单词 | untrusted | ||||||||||||
释义 | untrusted
更多释义 收起释义 例句释义: 不可信的,不受信任,不信任 1. For untrusted XAML, you should treat it generally the same as if it were untrusted code. 对于不受信任的XAML,通常应将其视同为不受信任的代码。 technet.microsoft.com 2. The next step that we need to do is to make sure that our children will not be able to open untrusted web sites. 下一步我们要做的是确保孩子不能打开不信任网站。 www.bing.com 3. If you try to attach to a process owned by an untrusted user account, a security warning dialog confirmation will appear. 如果试图附加到不受信任的用户帐户拥有的进程,则会出现安全警告对话框确认。 msdn2.microsoft.com 4. Security Warning: Attaching to a process owned by an untrusted user can be dangerous. 安全警告:附加到不可信用户拥有的进程可能存在危险。 technet.microsoft.com 5. Untrusted - The application is not allowed to access any of the Operating system resources. 不可信的-应用程序是不允许访问任何操作系统的资源。 bbs.kafan.cn 6. Clearly, you want to consider some sort of security model to limit the loading of untrusted resources. 显然,您需要考虑某种安全模型以限制不可信资源的加载。 www.ibm.com 7. In the most general sense, untrusted XAML is any XAML source that your application did not specifically include or emit. 一般来说,不受信任的XAML是应用程序未明确包含或发出的任何XAML源。 technet.microsoft.com 8. The Linden Lab approach appears to be to focus on a secure protocol such that untrusted clients are not a threat, and publish everything. LindenLab方法就在重点开发一种安全协议,使不信任的客户机不再会成为威胁,并可以发布任何内容。 www.ibm.com 9. Some methods might not be suitable to allow arbitrary untrusted code to call. 某些方法可能不适合被任意的不受信任代码调用。 msdn2.microsoft.com 10. If you rely on MAC addresses, processor IDs, or cookies, remember that they are essentially self-reported by an untrusted client. 如果您依赖于MAC地址、处理器标识或cookie,请记住它们本质上是由一个不可信的客户机自我报告的。 www.ibm.com 1. We recommend that you do not attach or restore databases from unknown or untrusted sources. 建议您不要附加来自未知或不可信来源的数据库。 msdn2.microsoft.com 2. You can scrub user inputs by escaping untrusted data before allowing it to be inserted into HTML element content and HTML common attributes. 通过在允许非信任的数据被插入到HTML元素内容和HTML公共属性之前先进行转义,可以清理用户输入。 www.ibm.com 3. Untrusted code is not typically allowed to update application settings. 不受信任的代码通常不允许对应用程序设置进行更新。 msdn2.microsoft.com 4. Whenever you get information from an untrusted source, take steps to be sure it does not contain any executable code. 每当您从不可信的信息源获得信息时,都要采取步骤确保它不包含任何可执行代码。 msdn2.microsoft.com 5. check that the user is granted permissions to signed content (untrusted authority as well). 检查用户是否拥有对被签名的和非信任的内容进行访问的权限。 wiki.redsaga.com 6. You can solve this problem by: a. Convert the system back to an "untrusted" st ate through SAM. 你可以通过下面的步骤解决这个问题:a。通过SAM将系统转换回“不可信”状态。 e-support.hp.com.cn 7. Do not enable DTD processing if you are concerned about denial of service issues or if you are dealing with untrusted sources. 如果您担心出现拒绝服务问题或要处理非信任源,请不要启用DTD处理。 msdn2.microsoft.com 8. For this system to work, the protected hash must be encrypted or kept secret from all untrusted parties. 为使此系统发挥作用,必须对受保护的哈希值进行加密或将该哈希值对所有不受信任的用户保密。 technet.microsoft.com 9. User input is actually harder to make safe because there is no stack frame to trace the presence of the potentially untrusted data. 实际上,使用者输入的安全比较不易维护,因为这种资料没有堆叠框架可以追踪潜在的未受信任资料是否存在。 technet.microsoft.com 10. This mode is designed to enable untrusted reports that use untrusted processing extensions to run securely. 此模式旨在允许安全执行那些使用不可信处理扩展插件的不可信报表。 msdn2.microsoft.com 1. Applications that transmit confidential or sensitive data, or that transmit messages over untrusted networks, should use dialog security. 