Listing 3 shows an example of a USER Not Authenticated or FAKED USER error that occurs if you run a program to access a guard point after logging in via a non-authorized login method.
清单3显示了一个USER Not Authenticated或FAKED USER错误的例子,当您通过不支持的登录方法登录并运行访问保护点的程序之后,就会出现此类错误。
2
A method call which looks innocuous on the surface, for example, may access the file system at some point during its execution.
例如,表面上看似无害的方法调用可能会在其执行过程中的某一点访问文件系统。
3
The main point under the design of access control management system and video monitor system for safeguard of IDC is introduced according to a project of IDC, as well as the design method.