| 1. | Including privileged white doctors 包括那些有特权的白人医生 |
| 2. | I thought you were like that . i thought you were one of those privileged revolutionaries 我以前觉得你就是那样的有特权的革命分子 |
| 3. | As a rich and privileged person she has very little empathy with the people she claims to represent 作为一个富有且有特权的人,她和那些她所声称的代表没有多少共同的情感。 |
| 4. | Inequalities could also create an economic elite that may derail reforms to protect its privileged position 不平等也可以产生一个可能使出轨改革保护它的有特权的位置经济的精华。 |
| 5. | The students at shengda economics , trade and management college , in the quiet rural town of longhu , in the central province of henan , are among the most privileged in china 升达经贸管理学院的学生,住在中国最有特权的中部河南省龙湖的一个安静的小城里。 |
| 6. | A common example of this is an administrator , system program , or privileged server running your program while walking through parts of the file system controlled by ordinary users 这种情形的一个常见的例子是,运行您的程序的管理员、系统程序或者有特权的服务器正在遍历的是由普通用户控制的文件系统部分。 |
| 7. | But if multiple users can add files to a directory in a unix - like system , and you plan to add files to that directory from a privileged program , make sure that the 但是,在类unix系统中,如果多个用户都可以向同一目录添加文件,而且您计划通过一个有特权的程序向该目录添加文件,那么要确保为该目录设置“ sticky ”位。 |
| 8. | Another variation is creating and uncreating normal files the attacker is allowed to write , so that the privileged program creates an " internal " file that can sometimes be controlled by the attacker 这种做法的另一个变种是,创建和反创建攻击者可以进行写操作的普通文件,这样,攻击者有时就可以控制有特权的程序创建的“内部”文件。 |
| 9. | Round keys are taken from this expanded key in the following way : the first round key consists of the first nb nb block length words , the second one of the following nb words , and so on 安全性策略配置目标包括控制对数据的原始访问、保护内核和系统软件的完整性、防止有特权的进程执行危险的代码,以及限制由有特权的进程缺陷所导致的伤害。 |
| 10. | This is particularly true if you re not writing a privileged program ; if your program isn t privileged , it s safer to place temporary files inside that user s home directory , being careful to handle a root user who has " as their home directory 如果您不是在编写一个有特权的程序,那么这点尤其需要考虑;如果您的程序没有特权,那么将临时文件放置在用户目录内部会更安全一些(处理root用户时要当心,它以“ / ”作为其主目录) 。 |