| 1. | Represents the error that occurs when a report contains a security violation 表示报表包含安全冲突时出现的错误。 |
| 2. | Remote debugging with no authentication may leave the remote machine vulnerable to security violations 不带身份验证的远程调试可能会使远程计算机容易受到安全攻击。 |
| 3. | At run time , if the environment is partial - trust , you can get code - access security violations 在运行时,如果环境是部分受信任的,可能会发生违反代码访问规则的行为。 |
| 4. | The user did not receive all of the requested objects because of inaccessible resources other than security violations 由于资源无法访问(而不是安全性冲突) ,用户没有收到请求的所有对象。 |
| 5. | When incorporating components that require full - trust permissions to run , be aware that code - access security violations could occur 当引入需要完全信任权限才能运行的组件时,将产生一个问题。 |
| 6. | Objects to contain field escape characters and hidden code which can allow security violations . this method checks the literal fields of each 对象的标识符字段可能包含字段转义字符和隐藏代码,这些字符和代码会造成安全漏洞。 |
| 7. | Audit codes identify events that contain auditable information such as login attempts , access security violations , and authorization violations 审核代码标识包含可审核信息的事件,这些信息包括登录尝试、违反访问安全性和违反授权等等。 |
| 8. | In the process , it checks for all runtime configuration parameters and handles exceptions related to invalid url syntax , security violations , i o violations , and illegal arguments 在这一过程中,它检查所有的运行时配置参数,并处理与无效url语法、安全性违规、 i / o违规和无效参数有关的异常。 |
| 9. | In computer security , the use of security personnel to patrol work areas , particularly outside normal working hours , to detect intruders and unauthorized use of terminals , to check for security violations 计算机安全学中,安全人员在工作间内巡逻,特别是在正常工作时间以外的时间里检查入侵者、终端的非法使用及其它安全违章行为。 |
| 10. | They declared the likelihood was very low that user input could be successfully manipulated to reach a vulnerable buffer in such a way as to cause a security violation . then about a year later , a new cert advisory on wu - ftpd appeared 使用diceware选择的每个字提供大约12 . 9位的熵;不过,如果口令短语碰巧是个逻辑句子,或者它非常短,以至于可以通过蛮力打开,那么口令短语的熵就少一些。 |