untrusted
美
英 
例句
For untrusted XAML, you should treat it generally the same as if it were untrusted code.
对于不受信任的XAML,通常应将其视同为不受信任的代码。
The next step that we need to do is to make sure that our children will not be able to open untrusted web sites.
下一步我们要做的是确保孩子不能打开不信任网站。
If you try to attach to a process owned by an untrusted user account, a security warning dialog confirmation will appear.
如果试图附加到不受信任的用户帐户拥有的进程,则会出现安全警告对话框确认。
Security Warning: Attaching to a process owned by an untrusted user can be dangerous.
安全警告:附加到不可信用户拥有的进程可能存在危险。
Untrusted - The application is not allowed to access any of the Operating system resources.
不可信的-应用程序是不允许访问任何操作系统的资源。
Clearly, you want to consider some sort of security model to limit the loading of untrusted resources.
显然,您需要考虑某种安全模型以限制不可信资源的加载。
In the most general sense, untrusted XAML is any XAML source that your application did not specifically include or emit.
一般来说,不受信任的XAML是应用程序未明确包含或发出的任何XAML源。
The Linden Lab approach appears to be to focus on a secure protocol such that untrusted clients are not a threat, and publish everything.
LindenLab方法就在重点开发一种安全协议,使不信任的客户机不再会成为威胁,并可以发布任何内容。
Some methods might not be suitable to allow arbitrary untrusted code to call.
某些方法可能不适合被任意的不受信任代码调用。
If you rely on MAC addresses, processor IDs, or cookies, remember that they are essentially self-reported by an untrusted client.
如果您依赖于MAC地址、处理器标识或cookie,请记住它们本质上是由一个不可信的客户机自我报告的。
We recommend that you do not attach or restore databases from unknown or untrusted sources.
建议您不要附加来自未知或不可信来源的数据库。
You can scrub user inputs by escaping untrusted data before allowing it to be inserted into HTML element content and HTML common attributes.
通过在允许非信任的数据被插入到HTML元素内容和HTML公共属性之前先进行转义,可以清理用户输入。
Untrusted code is not typically allowed to update application settings.
不受信任的代码通常不允许对应用程序设置进行更新。
Whenever you get information from an untrusted source, take steps to be sure it does not contain any executable code.
每当您从不可信的信息源获得信息时,都要采取步骤确保它不包含任何可执行代码。
check that the user is granted permissions to signed content (untrusted authority as well).
检查用户是否拥有对被签名的和非信任的内容进行访问的权限。
You can solve this problem by: a. Convert the system back to an "untrusted" st ate through SAM.
你可以通过下面的步骤解决这个问题:a。通过SAM将系统转换回“不可信”状态。
Do not enable DTD processing if you are concerned about denial of service issues or if you are dealing with untrusted sources.
如果您担心出现拒绝服务问题或要处理非信任源,请不要启用DTD处理。
For this system to work, the protected hash must be encrypted or kept secret from all untrusted parties.
为使此系统发挥作用,必须对受保护的哈希值进行加密或将该哈希值对所有不受信任的用户保密。
User input is actually harder to make safe because there is no stack frame to trace the presence of the potentially untrusted data.
实际上,使用者输入的安全比较不易维护,因为这种资料没有堆叠框架可以追踪潜在的未受信任资料是否存在。
This mode is designed to enable untrusted reports that use untrusted processing extensions to run securely.
此模式旨在允许安全执行那些使用不可信处理扩展插件的不可信报表。
Applications that transmit confidential or sensitive data, or that transmit messages over untrusted networks, should use dialog security.
传输保密或敏感数据的应用程序或者在不可信的网络上传输消息的应用程序应使用对话安全模式。
The zonename argument can be one of the following values: MyComputer, Intranet, Trusted, Internet, or Untrusted.
zonename参数可以是下列值之一:MyComputer、Intranet、Trusted、Internet或Untrusted。
In most cases, this network is the Internet, which must be considered untrusted.
在大多数情况下,这个网络即互联网,必须被看作是不可信的。
The Java language was designed from day one to allow the execution of untrusted, potentially malicious code in a secure sandbox.
设计Java语言之初就是为了允许在一个安全沙箱中运行不信任的、潜在恶意的代码。
Madam wilson: don't waste your time. I don't be willing to do with untrusted people.
威尔森夫人:我不想跟无信之人合作,不要白费力气了。
You can use WSS to protect the authenticity, integrity, and confidentiality of messages from untrusted network and transport intermediaries.
可用WSS防止消息的真实性、完整性和机密性受到不可靠网络和传输中介的攻击。
Also it will give all the capabilities to the installed app. Warning: Installing a program from untrusted sources is dangerous.
此外它将使所有的能力,已安装的应用程序。警告:安装程序不被信任的来源是很危险的。
This content model information should not be exposed in untrusted scenarios.
此内容模型信息不应在不受信任的情况下公开。
SQL injection is easier to beat; you simply need to properly escape each piece of untrusted data before building your query.
相比之下,SQL入侵更容易对付。您只需在构造查询之前,适当地排除每块不受信任的数据。
Trusted processes, in contrast, are aware of DIFC and set up the privacy and integrity controls that constrain untrusted processes.
另一方面,受信任的进程知道系统中存在DIFC,它们设立隐私及数据完整性控制来约束不受信任的进程。
This allows an untrusted component use the class, but does not allow it to retrieve and directly use the XmlResolver object.
这样,将允许不可信的组件使用该类,但是不允许检索和直接使用XmlResolver对象。
To help avoid this problem, never grant UnmanagedCode permission to untrusted code.
若要避免此问题,请不要为不受信任的代码授予UnmanagedCode权限。
All messages in transit should be protected from tampering by untrusted intermediaries.
应该防止传输中的所有消息受到不可靠中介的篡改。
The first line of defense in a secure program is to check every untrusted input.
安全的程序中第一道防线是检查每一个不可信的输入。
All it takes is an application with some dynamically constructed SQL and untrusted user input.
它所利用的只是具有一些动态构造的SQL和不可信用户输入的应用程序。
Loading symbols from untrusted locations can have harmful effects, as described in the previous Security Note.
如前面的“安全说明”所述,从不可信位置加载符号可能产生有害作用。
A trusted contact's information always includes a certificate; untrusted contacts don't have certificates.
受信任的联系人的信息始终包含证书;不受信任的联系人则没有证书。
Unfortunately, encoding all untrusted data can be resource intensive and may have a performance impact on some Web servers.
遗憾的是,对所有不可信数据编码是资源密集型的工作,而且可能对某些Web服务器产生性能方面的影响。
Input validation and sanitation filter out all possible active or malicious content from untrusted input.
输入验证和数据消毒会从不可信的输入中过滤掉所有可能的活动或恶意的内容。
Outlook includes an object model guard that helps prevent untrusted code from accessing the Outlook object model.
Outlook包含一个对象模型保护,它可以帮助防止不受信任的代码访问Outlook对象模型。