完成系统包括标准的功能和完成特性——例如,系统上的有效用户、主目录、主机、网络等对象的查找。
The completion system includes standard functions and completions — for example, lookups of valid users on the system, home directories, hosts, networks, and so on.
字典攻击——根据字典词汇,使用蛮力搜索的方式推测一个有效用户的密码。
Dictionary attack — Guessing the password of a valid user using a brute force search through dictionary words.
在任何一种情况下,对于有效用户,这都会造成极大的不便。
In both cases, this can be a major inconvenience to the valid user.
如果构架师认为开发人员的工作是十分有价值的,那么他们之间的交流将会很有效用。
The communication between the architect and the developers can only be effective if the architect is appreciative of the work of developers.
调用进程的有效用户ID必须是超级用户,或者可以与该信号量集的创建者或所有者匹配的用户。
The effective user ID of the calling process must be that of the super-user or match the creator or owner of the semaphore set.
记住,我们是通过检查会话中的用户信息来识别有效用户的。
Remember, we recognize validated users by checking the session for their user information.
其中包括数据库名称、有效用户ID和口令。
This includes the database name, a valid user id, and password.
服务器用户“%s”不是数据库“% s”中的有效用户。
它确保只有有效用户才可以使用应用程序(身份验证)。
It ensures that only valid users can use the application (authentication).
学习有效用户界面的设计,最好的办法是看看其他设计师是如何做的。
There's no better way to learn how to design effective user interfaces than to see how other designers do it.
本例中的用户不应该与安全服务器ID(要求使用注册表中的有效用户)相同。
The user in this example should not be the same as the security server id (the requirement for which is a valid user in the registry).
但是,如果系统能接受一个听起来象“病人”一样类似的声音,则会给那些适当模仿系统有效用户的声音的攻击者钻空子。
However, if the system will accept a similar voice that sounds "sick," then it's more likely to fall prey to attackers who can reasonably mimic the voice of valid users of the system.
这些人会说客户的语言,能够建立真实反映业务需求的有效用例。
These people can talk the customer's language and build effective use cases that truly reflect the business requirements.
连接建立后,任何有效用户都可以使用该可信连接,无需重新验证。
Once established, any valid user can use the trusted connection without re-authentication.
外展服务和同伴教育已被有效用于此类人群。
Outreach and peer education have been effectively used to reach such populations.
连接建立后,任何有效用户都可以重用该可信连接,无需重新验证。
Once established, all valid users can reuse this trusted connection without re-authentication.
它还需要编校服务器的有效用户ID和密码。
It also requires a valid user id and password for the redaction server.
客户使用有效用户ID和密码登录。
任何提供了有效用户ID和密码的用户都能够执行public组有权执行的操作。
Any user that supplies a valid user id and password has the ability to perform any operation the PUBLIC group has been granted.
因此,字符串samuelclemens 满足条件,但是它的长度显然超出了有效用户名的范围。
Thus, the string samuelclemens fits the criteria, but it is obviously too long for a valid user name.
这种配置是不安全的,因为这意味着任何知道有效用户ID和密码组合的人都可以连接到WebSphereApplicationServer,并断言任何用户身份。
This is not a secure configuration because this implies that any person knowing any valid user id and password combination can connect to WebSphere Application Server and assert any user's identity.
因此,攻击者可能作为一个有效用户通过认证,然后提供一个HTTP 消息头(可能为 iv-cred ),这个消息头表明他比实际上有更多的权限。
Therefore, as a hack, an attacker might authenticate as a valid user, but then provide an HTTP header (perhaps the iv-cred) that implies more permissions than he actually has.
这意味着超级用户权限被授给属于本地Administrators组的所有有效用户账户。
This means that super-user authority is granted to any valid user account that belongs to the local Administrators group.
使用该请求的Web服务首先尝试验证该令牌;即,查看请求者是否为系统中的有效用户。
The Web service consuming the request first attempts to authenticate the token; that is, find out if the requestor is a valid user in the system.
这使set-user-ID(非根)程序能够放弃它的所有用户特权,执行一些非特权操作,然后恢复原来的有效用户ID。
This allows a set-user-ID (other than root) program to drop all of its user privileges, do some un-privileged work, and then re-engage the original effective user ID in a secure manner.
这确保了对AmazonSQS的请求无法被攻击者捕获并回放以模拟有效用户。
This ensures that the request to Amazon SQS cannot simply be captured by an attacker and replayed, thus mimicking the valid user.
Username:用于访问CICS系统的有效用户ID。
在Linux手册页上指出:setuid设置当前进程的有效用户id。
From the Linux man pages: setuid sets the effective user id of the current process.
在Security选项卡中,单击Runaswebuser,指定希望web服务以调用web服务的有效用户名运行。
In the Security TAB, specify that you want the web service to run with the effective user name of the user invoking the web service by checking run as web user.
由于部署窗口和参与验收测试的有效用户是有限的,所以部署日期也受到限制,而且通常在制定概念阶段早期就确定了。
Due to restricted deployment Windows and the availability of users to participate in acceptance testing, deployment dates were limited and usually decided early in the concept phase.
应用推荐