传输保密或敏感数据的应用程序或者在不可信的网络上传输消息的应用程序应使用对话安全模式。 msdn2.microsoft.com 2. The zonename argument can be one of the following values: MyComputer, Intranet, Trusted, Internet, or Untrusted. zonename参数可以是下列值之一:MyComputer、Intranet、Trusted、Internet或Untrusted。 msdn2.microsoft.com 3. In most cases, this network is the Internet, which must be considered untrusted. 在大多数情况下,这个网络即互联网,必须被看作是不可信的。 www.infoq.com 4. The Java language was designed from day one to allow the execution of untrusted, potentially malicious code in a secure sandbox. 设计Java语言之初就是为了允许在一个安全沙箱中运行不信任的、潜在恶意的代码。 www.ibm.com 5. Madam wilson: don't waste your time. I don't be willing to do with untrusted people. 威尔森夫人:我不想跟无信之人合作,不要白费力气了。 blog.sina.com.cn 6. You can use WSS to protect the authenticity, integrity, and confidentiality of messages from untrusted network and transport intermediaries. 可用WSS防止消息的真实性、完整性和机密性受到不可靠网络和传输中介的攻击。 www.ibm.com 7. Also it will give all the capabilities to the installed app. Warning: Installing a program from untrusted sources is dangerous. 此外它将使所有的能力,已安装的应用程序。警告:安装程序不被信任的来源是很危险的。 dictsearch.appspot.com 8. This content model information should not be exposed in untrusted scenarios. 此内容模型信息不应在不受信任的情况下公开。 msdn2.microsoft.com 9. SQL injection is easier to beat; you simply need to properly escape each piece of untrusted data before building your query. 相比之下,SQL入侵更容易对付。您只需在构造查询之前,适当地排除每块不受信任的数据。 www-128.ibm.com 10. Trusted processes, in contrast, are aware of DIFC and set up the privacy and integrity controls that constrain untrusted processes. 另一方面,受信任的进程知道系统中存在DIFC,它们设立隐私及数据完整性控制来约束不受信任的进程。 www.infoq.com 1. This allows an untrusted component use the class, but does not allow it to retrieve and directly use the XmlResolver object. 这样,将允许不可信的组件使用该类,但是不允许检索和直接使用XmlResolver对象。 msdn2.microsoft.com 2. To help avoid this problem, never grant UnmanagedCode permission to untrusted code. 若要避免此问题,请不要为不受信任的代码授予UnmanagedCode权限。 msdn2.microsoft.com 3. All messages in transit should be protected from tampering by untrusted intermediaries. 应该防止传输中的所有消息受到不可靠中介的篡改。 www.ibm.com 4. The first line of defense in a secure program is to check every untrusted input. 安全的程序中第一道防线是检查每一个不可信的输入。 www.ibm.com 5. All it takes is an application with some dynamically constructed SQL and untrusted user input. 它所利用的只是具有一些动态构造的SQL和不可信用户输入的应用程序。 www.cnblogs.com 6. Loading symbols from untrusted locations can have harmful effects, as described in the previous Security Note. 如前面的“安全说明”所述,从不可信位置加载符号可能产生有害作用。 technet.microsoft.com 7. A trusted contact's information always includes a certificate; untrusted contacts don't have certificates. 受信任的联系人的信息始终包含证书;不受信任的联系人则没有证书。 windowshelp.microsoft.com 8. Unfortunately, encoding all untrusted data can be resource intensive and may have a performance impact on some Web servers. 遗憾的是,对所有不可信数据编码是资源密集型的工作,而且可能对某些Web服务器产生性能方面的影响。 www.ibm.com 9. Input validation and sanitation filter out all possible active or malicious content from untrusted input. 输入验证和数据消毒会从不可信的输入中过滤掉所有可能的活动或恶意的内容。 www.ibm.com 10. Outlook includes an object model guard that helps prevent untrusted code from accessing the Outlook object model. Outlook包含一个对象模型保护,它可以帮助防止不受信任的代码访问Outlook对象模型。 msdn2.microsoft.com 1. Property should not be exposed in untrusted scenarios. 属性不应在不受信任的情况下公开。 msdn2.microsoft.com 2. (However, if you're still building up other parts of the query based on untrusted input, you're still at risk). (然而,如果您仍然将查询的其他部分建立在不受信任的输入之上,那么就仍然存在风险)。 