impersonation

impersonation

1. The ASP.NET application needs only to verify that impersonation is set to true in the ASP.NET configuration file; no ASP.NET security code is required.

ASP.NET应用程序只需验证是否在ASP.NET配置文件中将模拟设置为true;不需要ASP.NET安全码。

2. DCOM determines the impersonation level, using its normal security-negotiation algorithm.

DCOM使用其常规安全协商算法确定模拟级别。

3. Kerberos is essentially a secure network authentication protocol that employs a system of shared secret keys and is able to provide robust security against impersonation and reply attacks.

Kerberos实际上是一种安全网络认证协议,采用共享密钥的系统,并且能提供健壮的安全性,以防止伪装攻击和恢复攻击。

4. The caller of the REVERT statement must be in the same database where the impersonation occurred.

REVERT语句的调用方必须位于发生模拟的同一数据库中。

5. SAKA protocol does not achieve key-compromise impersonation .

SAKA协议不具有密钥泄露安全性。

6. The SQL Server Database Engine security functionality includes highly granular authentication, authorization, and validation mechanisms; strong encryption; security context switching and impersonation; and integrated key management.

SQL Server数据库引擎安全功能包括高粒度身份验证、授权和验证机制;增强加密;安全上下文切换和模拟以及集成的密钥管理。

7. Windows 2000 Security Patch: Service Control Manager Named Pipe Impersonation Vulnerability also downloaded

Windows 2000安全修补程序:服务控制管理器命名管道模拟漏洞

8. Defines security impersonation levels. Security impersonation levels govern the degree to which a server process can act on behalf of a client process.

[本主题是预发布的文档,在将来发布的版本中可能会有更改。空白主题是为将来预留的。

9. false impersonation

[法] 假冒他人, 冒充, 冒名

10. Download details: Windows 2000 Security Patch: Service Control Manager Named Pipe Impersonation Vulnerability

下载详细信息:Windows 2000安全修补程序:服务控制管理器命名管道模拟漏洞

11. The scope of impersonation, when execution context is at the database level, is as follows

下面是执行上下文处于数据库级别时模拟的作用域

12. Also flows as part of the information that flows across the asynchronous points, which means that if an impersonation context exits it will flow as well.

也作为流经异步点的信息的一部分流动,这意味着如果模拟上下文退出,它仍会流动。

13. He also faces charges of harassment, reckless endangerment and criminal impersonation ?for allegedly telling parking lot employees he was a federal agent.

他也面对困扰的费用,卤莽的危及和犯罪的扮演 ?对于据说有效的停车场职员他是联邦探员。

14. she has the gift of impersonation too!

他很有模仿的天分!

15. He does a brilliant impersonation of the President.

他模仿总统模仿的很出色。

16. His impersonation of enthusiasm never rings true.

他模仿的积极性从来没有真正的戒指。

17. He did an extremely convincing impersonation of the singer.

他模仿那位歌手维妙维肖。

18. Convinced of his own righteousness, he was the perfect impersonation of a man of rectitude.

他确信自己很正直,可以完美地扮演刚正不阿的人。

19. He is charged with impersonation of a police officer.

他被指控冒充警官

20. impersonation attack

伪装攻击

21. However, in certain scenarios it may be useful to selectively extend the scope of impersonation beyond the database.

但是,在某些情况下,有选择地将模拟作用域扩展到数据库之外可能会非常有用。

22. But here's the kicker: impersonation isn't necessary for ACL authorization.

但是存在以下隐患:对于ACL授权来说,模拟是不必要的。

23. When should I use programmatic impersonation?

何时需要使用可编程的模拟?

24. You seem to forget that, but for me and but for my little impersonation, you probably wouldn't be here at all tonight.

你好象忘了,要不是我,要不是我那小小的一招,你今晚大概就来不了这儿。

25. You of when cat cat and companion together play, impersonation what role?

你的猫猫与同伴一同玩耍时,扮演何种角色?

26. I do an impersonation.

做模仿表演。

27. Service (DoS) attack and the impersonation attack.

兑换系统。

28. Among the most anticipated: the Ultimate Elvis Tribute Artist contest starring winners of 25 preliminary Elvis impersonation competitions from as far away as New Zealand.

其中最值得期待的:最终猫王致敬艺术家主演的竞赛优胜者25初步猫王模仿比赛,从远如新新西兰。

29. Secondly, the UAP protocol is analysed, because the key confirmation completely lies on the long-term private key, so it does not achieve forward secrecy, and resists key-compromise impersonation.

其次,对UAP协议进行安全分析,由于其确认密钥完全依赖于服务器的长期私钥,因此它不具有前向保密性和密钥泄漏的安全性。

30. List as follows:Firstly, the SAKA protocol is analysed, because the authentication codes of the two protocol participants completely lie on the long-term shared key, so it does not resist key-compromise impersonation.

