等数据库系统管理它们自己的用户帐户、角色和系统及对象级别的操作权限。
This article assumes that you have the necessary administrative privileges on the system that will house the authority (most likely you will need root access for some of the steps).
本文假定您对容纳中心的系统有必要的管理特权(在某些步骤中很可能需要root访问权)。
These user accounts can be created on the Linux operating system, and GRANT statements are used to assign them the correct database privileges.
这些用户帐号可以在Linux操作系统上创建,然后使用grant语句给它们分配正确的数据库权限。
Root privileges allow access to anything on the system and, when used incorrectly, can render a system unusable.
root权限允许访问系统上的任何东西,如果使用不当,可能造成系统无法使用。
Such programs are generally suid (set uid) root, meaning that the system extends special privileges to the application upon request, even if a regular old user runs the program.
这样的程序通常是suid(设定uid)root,也就是即使一般的老使用者执行这个程序时系统也会按请求将特殊权限扩充给应用程序。
On a UNIX-like system, having the privileges of the "root" user, of another user, or being a member of a group are some of the most common kinds of privileges.
在类unix系统中,拥有“root”用户、其他用户或者一个组的成员的特权是最常见的特权种类。
The following role gives privileges for normal user to manage all the volume groups configured on the system.
下列的角色为赋予常规用户对这三个卷组的管理权限。
You need to have system administrator privileges to do this.
需有系统管理员权限才能做到这一点。
If the attacked program was initiated by a system administrator, the malicious code will then run as a part of the original program, giving the attacker administrator privileges on the system.
如果受攻击的程序是由系统管理员启动的,那么恶意代码将作为原始程序的一部分进行执行,给黑客系统中的管理员特权。
Finally, because the kernel manages the graphics chip, the X server may not be required to run with root privileges, hardening the operating system by removing another set of potential exploits.
最后,由于内核负责管理图像芯片,所以可能无需引导权限就能运行服务器。 这样能够消除一组潜在的漏洞,从而加强了操作系统。
This type of information is not strictly protected, and any system user usually has enough privileges to read public information.
这类信息无需严格保护,任何系统用户都有足够权限阅读公共信息。
In a system there are system commands, kernel extension modules, and the files that require root privileges to execute.
系统中存在需要root权限才能执行的系统命令、内核扩展模块和文件。
For example, access should be set so that the user owning the file has read and write privileges, the group has read-only privileges, and other users on the system are denied access to the file.
比如,访问也许被设为:用户拥有某文件的读写权限,而组拥有该文件的只读权限,并且该文件拒绝这个系统上的其他用户访问。
Solving authorization problems with system based on role and introducing concept of sub-role to solve problem of complex privileges and roles in NMS.
使用基于角色的系统解决了系统的授权问题,并且引入子角色的概念,解决了综合网管系统中角色和权限复杂繁多、不易分配的问题;
To prohibit privilege abuse, operating system must clearly know the necessary privileges needed by a program.
要限制权限滥用,操作系统必须清楚哪些是应用程序正常所需权限。
应用推荐