接着登录脚本检查访问权限。
由于用户的登录脚本路径是空的,所以向导无法创建登录脚本。
The wizard cannot create the login script because the user's logon script path is empty.
由于无法从注册表中读取登录脚本目录,所以向导无法创建登录脚本。
The wizard cannot create the logon script because it could not read the logon script Directory from the Registry.
你甚至可以创建一个登录脚本当它们启动时自动添加这些静态ARP到你的计算机中。
You can even create a login script that would add these static entries to your PCs as they boot.
用户可以在其个人Cron配置中使用这类调用,或者使用自己的登录脚本完成作业。
Users can place calls such as this in their personal Cron configurations, or they can use their login scripts to do the job.
主网络登录是检测用户名与密码、处理任何登录脚本、运行其他启动任务的客户程序。
The primary network logon is the client that is used to validate your user name and password, process any login scripts, and perform other startup tasks.
例如,您可以通过向用户登录脚本添加简单的脚本来替代中央服务器的文件,从而更改配置文件。
For example, you may be able to change a configuration file by adding a simple script to user logon scripts that replaces the file from a central server.
创建登录脚本在组策略对象(GPO),将gpo链接到您的服务器所在的组织单位(OU)。
Create a logon script in a Group Policy object (GPO), linking the GPO to the organizational unit (ou) where your servers live.
当Citrix客户端在Citrix服务器上登录时,登录脚本会运行用户登录命令(usrlogon . cmd)。
When Citrix clients log on to the Citrix server, the logon script runs the user logon command (usrlogon.cmd).
现在,当有用户使用Citrix客户端登录到RationalApplication Developer上时,登录脚本将会运行,而Citrix服务器s驱动器将会指向每一个映射到m驱动器上的客户机。
Now, when any user logs into Rational Application Developer using the Citrix client, the login script will run, and the Citrix server s drive will point to each client that is mapped to the m drive.
因此,第一步需要在把登录表单指向这个脚本,如清单3所示。
So the first step is to point the login form to that script (see Listing 3).
因为注入脚本可以访问dom树的任何部分,所以它们可以从登录表单的文本字段中窃取密码信息。
Since injected scripts can access any part of the DOM tree, they can, among other things, steal password information from the text field of login forms.
现在,每当需要使用公钥登录到远程主机时,您可以结合使用个人密钥脚本和远程主机上该用户接受的密钥列表。
Now, whenever you need to log in to a remote host with your public key, you can use the script of your personal key with the list of accepted keys for the user on the remote host.
我们现在的脚本可以登录到远程服务器并上载所有本地系统中修改过的文件,但是脚本还只是仅仅能处理单一目录。
We have a script that will login to a remote server and upload all files which have changed on the local system, but the script will only do this for a single directory.
清单4中的脚本会生成这样的登录密码属性报告。
Listing 4 contains a script that will generate such a report on login password attributes.
因为根用户运行序言脚本,所以此用户被允许登录集群。
Since the root user runs the prologue script, the user will be allowed to log into the cluster.
运行这个脚本,您将获得 wtmp的登录信息。
Running this script gives you the login information for wtmp.
设置这些别名的最佳位置是在登录期间执行的外壳初始化脚本中,例如. k sh、。profile或.bashrc。
The best place to set these aliases is in your shell initialization script that is executed during login, such as.ksh,.profile, or.bashrc.
完成更改之后,删除登录、用户配置文件或任何启动脚本中对ulimit命令的引用。
Once the changes have been made, remove references to the ulimit command in the login, user profiles or any startup scripts.
etc/init.d还包含切换到单用户模式的脚本,以便重新启动并关闭计算机,并禁止登录。
etc/init.d also contains scripts to drop to single-user mode, to restart and shut down the machine, and disable logins.
登录完毕之后,运行db2profile脚本,启动db 2命令行处理器(CLP),如图10所示。
After logging in, run the db2profile script and start up the db2 command line processor (CLP) as usual (Figure 10).
这个页面是一个PHP脚本,它能检查并确保在提供敏感信息之前用户已经登录。
That page is a PHP script that checks to make sure that the user is logged in before providing sensitive information. It works as follows (see Listing 5)
记着使用本文前面通过checksetup.plPerl脚本创建的管理员帐号/口令进行登录。
Remember to log in with the administrator account/password created with the checksetup.pl Perl script earlier in the installation.
通过包含会话cookie,Domino服务器会将您的脚本视为最近登录过、现正访问数据库的实际人类用户。
By including a session cookie, the Domino server thinks that your script is actually a human user who recently logged in and is now accessing the database.
在脚本的开始部分中,您可从登录页面提交的参数中获取用户名并存储在会话中。
At the top of the script, you get the user name from the posted arguments of the login page and store it in the session. The page then continues to load the invaluable prototype.js.
在CLI使用- f命令运行完脚本后,您应当能够检查结果:在CLI中查询新模式,或是登录到管理控制台。
After running this script using the -f command in the CLI, you should be able to verify the results by either querying the CLI for the new pattern, or by logging into the administration console.
如果使用Bourne或Kornshell,那么可以编辑目标用户帐户的.profile文件,使该用户登录到系统时自动运行db2profile脚本。
If you are using the Bourne or Korn shell, you can edit the.profile file of a target user account so that the db2profile script runs automatically when the user logs in to the system.
要测试注销脚本,可以输入exit(您不能在非登录Shell 中输入 logout)。
To test the logout script, type exit (you cannot type logout in a non-login shell). You should see
使用sec_master(密码为passw0rd)登录后,运行清单4中的脚本(您可以复制并粘贴)。
Run the script in Listing 4 (you can copy and paste) after you have signed in as sec_master (password is passw0rd).
使用sec_master(密码为passw0rd)登录后,运行清单4中的脚本(您可以复制并粘贴)。
Run the script in Listing 4 (you can copy and paste) after you have signed in as sec_master (password is passw0rd).
应用推荐