只使用SSL限制访问。
调用者的操作方法来限制访问。
为了限制访问,需要强制通道使用低权限帐户。
In order to restrict access, it is necessary to force the channel to use a low-privileged account for authorizations.
一个朋友组件如何限制访问级别?
管理员想要提供用户限制访问。
你怎么能限制访问在多用户环境中的文件?
How can you restrict access to files in a multi-user environment?
commonMethod具有无限制访问。
而是考虑将密码存储在限制访问的单独文件中。
Instead, consider storing the password in a separate file that has restricted access.
模块中的包被限制访问,这已经引起了一些骚动。
Packages internal to a module were off limits and this already caused quite a ruckus.
使用unchecked元素指定无限制访问权限。
You specify unrestricted access permission using an unchecked element.
在这个场景里,评论就是我们要限制访问的域对象。
In this scenario, Comment would be our domain object that you want to restrict access to.
我怎么能暂时限制访问我的网站,我测试它在生活?
How can I temporarily restrict access to my website whilst I am testing it in live?
在SNMP标准的版本1中,社区字符串是保护或限制访问的唯一方法。
In Version 1 of the SNMP standard, the community string was the only method of securing or restricting access.
运营团队可能会限制访问关键系统,每周只向您的开发团队预留2小时。
Operations teams may limit access to critical systems, leaving your development teams with a two-hour window per week.
例如,一种应用于人力资源(HR)企业的普通控制用以“限制访问分类员工数据。”
For example, a common control that applies to the Human Resources (HR) organization is to "Limit access to classified employee data."
基于计算机的威胁比网络威胁的可能性小,因为生产环境中的计算机通常是限制访问的。
Machine-based threats are less likely than network threats because access to the machine in production is usually restricted.
个人识别码,用来保护SIM卡中受保护的数据区,例如:限制访问的电话簿。
A personal identification number which provides access to protected areas of the SIM e. g. barred phone books.
沙箱可见性和限制访问文件和操作系统在客户端应用程序服务器连接的另一边。
The sandbox limits visibility and access to the file and operating system on the client to the application server on the other side of the connection.
可以通过加密限制访问。只有在此计算机支持128位加密的情况下才选择此选项。
Access can also be limited by the strength of the encryption. Select this option only if 128-bit encryption is supported on this computer.
这两个软件的用途是相同的,但是后者更安全并提供许多特性,可以在系统负载过重时限制访问。
Both pieces of software serve the same purpose, but the latter is more secure and offers many features to restrict and throttle access when a system's load rises.
这第一个示例研究了在访问Web服务之前需要进行认证以帮助限制访问和跟踪使用情况的需求。
This first example examines the need to require authentication before accessing the web service to help restrict access and track usage.
由于知识产权保护的需要,其中大部分电子资源是限制访问的,只有一小部分是免费访问的。
Because of the intellectual property rights protection, while access to a few E-Resource is free, access to most of E-Resource is restricted.
受保护的进程限制访问一组受限的信息和进程管理界面,包括查询进程的映像名和终止或挂起进程。
Protected processes restrict access to a limited set of informational and process management interfaces that include querying the process's image name and terminating or suspending the process.
因为每种结构有一个预定的接口,通过该接口限制访问存储在数据结构中的数据,所以它们是模块化的。
They are modular because each has a prescribed interface through which access to data stored in the data structure is restricted.
有关SpecialPage类构造函数(利用它可限制访问、隐藏页面等)的更多信息,请查阅特殊页开发指南页面(参见参考资料)。
Check the Special Pages developer's guide page (see Resources) for more information about the SpecialPage class constructor, which will let you restrict access, hide the page, etc.
我是一名军事情报分析师,在巴格达东部服役…要是你8个多月里,每周7天,一天14个小时可以不受限制访问机密网络,那你会怎么做?
Im an army intelligence analyst, deployed to eastern Bagdad... if you had unprecedented access to classified networks, 14 hours a day, 7 days a week for 8 + months, what would you do?
其次,作为评论者指出,在IIS,你会有一套不同于你自己的凭据(取决于哪个版本的IIS)——在任何情况下,它会限制访问,有些沙盘。
Next, as commenters noted, on IIS, you'll have one set of credentials different from your own (depends on what version of IIS)-- in any case, it will have restricted access and be somewhat sandboxed.
苹果公司在这些问题上的立场是在斯诺登事件出现后形成的,在那之后,公司开始采用了一系列的技术,这些技术在默认情况下将使用者的数据加密,限制他人访问。
Apple's stance on these issues emerged post-Snowden, when the company started putting in place a series of technologies that, by default, make use of encryption to limit access to people's data.
苹果公司在这些问题上的立场是在斯诺登事件出现后形成的,在那之后,公司开始采用了一系列的技术,这些技术在默认情况下将使用者的数据加密,限制他人访问。
Apple's stance on these issues emerged post-Snowden, when the company started putting in place a series of technologies that, by default, make use of encryption to limit access to people's data.
应用推荐