USB Disk Authentication - Configure a USB device to act as a "key" to view encrypted information (it must be plugged into the system for access).
盘认证-配置一个USB设备作为一个“钥匙”来查看加密的信息(必须作准入制度堵塞)。
Intruders might invade your systems for one of two reasons: to gain access to information that they should not have or to alter the behavior of a system.
入侵者入侵您的系统可能是出于这两个原因之一:为了获取他们本不应该拥有的信息,或者为了改变系统的行为。
You, as the system administrator, can apply access and permissions for each group for large workspaces rather each member.
您,作为系统管理员,可以为每个组而不是每个成员赋予对大型工作空间的访问和权限。
After we installed the server operating system, we configured it for access by the guest operating systems.
安装好服务器操作系统后,我们将它配置为可由客户操作系统访问。
Although that ruling did not address the quota issue, it was hoped that a widening of the distribution system would lead to greater market access for u.
即便那个裁定没有讨论配额问题,它被期望是发行制度的一种拓宽将对美国电影业产生更大的市场通道。
This allows you to establish fine-grained access control for file system objects and support inheritance features.
这样使得您可以为文件系统对象建立细粒度的访问控制,并且支持继承特性。
However, you can take steps — such as implementing a version-control system for artifacts and granting appropriate access rights — to help reduce conflicting situations.
但是,可以采取步骤——例如为工件实现一个版本控制系统并授予适当的访问权限——从而帮助减少冲突情况。
This creates a very secure environment in which an application cannot access parts of the system for which it is not given permission.
这创造了一个非常安全的环境,因为应用在没有获许的情况下是不能访问系统的其他部分的。
Although that ruling did not address the quota issue, it was hoped that a widening of the distribution system would lead to greater market access for U.S. firms.
即便那个裁定没有讨论配额问题,它被期望是发行制度的一种拓宽将对美国电影业产生更大的市场通道。
Employees have tremendous levels of internal access and system knowledge, but for the most part probably have limited resources and hacking skill.
雇员具有非常高的内部访问级别和系统知识水平,但他们的资源和黑客技能可能很有限。
It also includes access to newly developed data feeds, produced by the legacy system, for the specific purpose of data access.
它还包括对由旧系统产生的,用于数据访问特殊目的的新近开发的数据供给的访问。
Registry MDM solution pattern: at least a skeleton master data system is build to provide a system of record for a real-time reference access.
注册MDM解决方案模式:构建至少一个骨架主数据系统,从而提供支持实时引用访问的记录系统。
Both the service provider and the subscriber access the billing system for the current usage charges.
服务提供者和订户都通过访问计费系统获知当前的使用费用。
Access control. Enables the system to recognize security policies for groups of users.
访问控制—使系统能够识别用户组的安全性策略。
By sitting between the rest of the operating system and the actual disk, CGD looks and ACTS like any other disk drive attached to the system, allowing for transparent access to secure storage.
CGD位于操作系统中的其他部分和实际磁盘之间,CGD可以作为连接到系统的其他磁盘设备,允许对安全存储数据进行透明访问。
The storage network is used exclusively for clustered file system communication and access.
存储网络专门用于集群文件系统的通信和访问。
Using its own policies, the client is then able to mount and access the appropriate location for the file system it requested.
客户机运用自己的策略可以挂载并访问它请求的文件系统的适当位置。
Mere browsing is free, although visitors must pay for access to an instant-messaging system, price lists and dealers' private rooms.
尽管参观者必须为实时通信系统、价目单和交易商包间付费,只不过浏览是免费的。
The article provides a guide to setting up the OGSA-DAI system along with DB2, for relational data access and update through SQL requests in OGSA-DAI perform documents.
文章提供了OGSA -DAI系统和DB2的设置方法,以及通过OGSA - DAI执行文档中的SQL请求来存取和更新关系数据的指南。
Transactions running on this system implement business logic and access data necessary for order entry and customer relationship management (CRM).
运行在这个系统上的事务将实现业务逻辑,并且还要访问订单录入和客户关系管理(CRM)所需要的数据。
But, since you don't update a patient name as often as you access demographics, you've still optimized the system for performance.
但由于更新患者姓名的频率远远低于更新患者统计信息的频率,因此就性能来说,系统依然得到了优化。
GnuPG allows encrypting and signing your data and communication, and features a versatile key-management system and access modules for all kinds of public key directories.
GnuPG支持数据和通信的加密和签名,且以一个多功能的密钥管理系统和各种公钥目录的访问模块为特色。
SELinux is by far the most well-known MAC system for Linux (mandatory access control).
到目前为止,SELinux是针对Linux的最有名的mac系统(强制访问控制)。
Let's look at some of the best practices for controlling system access with sudo while still allowing users to be productive.
让我们来看看利用sudo控制系统访问权限且用户依然能保有效率的一些最佳实践吧。
In order for the system user to access any of the MDM Server components, it needs to authenticate to the J2EE container and establish a trusted channel.
如果系统用户要访问MDMServer组件,则需要向J2EE容器提供凭证,建立一个可信通道。
When users search for or access a file, the UNIX system searches through the inode table for the correct inode number.
当用户搜索或者访问一个文件时,UNIX系统通过inode表查找正确的 inode编号。
Finally for configuring the system, you must supply the userid information for the GridDataService to use access the DB2 database on your behalf.
最后,为了配置系统,必须提供GridDataService的用户id信息来存取db2数据库。
There is a System access Facility (SAF) check during the Register API call for the user's access to the target server's CBIND SAF class.
在RegisterAPI调用期间,存在系统访问工具(System Access Facility,SAF)检查,了解用户对目标服务器的CBIND saf类的访问权限。
"The biggest challenge is getting this unregulated and unorganized system under a single umbrella for providing universal access," says Duggal.
“最大的挑战是把这个无控制和无组织的系统放到提供全民普及的单一框架内”,Duggal说。
"The biggest challenge is getting this unregulated and unorganized system under a single umbrella for providing universal access," says Duggal.
“最大的挑战是把这个无控制和无组织的系统放到提供全民普及的单一框架内”,Duggal说。
应用推荐