首页 / 词典 / good

suid

  • 网络设置替代用户标识;设定使用者识别码;婴儿意外猝死;局部识别符;用户标识
suidsuid
  1. In this case , no files had the suid bit set .

    在此情况下,没有文件设置了suid位。

  2. The passwd command is one of the few that must be suid .

    passwd命令是少数必须为suid的命令之一。

  3. SUID and SGID permissions can give all users access to specific files .

    SUID和SGID许可能给所有的使用者对特定的文件存取。

  4. You should have as few suid programs as possible .

    您要尽量少地使用suid程序。

  5. This indicates that , for this particular program , the suid and executable bits are set .

    这就表示,对这个特定的程序来说,suid和可执行位已经被设置。

  6. One alternative is setting the SUID and the SGID permission bits for a file .

    一替代选择正在置位SUID和为一个文件SGID许可位元。

  7. Next , we can try to run the program ( again without the suid bit ) under strace .

    接下来,我们可以试着在strace之下运行这个程序(同样不设置suid位)。

  8. The Linux permissions model has two special access modes called suid ( set user id ) and sgid ( set group id ) .

    Linux权限模型有两个特殊的访问模式,名为suid(设置用户id)和sgid(设置组id)。

  9. First , you do an audit of your system and make sure that you remove the suid bit from all your network binaries , like ssh

    首先,应检查系统,确保已除去了所有网络二进制程序(如ssh)中的suid位

  10. In the future , this first number may be usable to allow for new files that automatically include the SUID or SGID bits .

    未来,这个第一个数目可能可使用考虑到自动地包括SUID或SGID位元的新的文件。

  11. These standard tools are similar in functionality , but they limit the file system integrity control to files with suid and sgid flags .

    这些标准工具功能相近,但是,它们把对文件系统完整性的控制限于有suid和sgid标志的文件。

  12. Historian Lawrence Suid has said that the film 's action bears little more than a " remote resemblance " to the real event .

    历史学家劳伦斯。苏德说过这部电影的情节与真实事件相差甚远。

  13. The suid and sgid bits occupy the same space as the x bits for user and group in a long directory listing .

    suid和sgid位与长目录清单中用户和组的x占据相同的空间。

  14. It is a kind of common technique for a hacker to break into remote systems and to get root privileges using buffer overflow on UNIX suid programs .

    通过对UNIX的suid程序使用缓冲区溢出攻击已成为黑客入侵远程系统并获取root权限的常用技术。

  15. While suid and sgid are handy , and even necessary in many circumstances , improper use of these access mode can allow breaches of a system 's security .

    虽然suid和sgid很便利,甚至在很多环境下是必需的,但是这些访问模式不适当的使用会造成系统安全上的漏洞。

  16. For example , one common practice is to set the SUID bit for the KPPP Internet Connection Utility so all users can use it to dial in to the Internet .

    举例来说,一个常见的做法将设定KPPP因特网连接公用程式如此所有使用者的SUID位元能使用它拨在对因特网。

  17. Given this , you will not be surprised to learn that the crontab command , like the passwd command , is an suid program that runs with root authority .

    因此,与passwd命令一样,crontab命令是一个用根权限运行的suid程序。

  18. When an executable program has the suid access modes set , it will run as if it had been started by the file 's owner , rather than by the user who really started it .

    当可执行的程序设置为suid访问模式,它就会开始运行,好像是由文件所有者启动而不是由真正启动它的用户启动。

  19. All the set user ID ( SUID ) bit commands and programs shipped in AIX V7.1 have this feature enabled automatically , and no further configurations are required from an end user .

    在AIXV7.1中,所有设置用户ID(SUID)位命令和程序都自动地启用此特性,不需要最终用户进一步配置。

  20. If the file is executable , the suid or sgid bits , if set , will be displayed as lowercase s , otherwise they are displayed as uppercase S.

    如果文件是可执行的,suid或sgid位如果已设置,将会显示为小写的s,否则就显示为大写的S。

  21. Applying data mining algorithm to intrusion detection is a major research direction in computer security . Especially , when using data mining algorithm such as association analysis , sequence mining to analyze suid programs in Unix environment , the future is much promising .

    将数据挖掘方法应用于入侵检测中研究的一个重要方向是,对Unix环境下特定程序运用关联、序列等数据挖掘算法。

  22. It is displayed in a long directory listing in the place of the executable flag for other users ( the last character ), with the same meaning for upper and lower case as for suid and sgid .

    它显示在其他用户的可执行标识中(最后的字符)的长目录清单,而且suid和sgid的大小写意义相同。

  23. The suid and sgid bits are set and reset symbolically using the letter s ; for example , u + s sets the suid access mode , and g-s removes the sgid mode .

    suid和sgid位使用字母s在符号上进行设置和重设;例如,u+s设置suid访问模式,g-s删除sgid模式。