您要查找的是不是:
- Security configuration is backed up to %1. 安全配置被备份到%251。
- Proper configuration of the trust relationships between WebSphere Application Server and Tivoli Access Manager WebSEAL is crucial to the creation of a secure configuration. 对WebSphere Application Server和Tivoli Access Manager WebSEAL之间的信任关系进行合理的配置是创建安全配置的关键所在。
- Security configuration and privilege mapping using grid map file. 安全配置,以及使用网格映射文件进行权限映射。
- In most cases, manually editing the security configuration files is not recommended. 多数情况下,不建议手动编辑安全配置文件。
- From the point of view of the XMLHttpRequest object, the interaction occurs within the existing security configuration. 从XMLHttpRequest对象的角度来看,这种交互发生在现有的安全配置之内。
- Describes the configuration schema for the machine configuration file, application configuration files, and the security configuration file. 描述计算机配置文件、应用程序配置文件和安全配置文件的配置架构。
- However, you can choose to temporarily deactivate a certificate while updating the security configuration for a service. 但是,您可以选择在更新某个服务的安全配置时暂时停用证书。
- Some of the steps in the following procedure don't provide specific configuration details for all of the pages in the Security Configuration Wizard. 以下过程中的某些步骤不能为安全配置向导的所有页面提供具体的配置细节。
- Security configuration files contain information about the code group hierarchy and permission sets associated with a policy level. 安全配置文件包含有关与策略级别关联的代码组层次结构和权限集的信息。
- Use the Security Configuration Wizard to reduce the susceptibility of Microsoft Windows environments to exploitation of security vulnerabilities. 使用安全配置向导可降低Microsoft Windows环境的安全漏洞被利用的可能性。
- Save your changes and close the Security Configurator. 无需变化关闭安全配置。
- NTFS helps provide file protection based on users and groups, and only allows users with administrative privileges for a particular level to edit security configuration files. NTFS帮助提供基于用户和组的文件保护,并且只允许具有特定级别的管理特权的用户来编辑安全配置文件。
- Periodically audit the application to determine that the security configuration is unchanged, and that the security configuration meets the business needs for the application. 定期审核应用程序,以确定安全配置未被更改并且安全配置满足应用程序的业务需要。
- Each instance is treated like a separate entity: each has its own Master database, its own security configuration, and its own place on disk and in memory. 每个实例都被视为独立的实体:每个实例具有其自己的Master数据库、其自己的安全性配置以及其自己的磁盘和内存中的位置。
- The local security settings database cannot be edited from the Security Configuration and Analysis snap-in. Use the Group Policy snap-in to edit the local security settings. 无法从安全配置和分析管理单元编辑本地安全设置数据库。请用组策略管理单元编辑本地安全设置。
- We'll need to secure a bank loan. 我们需获银行贷款。
- A climber needs secure footholds. 攀登的人脚踩的地方要很牢固。
- The child felt secure near its parents. 这个孩子在父母跟前感到很安全。
- Make the windows secure before leaving the house. 出门之前把窗户关严。
- The little boy felt secure near his parents. 那小男孩在父母身边感到安心。