You've illegally accessed and misused confidential security files.
你已经非法获取并盗用了机密文件。
To repair security, you must manually edit the security files to remove the custom security object.
若要修复安全系统,必须手动编辑安全文件,移除自定义安全对象。
Users are managed either from file-based user and group security files or populated from a Lightweight directory Access Protocol (LDAP) directory.
用户或者从基于文件的用户和组安全文件进行管理,或者从一个轻量级目录访问权限协议(LDAP)目录中产生。
The kernel usually has some sort of security model that manages access to devices, files, processes, and objects.
内核通常具有某种类型的安全模式来管理对设备、文件、进程和对象的访问。
Therefore, the security mechanism to run these commands is based on the operating system permissions of the files.
因此,运行这些命令的安全机制以文件的操作系统权限为基础。
The default Settings disable macros from loaded documents by default to enhance security, but you need to run the macros from saved files, so you modify this preference setting.
为了提高安全性,默认设置在默认的情况下禁用了已加载文档中的宏,但是,您需要从被保存的文件中运行宏,因此,需要修改首选项设置。
PDF files include a variety of security options - from access restrictions to electronic signatures - that help protect sensitive company information.
PD F文件包括多种安全选项——从访问限制到电子签名——帮助保护敏感的公司信息。
These files specify security configuration to use in RMI-IIOP communication with the server.
这些文件指定了RMI - IIOP与服务器的通信中要使用的安全配置。
Providing correct security on your files or directories can be troublesome.
给文件或目录提供正确的安全设置很麻烦。
Making files immutable is often done as part of a security or intrusion detection effort.
使文件不可变通常是安全或者入侵检测工作的一部分。
Packages stored in JAR files can be optionally sealed to enforce version consistency and security.
存储在JAR文件中的包可以选择进行密封,以增强版本一致性和安全性。
The LDAP database is loaded with the user and group information from the localhost's security database files.
使用本地主机的安全数据库文件中的用户和组信息装载ldap数据库。
It makes use of IBM extension files to indicate what security is provided or required by a service.
它使用IBM扩展文件指出服务提供了或者要求什么样的安全性。
It also allows you to customize your security via the XML configuration files and the command line.
它还允许通过XML配置文件和命令行定制安全设置。
These are system-critical files and loss of their integrity threatens overall system security.
这些文件是系统关键型文件,它们失去完整性会威胁到总体系统安全性。
Discusses the message flow, WS-Security configuration, and the associated files for point-to-point Web services without an intermediary
讨论没有中间层的情况下点对点Web服务的消息流、WS-Security配置以及关联的文件。
Shows you the message flow, WS-Security configuration, and the associated files with an intermediary.
介绍采用中间层时的消息流、WS - Security配置以及关联的文件。
However, the Flash Security model doesn't allow local files to access network resources and vice versa.
不过,FlashSecurity模块不允许本地文件访问网络资源,反之亦然。
LBAC security cannot be imposed on external table data files.
LBAC安全性不能施加在外部表数据文件上。
Linux and UNIX environments enforce strong security at the user level; the files and processes associated with one user account are not directly accessible by other users.
Linux和UNIX环境在用户级上强制实施高安全策略,与一个用户帐户关联的文件和进程不能被其他用户直接访问。
Include the security plug-in header files in your plug-in.
将安全性插件的头文件包括到插件中。
The application requires tight integration of object-level security and security for HTML and JSP files, servlets, and client logins.
应用程序要求对象级安全性同html和JSP文件、servlet和客户机登录的安全性紧密集成。
These areas included rules for enabling remote services, IP security filtering, and more granular control for startup files, which included inittab, rc.tcpip, and inetd.
这些领域包括启用远程服务的规则、IP安全性过滤和对启动文件,包括inittab、rc.tcpip 和inetd 的更细粒度的控制。
Services-config.xml: the top-level configuration file that references the other configuration files and also provides security constraints, channels, and logging.
services - config . xml:引用其他配置文件且提供安全约束、通道和日志记录的顶级配置文件。
Answer: the Version 5 Tech Preview does not express security requirements in the Web Services Description Language (WSDL) files.
答:版本5技术预览并不用Web服务描述语言(Web Services Description Language,WSDL)文件表达安全性需求。
For more information on security considerations when using.vsdisco files, see Resources.
有关使用.vsdisco文件时的安全注意事项,请参见参考资料。
The final three.jar files provide other supporting classes, such as security principals, for talking with Geronimo.
最后的三个.jar文件提供了其他支持类,比如与Geronimo对话的安全主体。
Figure 5 shows the location of the two required header files for implementing security plug-ins on a Windows system.
图5展示了在Windows系统上实现安全性插件所需的这两个头文件的位置。
Step 1: Include the security plug-in header files in your plug-in.
步骤1:将安全性插件头文件包括到插件中。
Step 1: Include the security plug-in header files in your plug-in.
步骤1:将安全性插件头文件包括到插件中。
应用推荐