By default, a restricted environment is employed, granting an application limited access to the network and the local machine.
缺省的,使用受限环境,为应用程序授权对网络和本地机的有限的访问。
2
Machine-based threats are less likely than network threats because access to the machine in production is usually restricted.
基于计算机的威胁比网络威胁的可能性小,因为生产环境中的计算机通常是限制访问的。
3
You can use the Debug perspective of your Eclipse installation to debug problems arising on a workbench instance running on any machine to which you have networkaccess.