这创造了一个非常安全的环境,因为应用在没有获许的情况下是不能访问系统的其他部分的。
This creates a very secure environment in which an application cannot access parts of the system for which it is not given permission.
这样是安全的——就像它的名字“单一用户模式”的含意一样——只有超级用户可以访问系统。
It is safe, since — as the name "single-user mode" suggests — only the superuser is able to access the system.
这些操作可以是安全配置更改、密钥和证书管理、访问控制策略更改、总线和其他系统资源管理等等。
These actions can be security configuration changes, key and certificate management, access control policy changes, bus and other system resources management, and so on.
双重密钥安全认证是用于验证跨不同系统访问的保护方法之一。
Double key secure authentication is one of the protection methods used to verify access across different systems.
总的说来,这是一种非常粗粒度的安全形式,用于处理对系统的功能领域的访问,可以由url或对EJB组件的方法调用进行定义。
It is generally a fairly coarse-grained form of security that deals with access to functional areas of the system, perhaps defined by URLs or method calls on an EJB component.
不过您也不必担心安全问题,因为文件系统访问控制机制通常都可以提供充分的保护。
However, this is not necessarily a security concern since the file system access control mechanism usually provides sufficient protection.
某些文件系统支持高级的安全特性,比如访问控制列表(acl)。
Some file systems support advanced security features, such as access control lists (ACLs).
务必考虑系统的每个层次的可能访问路径,同时还要考虑授权如何与其他安全功能(如网络级别的保护)集成。
It is essential to consider the possible access paths to every layer of a system, and also to consider how authorization integrates with other security aspects, such as network level protection.
只有确认了适当的权限后,用户才可以访问安全的系统或者资源。
Only after the appropriate rights have been confirmed will the user be granted access to secured systems or resources.
我进行过很多安全评估,我必须向公司报告他们允许通过不安全通道对其消息传递系统进行匿名管理访问。
At many of the security assessments I have performed, I have had to report to the company that they were allowing anonymous administrative access to their messaging system through unsecured channels.
这两个软件的用途是相同的,但是后者更安全并提供许多特性,可以在系统负载过重时限制访问。
Both pieces of software serve the same purpose, but the latter is more secure and offers many features to restrict and throttle access when a system's load rises.
注意,当这个守护进程停止运行时,系统是安全的;所有端口关闭,不可访问。
Note that in the case of a crash, your system will be safe; all ports will be closed and unaccessible.
访问控制和数据隐私等安全要求在现有和遗留系统中都得到满足了吗?
Have security requirements like access control and data privacy been met in both existing and legacy systems?
微软原先打算阻止其他公司的安全软件访问Vista的“内核”,以防它们对系统重要部分产生影响。
Microsoft initially planned to prevent other firms' security software from accessing the "kernel" of Vista, in effect the heart of the system.
可信的证书权威机构发布数字证书,它们被用来鉴别用户和组织访问Web站点,e - mail服务器和其他安全系统的权限。
Trusted certificate authorities issue digital certificates, which are then used to authenticate users and organizations for access to Web sites, E-mail servers, and other secure systems.
在第4部分中,DailyMoon的发行人Rudy决定报社需要为访问其内部系统的Web服务制订更好的安全过程。
In Part 4, Rudy, publisher of the Daily Moon, decides that the paper needs to institute better security procedures for web services that access their internal systems.
推敲员工访问多个系统可能带来的安全影响
Evaluating the security implications of employees accessing multiple systems
现在,在第4部分中,TheDailyMoon的发行人Rudy决定报社需要为访问其内部系统的Web服务制订更好的安全过程。
Now in Part 4, Rudy, publisher of the the Daily Moon, has decided that the paper needs to institute better security procedures for web services that access their internal systems.
我们还涉及到如何限制“Pre -Windows 2000 CompatibilityAccess”安全组访问AD以及标记“非系统基础”为保密。
We have covered how we restrict read access to Active Directory to members of the Pre-Windows 2000 Compatibility access security group as well as marking non-system-base as confidential.
我们还涉及到如何限制“Pre-Windows 2000CompatibilityAccess”安全组访问AD以及标记“非系统基础”为保密。
We have covered how we restrict read access to Active Directory to members of the “Pre-Windows 2000 Compatibility Access” security group as well as marking non-system-base as confidential.
在本文中,我将谈到数据安全性的机密性方面:确保受保护的数据只能被授权用户或系统访问。
In this article, I will address the confidentiality aspect of data security: Making sure protected data can only be accessed by authorized people or systems.
描述其位置、系统、访问方法、源数据流通和更新频率、数据安全性和数据质量。
Describe their location, systems, access approaches, source data traffic and update frequency, data security, and data quality.
相比之下,授权是系统用来决定已通过认证的某个特定用户访问系统控制的安全资源的访问级别的一种机制。
Authorization, by contrast, is the mechanism by which a system determines what level of access a particular authenticated user should have to secured resources controlled by the system.
第三个是支持后端系统的安全访问的安全性管理,在这点上,JDBC规范并没有任何对应点。
Third -- and where the JDBC specification does not have any corresponding focus -- is security management for enabling secure access to back-end systems.
访问控制—使系统能够识别用户组的安全性策略。
Access control. Enables the system to recognize security policies for groups of users.
适用于一个系统的安全策略实质上是一个良好定义的“仓库”,它存储了授予这个系统中不同实体的访问权限的断言。
The security policy applicable to a system is in essence a well-defined "repository" of assertions regarding access permissions granted to the different entities in that system.
如果安全措施太少,您唯一的防御系统将会失效,从而让外人能够访问检查点之后的所有数据。
Too little security, and your only defense system will be thwarted and allow full access to everything inside that checkpoint.
对不同操作系统的使用和需求促使它们引入线程安全性,并阻止对BIOS或硬件的直接访问。
With the usage and demand for different operating systems, made them to introduce the thread security and prevented direct access to the BIOS or Hardware.
使用FUSE您可以开发功能完备的文件系统:其具有简单的api库,可以被非特权用户访问,并可以安全的实施。
FUSE lets you develop a fully functional filesystem that has a simple API library, can be accessed by non-privileged users, and provides a secure implementation.
使用FUSE您可以开发功能完备的文件系统:其具有简单的api库,可以被非特权用户访问,并可以安全的实施。
FUSE lets you develop a fully functional filesystem that has a simple API library, can be accessed by non-privileged users, and provides a secure implementation.
应用推荐