He has emptied his mind of a nagging task, placed it into a trusted system for processing, and casually returned to his conversation.
艾伦已经把脑子里烦人的任务清掉了,把它们交给了一个信任的机构处理,然后继续自己的谈话。
Because these are trusted system classes, the bootstrap loader skips much of the validation that gets done for normal (untrusted) classes.
因为这些是可信的系统类,所以引导程序装入器跳过了对常规(不可信)类所做的大量验证。
You”l be on the ball more often, be able to move fludily from task to task and not get lost nearly as much with a trusted system at your side.
你会更出色,从一个任务到另一个任务灵活转换,不会迷失在信任的规划里。
Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.
当可信主机上的用户希望登录远程计算机(可以是不可信的系统)时,使用SSH中基于主机的身份验证。
The general consideration and primary planning on the construction of trusted system in the E- government extranet are introduced in the paper.
介绍了建设国家政务外网网络信任体系的初步构想,包括总体设计思想、总体逻辑结构、总体性能要求,以及值得注意的问题。
In other words, get all that stuff out of your head, and into your trusted system, so you don't have to worry about it while you focus on the task before you.
换言之,把其他所有事都抛出脑外,放进你的受托系统。这样你在真正集中注意力做他们之前,就不用再担心它们了。
Events can potentially be raised by any code, and are frequently raised by highly trusted system code in response to user actions such as clicking a button.
事件可能会由任何代码引发,并经常为响应单击按钮等用户操作由高度信任的系统代码不断引发。
Trusted Execution supports the run-time integrity check whenever any command is executed, whereas the TCB mostly does the periodic checking of system integrity.
可信执行支持在每当执行任何命令的时候执行运行时完整性检查,而TCB主要执行定期的系统完整性检查。
Trusted Computing Base is an install-time option only and to enable TCB on an existing AIX machine, you need to reinstall the entire AIX operating system.
可信计算基础只是一个安装时选项,并且若要在现有的AIX计算机上启用TCB,您需要重新安装整个AIX操作系统。
While this command provides useful information, we don't usually start with this unless a trusted administrator has already diagnosed that there is a memory issue of some kind on the system.
尽管这个命令提供一些有价值的信息,但是除非有可信的管理员已经诊断出系统中存在某种内存问题,否则我们通常不会首先使用这个命令。
They might also want to restrict the network traffic in and out of their system, so that only the traffic from trusted sources can enter their system and only authorized traffic can go out.
他们可能还想限制进出其系统的网络流量,以便只有来自可信源的流量才可以进入其系统,以及只有授权的流量才可以出去。
The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain.
授权数据是由那些属于系统中可信计算基础的服务器颁发的,因此在它所管理的域中可以认为是安全的。
Consider the lack of an authoritative, trusted source or single system of record as an illustrative example.
请考虑一下缺少权威性的可信的数据源或单一记录系统,会怎么样?
In Uganda, where villages often have one top-up phone run by a trusted operator, a basic system helps store and transfer money.
在乌干达,每个村庄有一个充值电话,由可信的接线员管理,这一基本系统帮助人们存款或转帐。
The Trusted Execution environment feature requires AIX V6.1 as the operating system.
可信执行环境功能要求将AIXV6.1作为操作系统。
There is always a clear mapping between any given system authorization ID used to establish a connection and a specific trusted context.
在用于建立一个连接的任何给定系统授权id与一个特定的受信任上下文之间,总是有一个明显的映射。
But be careful; people on Main Street USA trusted people on Wall Street for a long time because the financial system seemed to be producing reliable results that were the envy of the world.
但当心;长时间以来美国大街的人信任华尔街的人,因为金融系统看上去正在产出让世界羡慕的可靠结果。
For such a trusted entity, the hash value and signature are calculated and shipped as part of the their AIX installables and stored in TSD on the destination system.
对于这样的可信实体,对应的散列值和签名是作为其AIX可安装文件的一部分进行计算和分发的,并存储在目标系统上的TSD中。
Trusted Execution can be considered a collection of a set of features that supervise the integrity of the system.
可以将可信执行视为一组监督系统完整性的功能集合。
But this system trusted whatever ID was presented and so it was a simple matter to for the developer to present a different ID, even an administrative one.
但这个系统信任所提交的任何ID,对于开发人员来说,提交不同的ID非常简单,甚至是管理ID。
As a result, local applications were typically trusted with access to all system resources.
因此,本地应用程序通常受到信任可以访问所有系统资源。
This gives you the freedom to empower trusted project leaders to modify the system Settings (such as labels and category trees) as needed.
这样在需要的时候,你就可以自由授权可信耐的项目领导者来修改这个系统设置(比如标签和目录树)。
If a model cannot be trusted to tell you true things that you want to know about the software system that it represents, then it is worse than useless, since it can lead you to the wrong conclusions.
如果一个模式不能把它所表示的软件系统向你准确的表现出来,那么还不如不用模式,因为它可能会导致错误的结论。
The Solaris 10 operating system provides mandatory access controls through its security-enhanced Trusted Extensions component.
Solaris10操作系统通过其增强了安全性的 TrustedExtensions 组件提供了强制访问控制。
Park Kyung-joo, a Seoul resident on her way to a memorial site for Mr. Roh Sunday afternoon, said she barely trusted the justice system and resented the treatment Mr. Roh received in recent weeks.
周日下午前往卢武铉吊唁地的汉城居民Park Kyung - joo说,她基本不相信这样的司法系统,她对卢武铉近几周受到的待遇表示愤怒。
TrustedBSD is a working project to develop trusted operating system extensions that are ultimately destined for the FreeBSD operating system.
TrustedBSD是一个正在进行中的项目,主要开发可靠的操作系统扩展,这些扩展最终会加入 FreeBSD 操作系统。
In order for the system user to access any of the MDM Server components, it needs to authenticate to the J2EE container and establish a trusted channel.
如果系统用户要访问MDMServer组件,则需要向J2EE容器提供凭证,建立一个可信通道。
In the trusted host name field, enter the name of the system that you wish to register as a trusted host (typically the physical server name, for instance servername).
在TrustedHostname字段中,输入想将其注册为可信主机的系统的名称(通常指的是物理服务器名,例如servername)。
The trusted device network approach provides an organization with a higher level of control over critical system access.
可信任硬件网络策略提供了一种可以更高效控制临界系统接入的组织结构。
The trusted device network approach provides an organization with a higher level of control over critical system access.
可信任硬件网络策略提供了一种可以更高效控制临界系统接入的组织结构。
应用推荐