www.ibm.com 3. Some of the experiments were carried out while the access point was connected to a firewall such that it is considered untrusted. 在访问节点连接到防火墙从而被视为不受信任的情况下,完成了一些实验。 blog.sina.com.cn 4. The contact list application is outside the firewall, so trusted and untrusted users can connect to it. 联系列表应用程序在防火墙之外,因此受信任的用户和不受信任的用户都可以连接到这个应用程序。 www.ibm.com 5. By default, Access opens all older untrusted databases in Disabled mode and keeps them in that state. 默认情况下,Access在禁用模式下打开所有低版本的不受信任数据库,并使它们保持在该状态下。 office.microsoft.com 6. The principal security requirement is that untrusted code should not be able to change the logging configuration. 为了保证安全,日志操作需要保证不受信的代码无法修改日志控制配置。 blog.sina.com.cn 7. Be extremely careful if your trusted program will share a directory with potentially untrusted users. 如果您可信任的程序将要与潜在的非信任用户共享一个目录,那么要特别小心。 www.ibm.com 8. Configure a security appliance to restrict inbound traffic from untrusted sources. 使用安全设备限制从非信任区域进入的流量。 blog.kaila.com.cn 9. unlike transparent mode, the trusted and untrusted interfaces are on different subnets. 与透明的模式,值得信赖的和不可信的接口在不同的子网。 blog.ixpub.net 10. As usual, be cautious when you open attachments from untrusted sources and make sure your antivirus software is up to date. 通常情况下在打开不明来源的附件时要小心谨慎,同时要确保反病毒软件病毒库的更新。 www.cnbeta.com 1. You should consider each of these inputs when you're writing your program, and if they are untrusted, carefully filter them. 当您编写程序的时候这些输入每一个都应该考虑,如果它们不可信,一定要谨慎对它们进行过滤。 www.ibm.com 2. Untrusted processes do most of the computation. They are constrained by, but possibly unaware of, DIFC controls. 不受信任的进程完成大部分工作,它们受到DIFC控制的约束,且有可能自身并不知道DIFC的存在。 www.infoq.com 3. Interoperation services prevent untrusted, managed code from accessing unmanaged code. 交互操作服务禁止不受信任的托管代码访问非托管代码。 msdn2.microsoft.com 4. If you suspect that the linked files may be from an untrusted source, click No in this message. 如果您怀疑链接的文件可能来自不受信任的源,请单击此消息中的“否”。 office.microsoft.com 5. Not all unsigned programs can be installed e. g. if supplier is untrusted. 但并不是所有的未签名软件都可以安装,比如不被信任的供应商提供的。 www.minisoyo.com 6. The root certificate is untrusted. Do you wish to trust the root certificate on this machine and complete the installation? 根目录证书没有被信任。您想要信任此机器上的根目录证书并完成安装吗? angel.w15.5tom.cn 7. Be careful when attaching to an untrusted users process: when you do so, you assume that it is trustworthy. 附加到非信任用户的进程时要小心:当这样做时,您假定它是可以信赖的。 msdn2.microsoft.com 8. You can use the Availability service in cross-forest topologies across trusted or untrusted forests. 可以在跨受信任的或不受信任的林的跨林拓扑中使用可用性服务。 technet.microsoft.com 9. A sandbox is intended to stop untrusted code from behaving badly. 沙箱技术旨在阻止不受信任的代码执行恶意操作。 shi-wei.net 10. Running untrusted executables may compromise your system's security. 执行不可信的可执行档案可能危及您系统的安全。 translations.launchpad.net 1. Sometimes your program will take data from an untrusted user and give it to another user. 有时候您的程序要从一个不信任的用户处得到数据并把它传给其他的用户。 www.ibm.com 2. Do not use themes from an untrusted source. 不要使用来自不受信任的源的主题。 msdn2.microsoft.com 3. It is a security risk to open a program database (PDB) file from an untrusted source. 打开来自不受信任的源的程序数据库(PDB)文件会带来安全风险。 technet.microsoft.com 4. SSL is used to provide an additional level of security across the untrusted network. SSL用于在不可信网络中提供附加安全级别。 www.ibm.com 5. You should ensure that untrusted users do not have permissions to modify or replace the document on the share. 应当确保不受信任的用户不具有修改或替换共享中的文档的权限。 msdn2.microsoft.com 6. An untrusted process containing malicious code has the potential to damage the machine doing the debugging. 