For more information on how to use the registry and SYSTEM attributes to control user login, please read the "AIX Security Guide" and the articles listed in the Resources section.
有关如何使用registry和SYSTE m属性来控制用户登录的更多信息,请阅读“AIX安全指南”和参考资料部分中所列出的文章。
The Homeland Security Department wants information about the availability of a commercial electronic performance management system for its human resources functions.
美国国土安全部需要了解商用电子绩效管理系统的实用性,用于其人力资源管理。
Working with the registry may compromise security by allowing inappropriate access to system resources or protected information.
使用登录会允许不适当存取系统资源或受保护的资讯,因此可能危害安全性。
Signatures of behavioral activity where applications and system resources are modified and might indicate a benign security risk or an attempt to access sensitive system information.
信息级别,已经不算真正意义上的威胁了,对于系统和应用程序资源的修改,对敏感系统信息的读取都属于此类。
Signatures of behavioral activity where applications and system resources are modified and might indicate a benign security risk or an attempt to access sensitive system information.
信息级别,已经不算真正意义上的威胁了,对于系统和应用程序资源的修改,对敏感系统信息的读取都属于此类。
应用推荐