如果受攻击的程序是由系统管理员启动的,那么恶意代码将作为原始程序的一部分进行执行,给黑客系统中的管理员特权。
If the attacked program was initiated by a system administrator, the malicious code will then run as a part of the original program, giving the attacker administrator privileges on the system.
提供者创建的受管对象包含与 JDBC 包装器(由容器提供的连接池管理器添加)相似的自动征用代码。
The managed objects created by the provider contain similar auto-enlistment code as the JDBC wrapper added by the container-supplied connection pool manager.
“受信任的代码”在控制区域中运行,用户应用程序代码在服务区域中运行,从而将应用程序执行与事务管理完全隔离。
"Trusted code" runs in the control region, user application code runs in the servant region, which completely isolates application execution and transaction management.
应用推荐