包含恶意代码的不受信任的进程可能会损害进行调试的计算机。 msdn2.microsoft.com 7. Disable DTD processing if you are concerned about Denial of Service issues or if you are dealing with untrusted sources. 如果担心出现拒绝服务问题或者正在处理不受信任的源,则应禁用DTD处理。 msdn2.microsoft.com 8. ODRL can be used within trusted and untrusted systems for both digital and physical assets. ODRL可用于可信和非可信系统中的数字和实体形式的资源。 www.ibm.com 9. By default, the proxying process allows the use of an untrusted security certificate to create a secure HTTPS connection. 默认情况下,代理进程允许使用不受信任的安全证书来创建安全的HTTPS连接。 www.microsoft.com 10. When you decide what information to provide through this method, consider whether your class or struct will ever be used by untrusted code. 当您决定通过此方法提供的信息的类型时,应考虑您的类或结构是否会被不受信任的代码使用。 msdn2.microsoft.com 1. Do not use a base URI from an untrusted source. 不要使用来自非信任源的基URI。 msdn2.microsoft.com 2. The debugger must execute the following untrusted command to obtain source code from the source server. 调试程序必须执行此不受信任的命令以从源服务器获取源代码。 technet.microsoft.com 3. Untrusted packages could compromise your system's security. 不可信的软件可能会危害您的系统安全。 translations.launchpad.net 4. Adding references from an untrusted source may compromise security. 添加来自不受信任源的引用可能会降低安全性。 207.46.16.251 5. They are all focused with sending change sets across untrusted boundaries, which doesn't make a whole lot of sense. 它们都集中在通过不可信边界发送更改集合,也并没有太大意义。 www.infoq.com 6. It's a good practice to use the as much as possible to confine untrusted external contents. 尽可能多地限制不可信的外部内容是一个良好的实践。 www.ibm.com 7. In addition, the end users cannot change security options within Office to permit untrusted code to run. 此外,最终用户无法在Office中更改安全选项以允许不受信任的代码运行。 msdn2.microsoft.com 8. New popup dialog on new "Program Files" folder making by untrusted process. 新的新的“程序文件”文件夹弹出的对话框决策过程的不信任。 bbs.kafan.cn 9. Screen Shot: A dialog box appears to block an untrusted USB memory stick activity. 屏幕开枪:出现对话框,以阻止来路不明的usb记忆棒的活动。 bbs.kafan.cn 10. When coding your database routines the assumption should be that all data passed to them is from an untrusted source. 在编写数据库程序的代码时,应当假设所有传递给它们的数据都来自于未受信任的来源。 shi-wei.net 1. For example, a trusted program could create a file in such a directory, and an untrusted user could delete and rename. 例如,一个可信任的程序可以在这样一个目录下创建一个文件,而一个不受信任的用户可以删除或者重命名它。 www.ibm.com 2. Thus, you need to ruthlessly check data on all input paths into your program from untrusted sources. 因而,您需要对来自于不可信源的输入路径的数据进行严格的检查。 www.ibm.com 3. It is a security risk to open a PDB file from an untrusted source. 打开来自不受信任的源的PDB文件是一种安全风险。 msdn2.microsoft.com 4. Ruthlessly check the untrusted inputs. 严格检查不可信的输入。 www.ibm.com 5. If you can, don't place files in directories that can be shared with untrusted users. 如果可以,不要将文件放置在可以由不信任用户共享的目录中。 www.ibm.com 6. Block Untrusted USB Memory Stick Activity in Office. 座来路不明的usb记忆棒活动办公室。 bbs.kafan.cn 7. This helps to protect the XmlReader against schema-based attacks when it is processing XML data from an untrusted source. 这样,在处理来自不可信的源的XML数据时,可以帮助防止XmlReader受到基于架构的攻击。 msdn2.microsoft.com 8. The outsourcing storage is not just untrusted, but also needs to be paid for before you use it. 外包存储这个环境,不仅是不可信的,而且是需要付费使用的。 www.fabiao.net 9. It's not going far enough to isolate untrusted code that a user might run from their desktop. 对于隔离用户可能从桌面运行的未授信代码,我们做得还远远不够。 shi-wei.net 10. Don't trust file contents that can be controlled by untrusted users. 不要信任可以被不可信用户控制的文件内容。 www.ibm.com 1. It's not going far enough to isolate untrusted code that a user might run from their desktop. 