这样,恶意代码获得的安全访问权限可以比它被允许的要高。
In this way, malicious code can achieve higher security access than it should be allowed.
系统必须提供安全性,并根据相应的权限控制对这些功能的访问。
The system must provide security and control access to those functions based on permissions.
配置用于运行特定应用程序的代码访问安全权限集。
Configures the code access security permission set that is used to run a particular application.
在安全性选项卡上,单击“使用自定义访问权限”,然后单击编辑。
On the Security TAB, click Use custom access permissions, and then click Edit.
在安全性选项卡上,单击“使用自定义访问权限”,然后单击编辑。
On the Security TAB, click Use custom access permissions, and then click Edit.
应用推荐