unauthorized user造句
例句與造句
- Data whose meaning is concealed from unauthorized users
對于非授權(quán)用戶其意義是隱蔽的數(shù)據(jù)。 - Also , the key must be kept secret from unauthorized users
并且,密鑰必須對未經(jīng)授權(quán)的用戶保密。 - An unauthorized user id must not be able to launch an application
未經(jīng)授權(quán)的用戶id必須禁止啟動應(yīng)用程序。 - Caching may allow unauthorized users or processes to read sensitive data
緩存可能允許未經(jīng)授權(quán)的用戶或進(jìn)程讀取敏感數(shù)據(jù)。 - This backdoor capability allows unauthorized users to access and manipulate infected systems
后門功能可使未經(jīng)授權(quán)的用戶訪問并控制受感染的機(jī)器。 - It's difficult to find unauthorized user in a sentence. 用unauthorized user造句挺難的
- These features block unauthorized users from making changes to protected parts of a document
這些功能可以阻止未經(jīng)授權(quán)的用戶更改文檔中受保護(hù)的部分。 - The asp . net configuration system helps protect configuration files from access by unauthorized users
Asp . net配置系統(tǒng)有助于防止未經(jīng)授權(quán)的用戶訪問配置文件。 - Code - access - permission objects are used to protect resources and operations from use by unauthorized users
代碼訪問權(quán)限對象用于保護(hù)資源和操作,以免被未經(jīng)授權(quán)的用戶使用。 - When you use the export feature of web parts , sensitive data could potentially be exported to unauthorized users
使用web部件的導(dǎo)出功能時,可能會將敏感數(shù)據(jù)導(dǎo)出給未經(jīng)授權(quán)的用戶。 - In data security , the transmission of data to unauthorized users by processes with legitimate access to data
在數(shù)據(jù)保密學(xué)中,通過合法訪問數(shù)據(jù)的進(jìn)程將數(shù)據(jù)傳輸給未授權(quán)的用戶的過程。 - Physical access to your servers and your databases may be compromised allowing an unauthorized user to access them
對服務(wù)器和數(shù)據(jù)庫的物理訪問可能受到危害,使未授權(quán)用戶得以訪問它們。 - A vulnerability that could allow an unauthorized user to learn the location of cached content on your computer
一個漏洞,該漏洞能夠使未經(jīng)授權(quán)的用戶可以獲知您計(jì)算機(jī)上緩存的內(nèi)容的位置。 - To avoid unauthorized users from deleting build drops , it is not recommend establishing delete permissions on the share
為防止未授權(quán)的用戶刪除生成放置的文件,不建議對共享授予刪除權(quán)限。 - It is intended to prevent an incorrect restore using sql server 2005 tools by authorized or unauthorized users
它旨在防止經(jīng)過授權(quán)的用戶和未經(jīng)授權(quán)的用戶使用sql server 2005工具執(zhí)行不正確的還原操作。 - Systems that do not use the ntfs file system create security weaknesses by allowing unauthorized users to modify security policy
不使用ntfs文件系統(tǒng)的系統(tǒng)會允許未經(jīng)授權(quán)的用戶修改安全策略,因而具有安全弱點(diǎn)。
更多例句: 下一頁