几乎每个现代操作系统都使用基于位屏蔽权限的模型,该模型基于主体和组按主体处理资源控制。
Nearly every modern OS makes use of a bit-masking permission-based model that deals with the control of resources by principals, based on principals and groups.
建议您用双引号将跟踪屏蔽括起来,以免操作系统shell对星号发生错误判断。
It is recommended that you enclose the trace mask with double quotation marks to avoid possible misinterpretation of the asterisk character by the operating-system shell.
即使操作系统自身也没有被屏蔽储存的完全访问权限,所以入侵者即便控制了操作系统信息也是安全的。
Even if the operating system itself are not shielded stored fully access control, so the invaders even operating system information is safe.
应用推荐