您要查找的是不是:
- To use COM interoperability, you must have administrator or power-user security permissions. 若要使用COM互操作性,您必须具有管理员或超级用户的安全权限。
- Adjusting the code-based security if the custom code needs an elevated set of code access security permissions. 如果自定义代码需要一个提高的代码访问安全权限集,则需要调整基于代码的安全性。
- The security permissions will differ, but you can use the Zoner.exe tool to address this. 安全性权限将会不同,但是您可以使用Zoner.;exe工具来对付这个。
- Access denied creating the conference. It is possible that the specified security permissions could not be authenticated! 创建会话时访问被拒绝。可能指定的安全许可不能被身份验证!
- When setting code access security permissions for a ClickOnce application, you need to start with a base set of permissions. 设置ClickOnce应用程序的代码访问安全权限时,需要从一个基本权限集开始。
- The controls will be unable to access the Analysis Services instance if the security permissions are not correctly configured using one of the previously described methods. 如果没有使用上述某种方法正确配置安全权限,这些控件将不能访问Analysis Services实例。
- Is called when changes are made to the size, system attributes, last write time, last access time, or security permissions of a file or directory in the directory being monitored. 当对正在监视的目录中的文件或目录的大小、系统属性、上次写入时间、上次访问时间或安全权限进行更改时,调用。
- Also, a network application that runs in partial trust, such as with a restricted set of security permissions, cannot be larger than half of the quota size. 此外,以部分信任的方式(如具有受限制的安全权限集)运行的网络应用程序不能大于配额大小的一半。
- Declarative security permissions in code compiled using the MSIL Assembler (Ilasm. Exe) and language compilers in the.NET Framework version 2.0 Are stored in the new format. 在.;NET Framework 2
- To avoid unwanted exposure of confidential information, you must set appropriate security permissions on the location of the content conversion tracing files. 为了避免不利地暴露机密信息,必须对内容转换跟踪文件的位置设置适当的安全权限。
- Stored procedures can define complex business rules, control data modification, limit access through security permissions, provide transaction integrity, and generally do the database work your application requires. 存储过程可以定义复杂的业务规则,控制数据修改,通过安全权限限制访问,提供事务完整性,以及通常执行一些应用程序所需的数据库工作。
- Given sufficient security permissions, a serialization engine implemented using dynamic methods can access private and protected data to enable serialization of objects not authored by the engine creator. 如果具有足够的安全权限,使用动态方法实现的序列化引擎可访问私有的和受保护的数据,以启用并非由引擎创建者创作的对象的序列化。
- Assemblies are the building blocks of.NET Framework applications; they form the fundamental unit of deployment, version control, reuse, activation scoping, and security permissions. 程序集是.;NET Framework应用程序的构造块;程序集构成了部署、版本控制、重复使用、激活范围控制和安全权限的基本单元。
- Declarative security permissions in code compiled using the MSIL Assembler (Ilasm. Exe) and language compilers in the.NET Framework versions 1.0 And 1.1 Are stored in the old format. 在.;NET Framework 1
- Also, since ACLs are a component of system security, one could argue that it is beneficial to not allow a remote user to inspect and modify the ACL security permissions of a file on an NFS server. 而且,因为 ACL 是系统安全的 一个组件,所以有人可能会认为,不允许远程用户查看和修改 NFS 服务器上文件的 ACL 安全权限更安全。
- At assembly load time, the CLR associates security permissions with the newly loaded assembly based on evidence including, but not limited to, the location from which the assembly is loaded. 在组件加载时,CLR协同重加载的基于包含但不限于组件加载的位置的组件的安全权限一起工作。
- The specifics of these establishing credentials is Operator Site dependant,and all valid Operator Sites will provide a Web-based user interface via which to establish an identity and secure permissions to publish data. 这些建立授权证书的细节是依赖于具体操作入口站点的(不同的操作入口站点的细节可能不同),并且所有有效的操作入口站点将提供一个基于Web的用户界面,通过这个界面可以建立一个标识和安全许可,从而发布数据。
- The specifics of these establishing credentials is Operator Site dependant, and all valid Operator Sites will provide a Web-based user interface via which to establish an identity and secure permissions to publish data. 这些建立授权证书的细节是依赖于具体操作入口站点的(不同的操作入口站点的细节可能不同),并且所有有效的操作入口站点将提供一个基于Web的用户界面,通过这个界面可以建立一个标识和安全许可,从而发布数据。
- Programs that call this code must have been granted security permission to access unsafe code. 调用这些代码的程序应该被授以安全许可来访问非安全代码。
- An application that performs assembly binding redirection outside the Trusted and Intranet security zones requires a security permission. 如果应用程序在受信任的区域和Intranet安全区域外执行程序集绑定重定向,则需要安全权限。