授權的用戶 的英文怎麼說
中文拼音 [shòuquándeyònghù]
授權的用戶
英文
authorized user- 授 : Ⅰ動詞1. (交付; 給予) award; vest; confer; give 2. (傳授; 教) teach; instruct Ⅱ名詞(姓氏) a surname
- 權 : Ⅰ名詞1 [書面語] (秤錘) counterpoise; weight (of a steelyard)2 (權力) power; authority 3 (...
- 的 : 4次方是 The fourth power of 2 is direction
- 用 : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
- 戶 : 名詞1 (單扇的門 泛指門) one panelled door; door 2 (人家; 住戶) household; family 3 (門第) f...
- 授權 : empower; authorize; warrant
- 用戶 : user; subscriber; consumer; party; purchasers; abonement
-
A flaw could make it possible for an unprivileged user to cause the handler routine to run in the security context of localsystem
缺陷可使未授權的用戶能夠在「 localsystem 」的安全環境中運行處理程序常式。And can be modified only by authorized users
,只能由已經授權的用戶修改。Also, the key must be kept secret from unauthorized users
並且,密鑰必須對未經授權的用戶保密。An unauthorized user id must not be able to launch an application
未經授權的用戶id必須禁止啟動應用程序。This will deny unauthenticated users the right to access the report server
這將拒絕未授權的用戶對報表服務器的訪問。Caching may allow unauthorized users or processes to read sensitive data
緩存可能允許未經授權的用戶或進程讀取敏感數據。Cleverlearn grants users free access to selected online english learning products
Cleverlearn授權的用戶可以免費選擇網上的英語學習產品How can i restrict access for a single web service to authorized users roles
:我怎樣才能把對單個web服務的訪問限制到經過授權的用戶角色?This backdoor capability allows unauthorized users to access and manipulate infected systems
后門功能可使未經授權的用戶訪問並控制受感染的機器。These features block unauthorized users from making changes to protected parts of a document
這些功能可以阻止未經授權的用戶更改文檔中受保護的部分。The asp. net configuration system helps protect configuration files from access by unauthorized users
Asp . net配置系統有助於防止未經授權的用戶訪問配置文件。Like employees, these authorized users may obtain confidential passwords or find other ways of committing computer crimes
像雇員一樣,這些授權的用戶可能獲取秘密口令,或者找到進行計算機犯罪的其他途徑。A unique string of characters input by an authorized user in order to gain access to a system or to protected information in the system. passwords are usually not displayed on terminal screen upon input, in order to preserve their secrecy
被授權的用戶為取得對系統或系統中被保護的信息的存取權而輸入給系統的專門的字元串。為使口令字保密,輸入時口令字一般不在終端屏幕上顯示出來。In data security, the transmission of data to unauthorized users by processes with legitimate access to data. a compiler, for example, could leak a proprietary program whilst it is being compiled
在數據保密學中,通過合法訪問數據的進程將數據傳輸給未授權的用戶的過程。例如,編譯程序在編譯期間便可能泄漏專用程序。Code - access - permission objects are used to protect resources and operations from use by unauthorized users
代碼訪問權限對象用於保護資源和操作,以免被未經授權的用戶使用。When you use the export feature of web parts, sensitive data could potentially be exported to unauthorized users
使用web部件的導出功能時,可能會將敏感數據導出給未經授權的用戶。In data security, the transmission of data to unauthorized users by processes with legitimate access to data
在數據保密學中,通過合法訪問數據的進程將數據傳輸給未授權的用戶的過程。By maintaining a low false reject rate ( the probability that the device will reject an authorized user ), while maintaining a high deterrent to unauthorized access, rsi ' s units process large numbers of people with minimal delays
由此維持很低拒識率(設備可能拒絕一個授權的用戶) ,當維持很低誤識率, rsi的設備最小延誤大數量人的處理時間。In our weblog, for instance, visitors should be able to read entries and perhaps submit feedback, but only authorized users should be able to post new entries or edit existing content
例如,在我們的weblog中,訪問者應該能夠閱讀各項,也許還應該能夠提交反饋,但只有經過授權的用戶才能公布新項,或編輯已有內容。Three means exists in current defencing the overrun of stack : overwriting contents in stack with too long arguments is not allowed ; overwriting is allowed but unauthorized change of control flow is not allowed ; change of control flow is allowed but execution of injected code is prevented
在理論上存在三類方法檢測堆棧溢出:不允許用超長的輸入參數覆蓋返回地址;允許返回地址被覆蓋,但不允許控制流轉向非授權的用戶;允許控制流轉向非授權的用戶,但不允許其可執行代碼被運行。分享友人