acls
美
英 
英漢解釋
abbr. | 1. 【軍】(=Automatic Carrier Landing System)艦載機自動著陸裝置 2. (=American Council of Learned Societies)美國學術團體理事會 |
英英解釋
例句
If you're using any other backup program, be sure to do a bit of research before using extended attributes and ACLs all over the place.
如果您正在使用任何其它備份程序,請確保無論在何處使用擴展屬性和ACL之前都做一些研究。
as common as knee or ankle sprains, torn ACLs put players out of the game for up to a year.
雖然不像膝蓋或腳踝扭傷亞囊經常出現,但是前十字交叉韌帶撕裂會讓運動員停賽最長達一年之久。
Because these objects are used in public folder access control lists (ACLs), it is crucial that this information be replicated correctly.
由于這些對象是在公用文件夾訪問控制列表(ACL)中使用的,因此,正確復制此信息是至關重要的。
Each of these resources has several classes that you can use to create and modify ACLs.
上述每個資源都有幾個用于創建和修改ACL的類。
Describes the rules used to propagate ACLs to folders and files contained within a target folder.
描述用于將ACL傳播到目標文件夾中包含的文件夾和文件的規則。
If he had ACLs, he would have been long gone.
如果他有十字韌帶,他就不會跌這么后了。
Folder access control lists ( ACLs ) will not be preserved when recovering content into an active mailbox .
將內容恢復到活動郵箱中時,不會保留文件夾訪問控制列表(ACL)。
You can replicate ACLs as an entire list, not just individual entries, to remote copies of the database.
可以把整個ACL列表(而不是單獨的項)復制到數據庫的遠程副本中。
In the authorization and authentication areas of the client, you can add, modify, or delete users, user groups, privilege sets, and ACLs.
在該客戶機的authorizationandauthenticationareas中,可以添加、修改或刪除用戶、用戶組、權限集和ACL。
As you saw in " Users, user groups, and ACLs in CM V8, " CM provides default values for most of them.
如“CMV8中的用戶、用戶組和ACL”一節所述,CM為大部分用戶屬性提供了缺省值。
Access Control Lists (ACLs) determining who can access each database and to what extent.
訪問控制列表(AccessControlList,ACL)確定誰能在多大范圍內訪問每個數據庫。
For a complete list of all of the get and set methods for each protected resource, see Technology Summary for ACLs.
有關每個受保護資源的所有get和set方法的完整列表,請參見ACL技術摘要。
From the point of view of the individual ACLs securing the resources, this is exactly correct.
從保護資源安全的各個ACL的角度來看,這是完全正確的。
Access control lists (ACLs) are objects with an owner and an indexed list, or hash, as illustrated in Figure 2.
訪問控制列表(ACL)是具有所有者和索引列表或散列的對象,如圖2所示。
CM uses privileges, privilege groups, privilege sets, and ACLs to authorize the users to perform specific operations on specific items.
CM使用權限、權限組、權限集合和ACL對用戶進行授權,從而對特定項目執行特定操作。
These attributes include file owner and group permissions, access-control lists (ACLs), and extended file attributes.
這些屬性包括文件所有者及組權限,訪問控制列表(ACL),以及擴展文件屬性。
The service access control list (ACLs) settings for front-end servers are identical to the service ACLs settings for back-end servers.
前端服務器的服務訪問控制列表(ACL)設置與后端服務器的服務ACL設置完全相同。
Provides the ability to control access to directory objects without direct manipulation of Access Control Lists (ACLs).
提供無需直接操作訪問控制列表(ACL)而控制對目錄對象的訪問的能力。
Review operating system security and Windows access control lists (ACLs) on the server that hosts the custom server controls.
查看承載自定義服務器控件的服務器上的操作系統安全性和Windows訪問控制列表(ACL)。
These ACLs are also set on the directory itself, but they include Modify permissions for the CREATOR OWNER group.
這些ACL還會在該目錄本身上設置,但是它們包括CREATOROWNER組的“修改”權限。
These ACLs are also set on the directory itself, but they include Modify permissions for the Power Users group.
這些ACL還會在該目錄上設置,但是它們包括PowerUsers組的修改權限。
In this case, the. NET Framework creates the needed key and related container with the ACLs of the current user.
在這種情況下,.NETFramework會創建所需的密鑰及帶有當前用戶ACL的相關容器。
The administrative users are able to execute all the data modeling operations like itemtype creation, defining ACLs, and so on.
管理用戶能執行所有數據建模操作,例如項目類型創建、定義ACL,等等。
To filter network traffic, ACLs determine if routed packets are forwarded or blocked at the router interfaces.
要過濾網路訊務,ACL決定可被繞送的封包在路由器介面上是否要被傳送或阻隔。
This module provides authorization services against file-system access-control lists (ACLs).
此模塊提供針對文件系統訪問控制列表(ACL)的授權服務。
Writing event handlers and service methods that will interpret changes in the UI and modify ACLs and the registry accordingly.
編寫將用于解釋UI中的更改并相應修改ACL和注冊中心的事件處理程序和服務方法。
Yes, extended attributes and ACLs are really fun, but beware -- most backup programs currently still ignore EA and ACL data.
是的,擴展屬性和ACL的確很有趣,但是,當心―大多數備份程序目前仍然忽略EA和ACL數據。
It also helps you secure the connection string information using access control lists (ACLs) and encryption.
此外,還可以幫助您使用訪問控制列表(ACL)和加密保護連接字符串信息。
The class members are concluded by defining the ACLs that provide authorization for each of the spaces you will test.
類成員以定義ACL結束,用于為您將測試的各個空間提供授權。
Listing 4 shows the Junit test that generates and prints out an aclActorTable showing configuration information for a list of ACLs.
清單4顯示了Junit測試,該測試可以生成并輸出顯示一組ACL的配置信息的aclActorTable。
The following table lists the ACLs that should be set on application-level. Browser files in the App_Browsers subdirectory.
下表列出了應該在App_Browsers子目錄中的應用程序級別的.browser文件上設置的ACL。
Active Directory uses a protection mechanism to make sure that ACLs are set correctly for members of sensitive groups.
ActiveDirectory使用保護機制來確保為敏感組中的成員正確設置ACL。
At the organizational unit level, remove inheritance and then set the permissions to match the current ACLs on the adminSDHolder container.
在組織單位級別,刪除繼承然后將權限設置為與adminSDHolder容器上當前的ACL相匹配。
Configure event monitoring and enable warnings generated when database ACLs are changed.
需要配置更改數據庫ACL時生成的事件監控和警告。
The ACLs can be inherited from the folder where the file is created.
ACL可以從創建該文件的文件夾繼承。
Operating system security and access control lists (ACLs) on the server that hosts the custom server control.
承載自定義服務器控件的服務器上的操作系統安全性和訪問控制列表(ACL)。
For most scenarios, you can use the higher level, abstracted classes instead of the advanced classes to create and modify ACLs.
對于大多數情況,您可以使用較高級別的抽象類(而不是使用高級類)來創建和修改ACL。
CM uses privilege sets and ACLs to provide a stringent and granular authorization mechanism.
CM使用權限集合和ACL提供了一種嚴格的粒度級授權機制。
The directory should be protected with highly restrictive ACLs.
該目錄應利用高限制級ACL進行保護。
In my next article, we'll also take a look at some of XFS' advanced features, such as ACLs and extended attributes.
在下一篇文章中,我們還將研究XFS的一些高級特性,譬如ACL和擴展屬性。