对于隔离用户可能从桌面运行的未授信代码,我们做得还远远不够。 shi-wei.net 2. Don't trust file contents that can be controlled by untrusted users. 不要信任可以被不可信用户控制的文件内容。 www.ibm.com 3. The registry value can also manage untrusted signatures of signed packages. 注册表值还可以管理签名包的不可信签名。 msdn2.microsoft.com 4. Copying files over an untrusted network should be done with scp (secure copy), and in fact Knoppix won't let you use anything else. 在不信任的网络上拷贝文件应该使用scp(securecopy),实际上Knoppix不会让您使用任何别的方式。 www.ibm.com 5. If data comes from a network, you should usually treat it as highly untrusted. 如果数据来自于网络,您应该认为它是高度不可信的。 www.ibm.com 6. This analysis aims at identifying the flow and use of untrusted data within an application. 这个分析主要是以检查这个流和应用程序中不信任代码使用为目的的。 www.ibm.com 7. For untrusted cross-forest configuration, make sure that the user does not have a mailbox. 对于不受信任的跨林配置,请确保用户没有邮箱。 technet.microsoft.com 8. Internal attacks are normally an indicator of untrusted code that is "evil. " Generally, that is the concern here. 内部攻击通常表明存在不受信任的代码,是它带来了“麻烦”。 www-128.ibm.com 9. When invoking the shell directly, the biggest problem is if you send the shell data that is derived from untrusted data. 当直接调用shell时,最大的问题是您发送给shell的数据是否来自于非可信的数据。 www.ibm.com 10. For example, an untrusted caller can query data on the handle just returned and receive information for an entirely unrelated resource. 例如,未受信任的呼叫端可能会在刚传回的控制代码上查询资料,并且接收完全不相关之资源的资讯。 technet.microsoft.com 1. For example, an untrusted caller can query data on the handle just returned and receive information for an entirely unrelated resource. 例如,未受信任的呼叫端可能会在刚传回的控制代码上查询资料,并且接收完全不相关之资源的资讯。 technet.microsoft.com 2. Another major drawback of JSONP is that it can be quite dangerous if used with untrusted services. JSONP的另一个主要缺陷是被不信任的服务使用时会很危险。 www.ibm.com 3. For example, administrators can disable loading of unsigned packages and untrusted packages. 例如,管理员可以禁止加载未签名的包和不可信的包。 msdn2.microsoft.com 4. So, if you have anything that have to have their ports open, you just set it as untrusted and this is it. 因此,如果您有任何必须有自己的港口开放,您只需将其设置为不信任,这是它。 bbs.kafan.cn 5. For example, you are an enterprise administrator and you want to prevent users from installing and running untrusted applications. 例如,您是企业管理员,想防止用户安装和运行不受信任的应用程序。 msdn2.microsoft.com 6. Because of security concerns, your application should not call this constructor with URI strings from untrusted sources and with 出于安全方面的考虑,您的应用程序不应调用具有来自不受信任来源的URI字符串并且 msdn2.microsoft.com 7. Carefully examine any advertisement information that you get from an untrusted source before using it with the 首先仔细检查从不可信来源获取的任何广告信息,然后再将它用于 msdn2.microsoft.com 8. To prevent it from being called from untrusted code; only the immediate caller is required to have 防止不可信代码对它进行调用;只有直接调用方才需要具有 msdn2.microsoft.com 9. To prevent it from being called from untrusted code; however, only the immediate caller is required to possess the 防止不受信任的代码对它进行调用;但是,只有直接调用方才需要具有 msdn2.microsoft.com 10. Validate untrusted input passed to your data access methods 防止不安全的输入进入你的数据操作 ck0118.i170.cn 1. Client certificate untrusted or invalid 客户证书不受信任或无效 7i24.com 2. How database objects behave when trusted and untrusted 数据库对象在受信任和不受信任时的行为方式 office.microsoft.com 3. Excluding Classes and Members from Use by Untrusted Code 防止不受信任的代码使用类和成员 msdn2.microsoft.com 4. If you need to write out untrusted data, encode the output 如果要输出不可信任的数据,加密它们 ck0118.i170.cn |
||||||||||||
随便看 |
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。