用户控制:有多少?
我们开始在我们的用户控制工作。
请避免移动内容,或者允许用户控制移动。
Avoid moving content or allow users to control the movement.
用户在本地获得对其信用卡和个人信息的控制。
The user retains control of his credit card and personal information locally.
除了控制哪个应用程序能被访问之外,您还可以添加用户级别的控制。
In addition to controlling which applications can be accessed, you can add user level control.
这种技术可以让用户不需要触碰电脑就能控制它。
Such technology could allow users to command a computer without touching it.
如果他们本身就是用户,那他们就处于由经理们控制的环境中。
If they're users themselves, they exist in an environment controlled by managers.
所有这些操作都可以通过一个自助服务用户界面控制。
All of this can be controlled through a self service user interface.
他们的责任是控制用户对网络的访问。
They are responsible for the control of user access to the network.
名称——注册和控制用户出口的活动状态。
Name — To register and control the active state of the user exit.
这说明该服务现在通过一个域用户帐户控制。
This shows that the service is now being controlled by a domain user account.
这一点对于基于位置的应用程序来说至关重要:用户必须享有控制。
That's the key thing with location-based apps, the user must remain in control.
这进一步支持对特定用户的权限进行强有力的控制。
This further enables strong control over what specific users can do.
一个好友系统-用户能够控制谁给他发送消息。
A friendship system - users should be able to control who can send them messages.
角色决定用户的访问控制。
因此,可以实施用户管理的访问控制部分。
As a result, you can enforce the access control portion of user management.
这样将提供针对个别用户的特殊控制。
访问控制确保只有拥有正确权限的用户才能访问数据和内容。
Access control ensures that only people with correct rights can access data and content.
还可以对能够部署到不同云组的用户应用访问控制。
You can also apply access controls to who can deploy to different cloud groups.
区分上述两类用户的安全和访问控制模型。
A security and access control model that distinguishes between these two classes of users.
第二个安全漏洞与攻击者借助用户可管理数据来控制业务流程有关。
The second vulnerability has to do with using user-controllable data to control a business process.
用队列系统控制用户。
用户也能通过笔记本屏轴上的一个滚轮来进行控制。
用户不直接控制服务区域。
自由软件用户想要控制自己的系统。
用户帐号控制合理化,减少困扰。
允许用户Administrator完全控制,然后单击add。
Allow Full control to user Administrator and then click Add.
root 可以对系统进行完全的管理控制,被认为是“超级用户”。
Root has full administrative control of the system and is known as a superuser.
当用户在不同地点可以远程控制。
通过Torpig,我们可以对电脑进行远程控制,搜集Windows用户的个人信息和金融信息。
It can be used to gather personal and financial information from Windows users.
应用推荐