05 2017 档案

摘要:The access control model enables you to control the ability of a process to access securable objects or to perform various system administration tasks 阅读全文
posted @ 2017-05-30 13:30 debugme 阅读(1344) 评论(0) 推荐(0)
摘要:An access token is an object that describes the security context of a process or thread. The information in a token includes the identity and privileg 阅读全文
posted @ 2017-05-29 01:37 debugme 阅读(293) 评论(0) 推荐(0)
摘要:Redis setup hints 1.Make sure to set the Linux kernel overcommit memory setting to 1. Add vm.overcommit_memory = 1 to /etc/sysctl.conf and then reboot 阅读全文
posted @ 2017-05-25 12:34 debugme 阅读(218) 评论(0) 推荐(0)
摘要:Mandatory Integrity Control (MIC) provides a mechanism for controlling access to securable objects. This mechanism is in addition to discretionary acc 阅读全文
posted @ 2017-05-04 00:53 debugme 阅读(531) 评论(0) 推荐(0)
摘要:An access control entry (ACE) is an element in an access control list (ACL). An ACL can have zero or more ACEs. Each ACE controls or monitors access t 阅读全文
posted @ 2017-05-01 22:25 debugme 阅读(274) 评论(0) 推荐(0)
摘要:An access control list (ACL) is a list of access control entries (ACE). Each ACE in an ACL identifies a trustee and specifies the access rights allowe 阅读全文
posted @ 2017-05-01 21:36 debugme 阅读(388) 评论(0) 推荐(0)