• He has emptied his mind of a nagging task, placed it into a trusted system for processing, and casually returned to his conversation.

    艾伦已经脑子里烦人任务清掉了,把它们交给了信任机构处理,然后继续自己的谈话。

    youdao

  • Because these are trusted system classes, the bootstrap loader skips much of the validation that gets done for normal (untrusted) classes.

    因为这些可信系统所以引导程序装入器跳过了常规(不可信)类所大量验证

    youdao

  • You”l be on the ball more often, be able to move fludily from task to task and not get lost nearly as much with a trusted system at your side.

    出色,一个任务个任务灵活转换不会迷失信任的规划里。

    youdao

  • Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.

    可信主机用户希望登录远程计算机(可以可信系统)时,使用SSH基于主机身份验证

    youdao

  • The general consideration and primary planning on the construction of trusted system in the E- government extranet are introduced in the paper.

    介绍了建设国家政务外网网络信任体系初步构想,包括总体设计思想、总体逻辑结构、总体性能要求,以及值得注意问题。

    youdao

  • In other words, get all that stuff out of your head, and into your trusted system, so you don't have to worry about it while you focus on the task before you.

    换言之其他所有都抛出外,放进受托系统这样真正集中注意力做他们之前,就不用担心它们了。

    youdao

  • Events can potentially be raised by any code, and are frequently raised by highly trusted system code in response to user actions such as clicking a button.

    事件可能任何代码引发经常响应单击按钮用户操作高度信任系统代码不断引发。

    youdao

  • Trusted Execution supports the run-time integrity check whenever any command is executed, whereas the TCB mostly does the periodic checking of system integrity.

    可信执行支持每当执行任何命令时候执行运行时完整性检查TCB主要执行定期系统完整性检查

    youdao

  • Trusted Computing Base is an install-time option only and to enable TCB on an existing AIX machine, you need to reinstall the entire AIX operating system.

    可信计算基础只是一个安装选项并且若要现有的AIX计算机上启用TCB需要重新安装整个AIX操作系统。

    youdao

  • While this command provides useful information, we don't usually start with this unless a trusted administrator has already diagnosed that there is a memory issue of some kind on the system.

    尽管这个命令提供一些有价值信息,但是除非可信管理员已经诊断出系统中存在某种内存问题,否则我们通常不会首先使用这个命令。

    youdao

  • They might also want to restrict the network traffic in and out of their system, so that only the traffic from trusted sources can enter their system and only authorized traffic can go out.

    他们可能限制进出系统网络流量以便只有来自可信流量才可以进入其系统,以及只有授权的流量才可以出去

    youdao

  • The authorization data is issued by a server that belongs to the trusted computing base of the system and is considered secure in its administrative domain.

    授权数据那些属于系统可信计算基础服务器颁发的,因此管理域中可以认为是安全的。

    youdao

  • Consider the lack of an authoritative, trusted source or single system of record as an illustrative example.

    请考虑一下缺少权威性可信数据源单一记录系统,会怎么样?

    youdao

  • In Uganda, where villages often have one top-up phone run by a trusted operator, a basic system helps store and transfer money.

    乌干达每个村庄充值电话可信接线员管理,这基本系统帮助人们存款或转帐。

    youdao

  • The Trusted Execution environment feature requires AIX V6.1 as the operating system.

    可信执行环境功能要求将AIXV6.1作为操作系统

    youdao

  • There is always a clear mapping between any given system authorization ID used to establish a connection and a specific trusted context.

    用于建立连接任何给定系统授权id一个特定的受信任上下文之间总是一个明显映射

    youdao

  • But be careful; people on Main Street USA trusted people on Wall Street for a long time because the financial system seemed to be producing reliable results that were the envy of the world.

    当心时间以来美国大街信任华尔街的人,因为金融系统看上去正在产出让世界羡慕可靠结果

    youdao

  • For such a trusted entity, the hash value and signature are calculated and shipped as part of the their AIX installables and stored in TSD on the destination system.

    对于这样可信实体,对应的签名作为AIX安装文件的一部分进行计算和分发的,存储目标系统TSD中

    youdao

  • Trusted Execution can be considered a collection of a set of features that supervise the integrity of the system.

    可以可信执行视为监督系统完整性功能集合

    youdao

  • But this system trusted whatever ID was presented and so it was a simple matter to for the developer to present a different ID, even an administrative one.

    这个系统信任所提交任何ID对于开发人员来说,提交不同的ID非常简单甚至是管理ID。

    youdao

  • As a result, local applications were typically trusted with access to all system resources.

    因此本地应用程序通常受到信任可以访问所有系统资源

    youdao

  • This gives you the freedom to empower trusted project leaders to modify the system Settings (such as labels and category trees) as needed.

    这样需要的时候,就可以自由授权可信耐项目领导者修改这个系统设置(比如标签目录)。

    youdao

  • If a model cannot be trusted to tell you true things that you want to know about the software system that it represents, then it is worse than useless, since it can lead you to the wrong conclusions.

    如果一个模式不能表示软件系统准确的表现出来,那么不如不用模式,因为可能会导致错误的结论。

    youdao

  • The Solaris 10 operating system provides mandatory access controls through its security-enhanced Trusted Extensions component.

    Solaris10操作系统通过增强了安全性TrustedExtensions 组件提供了强制访问控制

    youdao

  • Park Kyung-joo, a Seoul resident on her way to a memorial site for Mr. Roh Sunday afternoon, said she barely trusted the justice system and resented the treatment Mr. Roh received in recent weeks.

    周日下午前往卢武铉吊唁地的汉城居民Park Kyung - joo基本不相信这样司法系统卢武铉几周受到待遇表示愤怒。

    youdao

  • TrustedBSD is a working project to develop trusted operating system extensions that are ultimately destined for the FreeBSD operating system.

    TrustedBSD一个正在进行中的项目,主要开发可靠操作系统扩展,这些扩展最终加入 FreeBSD 操作系统。

    youdao

  • In order for the system user to access any of the MDM Server components, it needs to authenticate to the J2EE container and establish a trusted channel.

    如果系统用户访问MDMServer组件需要J2EE容器提供凭证建立一个可信通道。

    youdao

  • In the trusted host name field, enter the name of the system that you wish to register as a trusted host (typically the physical server name, for instance servername).

    TrustedHostname字段中输入其注册可信主机系统名称(通常指的是物理服务器例如servername)。

    youdao

  • The trusted device network approach provides an organization with a higher level of control over critical system access.

    信任硬件网络策略提供了一种可以更高效控制临界系统接入组织结构

    youdao

  • The trusted device network approach provides an organization with a higher level of control over critical system access.

    信任硬件网络策略提供了一种可以更高效控制临界系统接入组织结构

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定