在 英语 中使用 Root privileges 的示例及其翻译为 中文
{-}
-
Political
-
Ecclesiastic
-
Programming
You have to have root privileges.
Currently, this tool has been able to escape the sandbox limit andget tfp0 and root privileges.
And I don't have root privileges.
World-writeable files and directories allow an attacker to modify the code andto gain root privileges.
You need root privileges to install it.
The steps required in this guide require root privileges.
Other users can also be given root privileges but this should be done with care.
Ctrl+b 2 Interactive shell prompt with root privileges.
Some applications that require ROOT privileges, such as AD blocking, require ROOT permissions.
ROOT_UID=0 Only users with$UID 0 have root privileges.
Ztorg 7%- Trojan that uses root privileges to download and install applications on the mobile phone without the user's knowledge.
The steps in this tutorial require the user to have root privileges.
This could allow a malicious local user to gain root privileges or escape from a jail.
This prevents configuration errors from blocking sudo operations,which may be your only way of obtaining root privileges.
The steps in this tutorial require the user to have root privileges on the virtual private server.
This comes particularly useful when you have to run a command andrealize that it needs root privileges.
The Android implant includes functionality to gain root privileges by abusing known vulnerabilities.
The sudo command permits a user to format disks, for instance,but have no other root privileges.
Another acquired attack, SwampMonkey, allows CIA to get root privileges on undisclosed Android devices.
In order to send an ICMP packet, ping needs to use a raw socket,which in Linux requires root privileges.
Another acquired attack by the CIA is SwampMonkey,which allows the agency to get root privileges on undisclosed Android devices.
If a user ever needs to perform some task as root, they can use su-to temporarily receive root privileges.
ROOT_UID=0 Only users with$UID 0 have root privileges.
Most of the code in iOS, including third-party applications,run as the"mobile" user which does not have root privileges.
Swopes points out that remapping is also done because on UNIX machines,your server needs root privileges to listen on ports below 1024.
Most of the code in iOS, including third-party applications,runs as the"mobile" user which does not have root privileges.
We can create the necessary file andopen it in our text editor with root privileges by typing:.
Intel Security McAfee VirusScan Enterprise for Linux is affected by ten vulnerabilities that canbe chained for remote code execution with root privileges.
The steps in this tutorial require the user to have root privileges.
The steps in this tutorial require the user to have root privileges.