快好知 kuaihz


privileged user造句
1. How is my data protected against privileged user abuse? 2. A hacker can become a highly privileged user with administrative controls and get out of a virtual machine and then execute malicious programs on the hypervisor. 3. The commands in Listing 17 defines a privileged user who would be authorized to do administrative work for this AFS cell. 4. Always run under least - privileged user accounts and assign only needed permissions. 5. Running a session as a privileged user should be avoided for security reasons. 6. For example, a hacker can enter in the guise of a privileged user with administrative access controls and perform malicious activities that a legitimate system administrator did not initially notice. 7. You can find other tools that help supplement sudo to provide more robust privileged user management. 8. With less code in the hypervisor (pushing the device emulation into the less privileged user space), the less chance of leaking privileges to untrusted users. 9. Many attacks succeed because an intruder was able to obtain or guess a password for a privileged user. 10. Lastly, you need to add users or user groups to the Privileged User role by clicking Add and using the search interface.