• Using Libraries from Partially Trusted Code.

    通过部分受信任代码使用

    youdao

  • How to: Run Partially Trusted Code in a Sandbox.

    如何运行盒中部分受信任代码

    youdao

  • This member cannot be used by partially trusted code.

    这个成员无法部分信任的程序码所使用

    youdao

  • Access restrictions are ignored for fully-trusted code.

    对于完全受信任的程序码来说,存取限制忽略。

    youdao

  • For an overview of this issue, see Using Libraries from Partially Trusted Code.

    有关问题概述请参见通过部分受信任代码使用

    youdao

  • Describes how to help protect methods from being called by partially trusted code.

    说明如何协助保护方法部分受信任程序码呼叫。

    youdao

  • It allows systems to be configured to execute partially trusted code without prompting the user.

    允许在不提示用户的前提下将系统配置执行信任代码

    youdao

  • Meanwhile, the partially trusted code is only allowed to do things appropriate to its level of trust.

    同时信任代码仅仅被允许信任度下相应事情

    youdao

  • Using reflection mechanisms, highly trusted code that can reference your object can get and set private members.

    通过使用反射机制那些能够引用对象的、高度受信任代码可以获取设置私有成员

    youdao

  • Sometimes your partially trusted code simply needs access to the file system without prompting the user for permission.

    有时信任代码仅仅需要在不提示用户需求权限的情况下访问文件系统

    youdao

  • The browser control and partially trusted code open the door to some very interesting possibilities using managed code.

    浏览器控件信任代码一些使用段代码的非常有趣的可能的功能打开大门

    youdao

  • Additionally, you must strike a balance between security and usability in all the expected scenarios using trusted code.

    此外使用受信任代码所有预期方案中,必须在代码的安全性可用性之间达成一种平衡

    youdao

  • In such cases, your trusted code can be the go-between, similar to the managed wrapper or library code described in Securing wrapper code.

    这种情况下,受信任代码可以充当中介它类似保护包装代码所述托管包装代码。

    youdao

  • After I talk about what happened to the rich client, I will discuss trusted code and security as well as deployment of code that runs on the.

    谈论客户端到底发生了什么,我将会导论可信任代码以及安全性以及运行在。

    youdao

  • It helps protect computer systems from malicious code and helps protect trusted code from intentionally or accidentally compromising security.

    有助于保护计算机系统免受恶意代码的攻击,保护受信任的代码以使其安全性免受有意无意危害

    youdao

  • It is the backbone of partially trusted code and is not restricted to file access, but rather affects everything from network access to windowing and more.

    信任代码基础并且限于文件访问但是对于通过网络访问窗口或者其他的任何情况都相当影响

    youdao

  • The stack walk is designed to help prevent luring attacks, in which less-trusted code calls highly trusted code and USES it to perform unauthorized actions.

    堆栈旨在防止引诱攻击;在这种攻击中,受信程度较低的代码调用高度信任的代码,使用高度信任的代码执行未经授权的操作。

    youdao

  • A private, protected, or internal method that would not be accessible from normal compiled code is accessed from partially trusted code by using reflection.

    无法一般编译程序存取私用受保护内部方法,可利用反映部份信任程序码存取。

    youdao

  • "Trusted code" runs in the control region, user application code runs in the servant region, which completely isolates application execution and transaction management.

    受信任代码控制区域中运行用户应用程序代码在服务区域中运行,从而将应用程序执行事务管理完全隔离

    youdao

  • Meanwhile, partially trusted code can be barred from general access to the network and file systems, access to the registry, and other protected resources of the system.

    同时可信代码可以访问网络以及文件系统,访问注册表,以及其他系统保护资源

    youdao

  • If you do not, publicly visible security-critical types and members are treated as security-safe-critical and can be called by partially trusted code outside the assembly.

    如果这样做则公开可见安全关键类型成员视为是安全可靠关键的,并且可以程序集外部部分信任代码调用

    youdao

  • Shows how to create and execute anonymously hosted dynamic methods from partially trusted code, and how to create an application domain for testing partially trusted code.

    显示如何部分信任程序建立执行匿名装载动态方法以及如何建立应用程序定义域测试部分信任程序码。

    youdao

  • With these stores, you can read and write data that less trusted code cannot access and prevent the exposure of sensitive information that can be saved elsewhere on the file system.

    使用这些存储可以读取写入受信任代码无法访问数据,并可以防止公开保存文件系统其他位置敏感信息

    youdao

  • If you do not expect your code to be executed from a partially trusted context or to be called by partially trusted code, you do not have to be concerned about the information in this section.

    如果不要指望部分信任内容执行部分受信任程序呼叫您的程序码,您不必担心有关一节中的资讯

    youdao

  • If you do not expect your code to be executed from a partially trusted context or to be called by partially trusted code, you do not need to be concerned about the information in this section.

    如果代码预期不会部分信任上下文中执行被部分受信任的代码调用,那么您需要关心中的信息

    youdao

  • While restricting web surfing to trusted sites should reduce the risk of infection, the malicious code can be injected into any website.

    尽管限制浏览器只浏览信任站点可以减少受到攻击风险恶意代码可以植入任何的网站。

    youdao

  • The attraction of running an MQ application as trusted is that it gives a performance benefit through reduced code pathlength.

    MQ应用程序作为受信任对象运行好处在于,这样可通过缩短代码路径长度提供性能优势

    youdao

  • CSRF attacks originate from malicious code from an intruder site that tricks a browser into transmitting unprovoked requests to a trusted site.

    CSRF攻击入侵站点恶意代码发起代码欺骗浏览器,使其将无关的请求传输受信任站点。

    youdao

  • One ProtectionDomain is created by default and is treated "special," in that the code belonging to this domain is deemed trusted and can be granted special privileges.

    默认情况下,会创建一个ProtectionDomain,并作为“特殊”情况处理属于这个代码认为受信任可以获得特殊的权限。

    youdao

  • One ProtectionDomain is created by default and is treated "special," in that the code belonging to this domain is deemed trusted and can be granted special privileges.

    默认情况下,会创建一个ProtectionDomain,并作为“特殊”情况处理属于这个代码认为受信任可以获得特殊的权限。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定