untrusted

untrusted

 英

  • 网络不可信的;不受信任;不信任

例句

For untrusted XAML, you should treat it generally the same as if it were untrusted code.

对于信任XAML通常信任代码

The next step that we need to do is to make sure that our children will not be able to open untrusted web sites.

下一步我们确保孩子不能打开信任网站

If you try to attach to a process owned by an untrusted user account, a security warning dialog confirmation will appear.

如果试图附加信任用户帐户拥有进程出现安全警告对话确认

Security Warning: Attaching to a process owned by an untrusted user can be dangerous.

安全警告附加不可信用拥有进程可能存在危险

Untrusted - The application is not allowed to access any of the Operating system resources.

可信-应用程序允许访问任何操作系统资源

Clearly, you want to consider some sort of security model to limit the loading of untrusted resources.

显然需要考虑安全模型限制可信资源加载

In the most general sense, untrusted XAML is any XAML source that your application did not specifically include or emit.

一般来说信任XAML应用程序明确包含发出任何XAML

The Linden Lab approach appears to be to focus on a secure protocol such that untrusted clients are not a threat, and publish everything.

LindenLab方法重点开发一种安全协议使信任客户机不再成为威胁可以发布任何内容

Some methods might not be suitable to allow arbitrary untrusted code to call.

某些方法可能适合任意信任代码调用

If you rely on MAC addresses, processor IDs, or cookies, remember that they are essentially self-reported by an untrusted client.

如果依赖MAC地址处理器标识cookie记住它们本质上一个可信客户机自我报告

We recommend that you do not attach or restore databases from unknown or untrusted sources.

建议不要附加来自未知可信来源数据库

You can scrub user inputs by escaping untrusted data before allowing it to be inserted into HTML element content and HTML common attributes.

通过允许信任数据插入HTML元素内容HTML公共属性之前进行转义可以清理用户输入

Untrusted code is not typically allowed to update application settings.

信任代码通常允许应用程序设置进行更新

Whenever you get information from an untrusted source, take steps to be sure it does not contain any executable code.

每当从不可信信息获得信息采取步骤确保包含任何可执行代码

check that the user is granted permissions to signed content (untrusted authority as well).

检查用户是否拥有签名信任内容进行访问权限

You can solve this problem by: a. Convert the system back to an "untrusted" st ate through SAM.

可以通过下面步骤解决这个问题a通过SAM系统转换可信状态

Do not enable DTD processing if you are concerned about denial of service issues or if you are dealing with untrusted sources.

如果担心出现拒绝服务问题处理信任不要启用DTD处理

For this system to work, the protected hash must be encrypted or kept secret from all untrusted parties.

使系统发挥作用必须受保护哈希进行加密哈希所有信任用户保密

User input is actually harder to make safe because there is no stack frame to trace the presence of the potentially untrusted data.

实际上使用者输入安全比较不易维护因为这种资料没有堆叠框架可以追踪潜在信任资料是否存在

This mode is designed to enable untrusted reports that use untrusted processing extensions to run securely.

模式旨在允许安全执行那些使用不可处理扩展插件不可报表

Applications that transmit confidential or sensitive data, or that transmit messages over untrusted networks, should use dialog security.

传输保密敏感数据应用程序或者可信网络传输消息应用程序使用对话安全模式

The zonename argument can be one of the following values: MyComputer, Intranet, Trusted, Internet, or Untrusted.

zonename参数可以下列之一MyComputerIntranetTrustedInternetUntrusted

In most cases, this network is the Internet, which must be considered untrusted.

大多数情况这个网络互联网必须看作可信

The Java language was designed from day one to allow the execution of untrusted, potentially malicious code in a secure sandbox.

设计Java语言就是为了允许一个安全沙箱运行信任潜在恶意代码

Madam wilson: don't waste your time. I don't be willing to do with untrusted people.

威尔森夫人不想合作不要白费力气

You can use WSS to protect the authenticity, integrity, and confidentiality of messages from untrusted network and transport intermediaries.

可用WSS防止消息真实性完整性机密性受到不可网络传输中介攻击

Also it will give all the capabilities to the installed app. Warning: Installing a program from untrusted sources is dangerous.

此外使所有能力安装应用程序警告安装程序信任来源危险

This content model information should not be exposed in untrusted scenarios.

内容模型信息信任情况下公开

SQL injection is easier to beat; you simply need to properly escape each piece of untrusted data before building your query.

相比之下SQL入侵容易对付只需构造查询之前适当地排除信任数据

Trusted processes, in contrast, are aware of DIFC and set up the privacy and integrity controls that constrain untrusted processes.

另一方面信任进程知道系统存在DIFC它们设立隐私数据完整性控制约束信任进程

This allows an untrusted component use the class, but does not allow it to retrieve and directly use the XmlResolver object.

这样允许可信组件使用但是允许检索直接使用XmlResolver对象

To help avoid this problem, never grant UnmanagedCode permission to untrusted code.

若要避免问题不要信任代码授予UnmanagedCode权限

All messages in transit should be protected from tampering by untrusted intermediaries.

应该防止传输所有消息受到不可中介篡改

The first line of defense in a secure program is to check every untrusted input.

安全程序第一防线检查一个可信输入

All it takes is an application with some dynamically constructed SQL and untrusted user input.

利用只是具有一些动态构造SQL不可用户输入应用程序

Loading symbols from untrusted locations can have harmful effects, as described in the previous Security Note.

前面安全说明从不可信位置加载符号可能产生有害作用

A trusted contact's information always includes a certificate; untrusted contacts don't have certificates.

信任联系信息始终包含证书信任联系没有证书

Unfortunately, encoding all untrusted data can be resource intensive and may have a performance impact on some Web servers.

遗憾所有不可数据编码资源密集型工作而且可能某些Web服务器产生性能方面影响

Input validation and sanitation filter out all possible active or malicious content from untrusted input.

输入验证数据消毒从不可信输入过滤所有可能活动恶意内容

Outlook includes an object model guard that helps prevent untrusted code from accessing the Outlook object model.

Outlook包含一个对象模型保护可以帮助防止信任代码访问Outlook对象模型