具体工作如下:首先,分析了SAKA协议,由于协议参与者双方的认证码完全依赖于长期共享密钥,因此它不具有密钥泄漏的安全性。

31. defrauding insurance proceeds through impersonation

冒名骗赔

32. The protocols provide known session key security,part forward secrecy,and there is no key-compromise impersonation,no unknown key-share and no key control.

协议满足前向安全性、会话密钥泄露的安全性、个人密钥泄露的安全性,无不明密钥共享,单方不能控制密钥生成。

33. It does so even if impersonation is disabled.

即使禁用了模拟,它仍会这样操作。

34. The latter approach provides better performance because it avoids impersonation altogether.

后一种方法提供的性能更佳,因为它完全避免了模拟。

35. comedian Tina Fey, No. 51 in part for playing Sarah Palin, the 2008 Republican vice presidential nominee, in wildly popular TV impersonation s during the election campaign;

喜剧演员蒂娜?菲(第51位),她因总统大选期间在一档收视率很高的模仿秀节目中模仿副总统候选人莎拉?佩林而人气飙升;

36. Therefore, if the Web site is configured to perform impersonation, you must grant the TCB privilege to the account that is running the Web server.

因此,如果网站配置为执行模拟,则必须向运行Web服务器的帐户授予TCB特权。

37. In China, some with a long history of Daxing, often difficult to avoid the fate of Waizu impersonation.

在中国,一些具有悠久历史的大姓,常常难以避免被外族冒用的命运。

38. Oscar is one rockin mama, as she performs a pretty mean Mick Jagger impersonation.

奥斯卡是一个母亲,正如她扮演漂亮的米克 贾格尔。

39. 10. In her habits, she was a living impersonation of order, method, and exactness .

她的生活习惯活生生地体现了井井有条,按部就班和精密细致等准则。

40. How do I use programmatic impersonation?

如何使用可编程的模拟?

41. Keep doing this until you can just blurt it out.If when you try really hard, and your impersonation matches the original by 90%, then when you are relaxed you should still be able to reach 85%.

如果你在刻意模仿的状态下近似度在90%左右,那么长时间下来,你在非刻意模仿的状态下近似度应该会潜移默化地停留在85%左右。

42. If your custom data processing extension connects to data sources using impersonation, you must use the Open method on either the IDbConnection or IDbConnectionExtension interfaces to make the request.

如果您的自定义数据处理扩展插件使用模拟功能连接到数据源,则必须在IDbConnection或IDbConnectionExtension接口上使用Open方法来发出请求。

43. If the managed code provides authentication services, it must obtain a Windows NT security token and do an impersonation before calling any COM objects.

如果托管代码提供身份验证服务,那么在调用任何COM对象之前,它必须获得Windows NT安全标记并进行模拟。

44. If you laugh yourself after seeing the film, then that's a successful impersonation.

如果自己看完录影会笑出来,就算是次成功的模仿表演。

45. These were fervent Brahmins, the bitterest foes of Buddhism, their deities being Vishnu, the solar god, Shiva, the divine impersonation of natural forces, and Brahma, the supreme ruler of priests and legislators.

婆罗门教里有三个转世活佛:第一个是回斯奴,他是太阳神的化身,第二个是希瓦,他是生灵万物主宰的化身,第三个是卜拉马,他是一切婆罗门教教长和立法者的主宰。

46. Security impersonation levels govern the degree to which a server process can act on behalf of a client process.

安全模拟级别控制服务器进程可以在何种程度上代表客户端进程执行操作。

47. For a man who is not supposed to be an ace, Chien-Ming Wang did quite an impersonation.

对一位不被认定是王牌投手的人来说,王建民模仿的可是真像啊。

48. For client impersonation, ASP.NET will connect to the session-state store using the security credentials that were negotiated with the browser.

对于客户端模拟,ASP.NET将使用与浏览器协商的安全凭据来连接会话状态存储区。

49. Do not use impersonation for reports that support subscriptions or that use schedules to generate report history or refresh a report execution snapshot.

对于支持订阅的报表,或按计划生成报表历史记录或刷新报表执行快照的报表,请勿使用模拟功能。

50. Rather, impersonation and reverting change the token associated with the current operating system process.

对象。相反,模拟和恢复更改同当前操作系统进程关联的标记。

51. An attempt has been made to operate on an impersonation token by a thread that is not currently impersonating a client.

尝试已取得经营上的模拟令牌由一个线程目前未模仿客户端。

52. I am afraid there's no use studying until the middle of the night. I have to admit that there are differences between people. Never become an impersonation.

就怕你学到半夜也没有用。我不得不承认人与人之间是有差别的。千万不要成为模仿秀。

53. Too often, developers enable impersonation in ASP.

开发人员经常在ASP.

54. When impersonating a principal by using the EXECUTE AS LOGIN statement, or within a server-scoped module by using the EXECUTE AS clause, the scope of the impersonation is server-wide.

