Note Do not use this procedure in a production environment to allow unauthorized access to user data in violation of corporate policies regarding privacy and security.
小心请不要在生产环境中使用此过程允许未经授权的用户访问用户数据。这样做可能会违反贵公司的隐私和安全政策。
In a traditional desktop environment, user data is often stored on the device, leading to challenges about the security and protection of user private information and corporate intellectual property.
在传统的桌面环境中,用户数据常常存储在用户的设备上,这会在用户私有信息和公司智能资产的安全性方面造成问题。
Finally, the XC10 appliance provides fine-grained user and user group permissions for administrative tasks and data grid security.
最后,XC10设备针对管理任务和数据网格安全提供细粒度用户和用户组权限。
When another user requires access to the file, their security credentials are verified before being granted access to the data even though the file data is already in memory and in clear format.
当另一个用户需要访问该文件时,在授予对数据的访问权限之前,将验证其安全凭据,既使这些文件数据已经以明文格式存在于内存中。
There are two types of rules that a user can create in a security policy to protect event data and master data from unwanted disclosure.
用户可以在安全策略中创建两种类型的规则,从而防止泄露事件数据和管理数据。
For security, a unique user id and password needs to be configured on the XC10, which will be used by the XI50 to access the data grid.
为了安全起见,需要在XC10上配置唯一的用户ID和密码,XI50使用它们来访问数据网格。
Next, the consumer wants to know what security focus for user, resource, and data request threshold policy is for SaaS, PaaS and IaaS.
接下来,使用者希望了解SaaS、PaaS和IaaS用户、资源和数据请求安全策略的安全关注重点是什么。
Get the TGT for the user in Microsoft realm and use it to access the NFS exported data with krb5 security residing on IBM NAS realm.
在Microsoft领域中获得用户的TGT,并使用它通过IBMNAS领域中的krb5安全来访问NFS导出的数据。
Like Facebook today, it was criticized for its policies on privacy, security and willingness to sell user data, as well as its use of its own proprietary tools.
就像今天的Facebook,美国在线在隐私政策、安全、出售用户数据和使用自有专门工具等方面备受指责。
Provide user access (easily manage data security and user access).
提供用户使用权(简单地管理数据安全性以及用户使用权)。
Work is now going on in the SAE to automate the end-user feedback collection and support a level of community moderation compliant with enterprise data governance and security policies.
SAE中的相关工作现在正在进行,以自动化的形式收集最终用户反馈和支持某种遵从企业数据治理和安全策略的修改级别。
The advantage of client virtualization is that it provides higher data security, easier manageability, decreases end-user downtime, and ensures business continuity.
客户机虚拟化的优点是,提供更高的数据安全性,更容易管理,减少最终用户的停机时间,确保业务连续性。
We will be at the meeting to share with you on the cloud, network, local and endpoint security methods, to help you understand how to protect the user and data everywhere.
我们将在会中与您分享关于云端、网络、本地及端点的安全防护方法,带您了解如何保护“身处各地”的用户与数据。
Security: Ensure that the component or system maintains user confidentiality, data integrity, and authorized permissions.
安全:确保组件或系统保证用户信息机密性、数据完整性、授权的允许性。
At the same time, due to the lack of user data backup and other data security knowledge and means, it will result in the loss of recurring information and other phenomena.
同时由于用户缺乏数据备份等数据安全方面的知识和手段,因此会造成经常性的信息丢失等现象发生。
Such security measures include backing up data to other servers and encrypting user passwords.
这些安全措施包括向其它服务器备份数据和对用户密码加密。
Security measures are provided for personnel, user accounts, system policies, data protection, and virus prevention.
对人员、用户帐号、系统策略、数据保护、病毒防治制定了详细的安全措施。
In the design process, system security and data integrity are ensured by user authentication and encryption respectively.
在设计过程中,通过对用户的认证与数据加密机制来确保系统的安全性与数据的完整性。
Platform management technology, including data security technology and multi-user concurrent visit technology.
平台管理技术,数据安全技术和多用户并发访问技术。
In a traditional P2P distributed storage of data for all users are open, but with the increase of sharing resources and user scales, there will exist some security problem.
在传统的P 2p分布式存储中数据对于所有用户都是公开的,但随着共享资源和用户数量的增多,就会存在安全问题。
If you expect more than one user to access the data, and you want each retrieval to the data to be verified by the security configurations for the database, do not use caching.
如果希望数据可由多个用户访问,并且要求数据库的安全配置验证每个对数据的检索,请不要使用缓存。
In order to avoid system crashes and data loss accidents caused by software vulnerabilities, the security and reliability of storage management software are most concerned about the user.
为了避免由于软件漏洞导致的系统崩溃、数据丢失意外的发生,存储软件产品的安全性和可靠性成为目前用户最关心的问题。
To protect user data and system resources from unauthorized access, modern file systems often equip themselves with various security mechanisms such as access control and data encryption.
为保护用户数据、系统资源不被非法访问和滥用,现代文件系统设立了文件访问控制、数据加密等各种安全机制。
The accuracy, consistency and security of database data, as maintained by the RDBMS throughout all user access.
为了满足所有用户访问数据库数据,由关系型数据库管理系统( RDBMS)维护的数据库数据的准确性、一致性和安全性。
These policies are policies integrated of system security, data security and user security, and introduce the authentication of Database, exterior, enterprise and user and the permission res.
进一步地介绍了数据库验证、外部验证、企业验证和并发许可等用户验证和许可限制。
It can also facilitate users to define and manipulate data, maintain the security and integrity of data, and the concurrency control and database recovery under multi-user circumstances.
它使用户能方便地进行定义和操纵数据,维护数据的安全性和完整性,以及多用户下的并发控制和恢复数据库等操作。
It can also facilitate users to define and manipulate data, maintain the security and integrity of data, and the concurrency control and database recovery under multi-user circumstances.
它使用户能方便地进行定义和操纵数据,维护数据的安全性和完整性,以及多用户下的并发控制和恢复数据库等操作。
应用推荐