privileged user 中文意思是什麼

privileged user 解釋
特許使用者
  • privileged : adj. 1. 特權的;有特權的;特殊待遇的。2. 特許的;專用的。3. 特免的;(由於特殊情況)不受一般法規制約的。4. 【天主教】(祭壇等)慶祝大赦的彌撒中特設的。
  • user : n. 1. 使用者,用戶。2. 吸毒成癮者。n. 【法律】(財產等的)使用(權),行使(權),享受(權),享有(權)。
  1. In this type of threat, an unprivileged user gains privileged access and thereby has sufficient access to compromise or destroy the entire system

    在這種威脅中,無特權的用戶獲得特權,因此可以通過訪問來威脅或破壞整個系統。
  2. In the cli, the default privileged exec mode prompt is switch #. in user exec mode the prompt is switch >

    一臺交換器可以預先組態成進入使用者執行模式或特權執行模式只需要輸入密碼。交換器組態模式是經由特權執行模式進入的。
  3. A switch may be preconfigured and only passwords may need to be entered for the user exec or privileged exec modes. switch configuration mode is entered from privileged exec mode

    一臺交換器可以預先組態成進入使用者執行模式或特權執行模式只需要輸入密碼。交換器組態模式是經由特權執行模式進入的。
  4. There will be circumstances where physical access to the switch can be achieved, but access to the user or privileged exec mode cannot be gained because the passwords are not known or have been forgotten

    會有一些情況必須實際存取交換器,但因為不知道或忘掉密碼,就不能夠取得存取使用者或特權的執行模式的權力。
  5. Create a low - privileged domain user account with read - only permissions

    創建具有隻讀權限的低特權域用戶帳戶。
  6. After the analysis of the typical instance of the security attack on the unix operating system, it can be concluded that the discretionary accessing mechanism and the implementation of the privileged super - user are both the source of the security problems of the unix

    本文通過重點分析針對unix操作系統的一些攻擊實例,指出現有的unix操作系統自主訪問機制和超級用戶特權實現方式是最主要的安全問題。
  7. The per - user version stores user customizations in a file in the user s home directory ; the site - wide version can store user customizations in a mysql database so that spamassassin can access customizations without requiring privileged access to user files

    每用戶( per - user )版本將用戶定製存儲到用戶主目錄的一個文件中;站點范圍( site - wide )版本可以將用戶定製存儲到mysql數據庫中,以便spamassassin可以訪問定製,而不必請求對用戶文件的特權訪問。
  8. Many of these transition into privileged mode, perform the operation, and smoothly return to user mode

    很多這些常式都轉換為特權模式,執行該操作,然後平穩地返回到用戶模式。
  9. Windows uses several different protection mechanisms, and at the root of them all is the distinction between user mode and privileged mode

    Windows使用了幾種不同的保護機制,所有這些機制的根本是用戶模式與特權模式之間的區別。
  10. Windows nt uses several different protection mechanisms, and at the root of them all is the distinction between user mode and privileged mode

    Windows nt使用多種不同的保護機制,所有這些機制的根本是用戶模式和特權模式之間的區別。
  11. Can be run as a non - privileged user

    就安全性而言,可以以非特權用戶運行
  12. Account acts as a non - privileged user on the local computer, and presents anonymous credentials to any remote server

    帳戶用作本地計算機上的非特權用戶,向任何遠程服務器顯示匿名憑據。
  13. Lastly, you need to add users or user groups to the privileged user role by clicking add and using the search interface

    最後,需要通過單擊add並使用所有界面,將用戶或用戶組添加到privileged user角色。
  14. Sql server browser should be run in the security context of a low - privileged user to minimize exposure to a malicious attack

    Sql server瀏覽器應該在低特權用戶的安全上下文中運行,以將受到惡意攻擊的幾率降到最低。
  15. Sql server browser should be run in the security context of a low privileged user to minimize exposure to a malicious attack

    Sql server瀏覽器應該在低特權用戶的安全上下文中運行,以將受到惡意攻擊的幾率降到最低。
  16. A user that is download privileged will usually have their files queued before the those of users who are not download privileged

    答:擁有下載特權的人的文件會比沒有的人排隊更靠前。
  17. A : a user that is download privileged will usually have their files queued before the those of users who are not download privileged

    答:擁有下載特權的人的文件會比沒有的人排隊更靠前。
  18. The most desirable way is to run the server process itself as a non - privileged unix user so it cannot bring down the entire system if the database is compromised

    最好的辦法是以無特權的unix用戶運行服務器進程本身,這樣如果一個數據庫被泄露,也不至於擊垮整個系統。
  19. Which runs in the context of an account that acts as a non - privileged user on the local computer, and presents the computer s credentials to any remote server

    ,該類型在用作本地計算機上的非特權用戶並向任意遠程服務器顯示計算機憑據的帳戶的上下文中運行。
分享友人