当使用EXECUTE AS LOGIN语句模拟主体或使用EXECUTE AS子句在服务器范围模块内模拟主体时,模拟的作用域为服务器范围。

55. When impersonating at this level, the impersonation token can be passed across only one machine boundary.

当在该级别模拟时,模拟标记可以只横穿一个计算机边界。

56. When the children have certain cognitive ability, just verbal impersonation is not enough, try to give them opportunities to read the characters.It will help them learning language better.

当孩子有了一定的认知能力后,光是口头上的模仿是不够的,适时的给他们认读的机会,会帮助他们更好的学习语言;

57. When OFF is specified, in an impersonation context cannot access resources outside the database.

当指定为OFF时,在模拟上下文中无法访问数据库以外的资源。

58. What you are describing is something we call "user impersonation".

您所描述的情况,我们称之为“用户模拟”。

59. I mean your doing rather brilliant sort of impersonation.

我是说你刚才做的只是非常逼真的模拟而已。

60. I say:Don't the incarnation in my in front impersonation the truth, you know 1+1 equal several?

我说:别在我面前扮演真理的化身,你知道1+1等于几吗?

61. Or you can forget about impersonation and restrict access to salary data by setting the ACL for Salaries.aspx so that non-managers lack read permission.

或者您可以不考虑模拟,并且通过为Salaries.aspx设置ACL以使非管理人员不具有读取权限,从而限制对工资数据的访问。

62. Rules for Extending Database Impersonation Scope

扩展数据库模拟作用域的规则

63. Specifies that DCOM determines the impersonation level using its standard security negotiation algorithm.

指定DCOM使用其标准安全协商算法确定模拟级别。

64. Specifies the level of impersonation allowed when calling targets of a server application.

指定调用服务器应用程序的目标时允许的模拟级别。

65. So they are taught that the microlight, which augments its impersonation by playing recordings of simulated crane calls, is their parent.

教教它们!通过播放模拟鹤鸣的录音带,滑翔机强化了在小鹤心中所扮演的父母的角色。

66. The new harassment clause, for instance, expressly lets members state negative feelings or opinions about another, and parodies of public figures are now permitted despite a ban on impersonation.

新骚扰的条文,例如,明确允许成员国家的负面感情或意见,另一个,和模仿公众人物,现在虽然允许,禁止假冒。

67. The system doesn′t need any password list. Using only one password,a registered user can log in the different services and get session keys. This scheme can withstand replay attack and impersonation attack.

方案中的服务器不需要存储口令表,经过注册的用户只需一个口令即可登录系统中不同的服务器,并生成与服务器之间的会话密钥,该方案可抵抗重放、伪装等入侵攻击.

68. ‘The only truly superb thing about it is its impersonation of a Passat. An old one.’

昊锐模拟帕萨特是其唯一做的优秀的事。

69. For information about how to extend user impersonation beyond the scope of the current database, see Extending Database Impersonation by Using EXECUTE AS.

有关如何在当前数据库作用域之外展开用户模拟的信息,请参阅使用EXECUTE AS扩展数据库模拟。

70. The impersonation contributed to the society role of adolescent and future role of study;

有助于青少年社会角色的扮演及未来角色的学习;

71. There are times when impersonation is justified.

有的时候需要证明模拟的合理性。

72. Li Yugang gradually found his confidence and discovered the huge market potential of female impersonation.

李玉刚逐渐找到了自信,并且发现了反串表演极大的市场潜力。

73. To summarize, the impersonation scope of a context established within a database can be extended to other scopes if and only if the following is true

概括而言,当且仅当满足下列条件时,可以将数据库内建立的上下文的模拟作用域扩展到其他范围

74. Database modules in an impersonation context cannot access resources outside the database.

模拟上下文中的数据库模块不能访问数据库以外的资源。

75. The impersonation scenario relies on Microsoft Internet Information Services (IIS) authentication and Microsoft Windows file access security to minimize security programming in the ASP.NET application itself.

模拟方案依赖于Microsoft Internet信息服务(IIS)身份验证和Microsoft Windows文件访问安全性以最大限度地减少ASP.NET应用程序本身在安全性方面的编程量。

76. Impersonation is the ability of a process to take on the security attributes of another process.

模拟是某个进程呈现另一个进程的安全属性的能力。

77. The Impersonation Level specifies whether applications can determine who is calling them, and whether the application can do operations using the client's identity.

模拟级别指定应用程序是否可以确定是谁在调用,并且应用程序是否可以以该客户的身份进行操作。

78. This impersonation depends on whether the module is a database-level module, such as a stored procedure or function, or a server-level module, such as a server-level trigger.

此模拟取决于模块是数据库级模块(如存储过程或函数)还是服务器级模块(如服务器级触发器)。

79. This is true if there is no context switching or if the impersonation is at the server level.

没有上下文切换或在服务器级进行模拟时,将出现这种情况。

80. No security context is available to allow impersonation.

没有安全上下文可用来允许模仿。

英语宝典
考试词汇表