您要查找的是不是:
- Security configuration is backed up to %1. 安全配置被备份到%251。
- Security configuration and privilege mapping using grid map file. 安全配置,以及使用网格映射文件进行权限映射。
- In most cases, manually editing the security configuration files is not recommended. 多数情况下,不建议手动编辑安全配置文件。
- From the point of view of the XMLHttpRequest object, the interaction occurs within the existing security configuration. 从XMLHttpRequest对象的角度来看,这种交互发生在现有的安全配置之内。
- Describes the configuration schema for the machine configuration file, application configuration files, and the security configuration file. 描述计算机配置文件、应用程序配置文件和安全配置文件的配置架构。
- However, you can choose to temporarily deactivate a certificate while updating the security configuration for a service. 但是,您可以选择在更新某个服务的安全配置时暂时停用证书。
- Some of the steps in the following procedure don't provide specific configuration details for all of the pages in the Security Configuration Wizard. 以下过程中的某些步骤不能为安全配置向导的所有页面提供具体的配置细节。
- Security configuration files contain information about the code group hierarchy and permission sets associated with a policy level. 安全配置文件包含有关与策略级别关联的代码组层次结构和权限集的信息。
- Use the Security Configuration Wizard to reduce the susceptibility of Microsoft Windows environments to exploitation of security vulnerabilities. 使用安全配置向导可降低Microsoft Windows环境的安全漏洞被利用的可能性。
- Save your changes and close the Security Configurator. 无需变化关闭安全配置。
- NTFS helps provide file protection based on users and groups, and only allows users with administrative privileges for a particular level to edit security configuration files. NTFS帮助提供基于用户和组的文件保护,并且只允许具有特定级别的管理特权的用户来编辑安全配置文件。
- Periodically audit the application to determine that the security configuration is unchanged, and that the security configuration meets the business needs for the application. 定期审核应用程序,以确定安全配置未被更改并且安全配置满足应用程序的业务需要。
- Each instance is treated like a separate entity: each has its own Master database, its own security configuration, and its own place on disk and in memory. 每个实例都被视为独立的实体:每个实例具有其自己的Master数据库、其自己的安全性配置以及其自己的磁盘和内存中的位置。
- The local security settings database cannot be edited from the Security Configuration and Analysis snap-in. Use the Group Policy snap-in to edit the local security settings. 无法从安全配置和分析管理单元编辑本地安全设置数据库。请用组策略管理单元编辑本地安全设置。
- Checking the location and granting trust at each build enables you to move projects and share projects without having to change the security configuration of the computer manually each time. 如果在每次生成时检查位置并授予信任,则可以移动和共享项目,而不必每次手动更改计算机的安全配置。
- Implement, configure, manage, and troubleshoot security by using the Security Configuration Tool Set. 使用安全配置工具集来实现、配置、管理和解决安全性问题。
- Using the way of identify verification of cookie and combining varieties of encrypted technique and perfect security configuration of operating system can provide enough support of many needing security verification application. 使用cookie的身份验证方法再结合各种加密手段以及操作系统完善的安全配置就可以为大多数需要安全认证的应用提供足够的支持。
- Despite the current paragraph 09 Camry did not carry out interior and exterior changes, but adding three security configuration utility, making the cost Camry once again be raised. 尽管此次09款凯美瑞并没有对外观和内饰进行改动,但是加入的三项实用安全配置,使得凯美瑞的性价比再一次得到提升。
- Proper configuration of the trust relationships between WebSphere Application Server and Tivoli Access Manager WebSEAL is crucial to the creation of a secure configuration. 对WebSphere Application Server和Tivoli Access Manager WebSEAL之间的信任关系进行合理的配置是创建安全配置的关键所在。
- Therefore, only the databases that participate in the conversation must have dialog security configured. 因此,只有参与会话的数据库必须配置对话安全模式。