If you do not carefully control who has write access to the file system, a user can subvert the product security controls (such as auditing) by simply hand editing the configuration files.
如果不谨慎地控制谁对文件系统有写访问权限,用户只需手工编辑配置文件,就可以破坏产品的安全性控制(比如审计)。
This security framework example will control the functions presented to the user.
此安全性框架示例将控制呈现给用户的功能。
For example, for a queue, an MQQUEUE profile is used to control MQI access to the queue, but other profiles in the MQADMIN class are used to control context and alternate user security.
例如,对于队列,使用一个MQQUEUE概要文件来控制对该队列的访问,但是mqadmin类中的其他概要文件用于控制上下文和用户安全性。
Security has been enhanced too. They have taken care of the user Account Control feature, one of the biggest annoyances of Vista users.
系统安全也被提升到一个新的层次,微软这次在用户账户控制中下足了功夫,这是VISTA用户曾今头疼不已的一个问题。
For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
Examples of Lotus Notes Services include the Domino Security Model which is used for user authentication, access control and encryption.
LotusNotes的服务实例包括Domino安全模型(Security Model),可以用它进行用户身份验证、访问控制和加密。
Security Settings to control user access to different areas of the Web site.
控制用户访问Web站点的不同领域的安全设置。
This article teaches you how the Technology Explorer can control user and group authentication to db2 through the use of a security plug-in called db2auth (see Resources for more about db2auth).
本文将向您介绍如何在TechnologyExplorer中使用db2auth安全插件来控制db2的用户和组身份验证(参见参考资料了解db2auth的详细信息)。
For portlet and page specific access control management, WebSphere Portal provides a comprehensive security management that lets you control user actions.
在Portlet和页面特定访问控制管理方面,WebSpherePortal提供全面的安全性管理,允许您控制用户操作。
Using Acegi security provides your applications with comprehensive authentication, authorization, instance-based access control, channel security and human user detection capabilities.
使用Acegi安全性可以为应用程序提供全面的身份验证、授权、基于实例的访问控制、通道安全和人工用户检测功能。
While Windows 7 still focuses on security, user Account Control (UAC) is far less in your face and more user-configurable than in Vista.
Windows7在注重安全性的同时,用户账户控制(uac)将更少地弹出,并且比Vista更容易由用户自定义。
As the developer responsible for providing this underlying functionality, however, you need to configure fine-grained security and have complete control over the user interface (UI).
然而,作为负责提供基础功能的开发人员,您需要配置细粒度的安全性,并拥有对用户界面(UI)的完全控制。
The installation problem is likely caused by User Account Control security measure.
安装问题可能是由用户账号控制安全措施引起的。
The key point here is that Shiro's API is largely intuitive because it reflects the natural tendency for developers to think in 'per-user' security control.
这里的关键点是Shiro的API非常直观,因为它反映了开发者以‘每个用户’思考安全控制的自然趋势。
We characterized the security issues in ASP-based networked manufacturing system, especially the issue of the user access control.
本章描述了ASP和网络化制造系统的安全性问题,尤其是用户访问控制的问题;
The essential security technologies of the distributed database are user authentication and access control.
分布式数据库安全的核心技术是用户身份验证和访问控制。
Finally, combining RADIUS authentication server efficiently, the port control of user access in wireless security gateway is analyzed.
最后,本文分析了在有效结合RADIUS认证服务器时,无线安全网关上的用户访问的端口控制。
For example we can use user account to control a tool (UAC), should undertake appropriate after debugging, can provide the security of higher level.
例如我们可以使用用户帐号控制工具(uac),当进行合适调试后,可以提供较高水平的安全性。
In security module, the security technology of user authentication, message encryption, audit tracing and access control is used.
在安全模块中,使用了用户认证、通讯加密、审计追踪、访问控制等安全技术,并且引入了模糊控制与专家系统。
To protect user data and system resources from unauthorized access, modern file systems often equip themselves with various security mechanisms such as access control and data encryption.
为保护用户数据、系统资源不被非法访问和滥用,现代文件系统设立了文件访问控制、数据加密等各种安全机制。
Operation results show that with this network, on-site equipment control and management becomes more convenient, which provides customers with an actual user-terminal class control of high security.
运行结果表明,该网络能更好地进行现场设备控制和管理,为实现真正用户终端级的、高安全性的控制提供了一个新的解决方案。
Based on the idea of Role-Based Access Control, this paper presents a user-privilege management method using VJ, which is advantageous for its simplicity, flexibility and security.
借鉴基于角色的访问控制基本思想,结合开发实践,提出了一种用VJ实现用户权限管理的方法。
This security mechanism can effectively improve the ability of access control model to detect and control a pseudo-user.
该安全机制能有效提高访问控制模型对冒充用户访问的检测及控制能力。
It can also facilitate users to define and manipulate data, maintain the security and integrity of data, and the concurrency control and database recovery under multi-user circumstances.
它使用户能方便地进行定义和操纵数据,维护数据的安全性和完整性,以及多用户下的并发控制和恢复数据库等操作。
It can also facilitate users to define and manipulate data, maintain the security and integrity of data, and the concurrency control and database recovery under multi-user circumstances.
它使用户能方便地进行定义和操纵数据,维护数据的安全性和完整性,以及多用户下的并发控制和恢复数据库等操作。
应用推荐