Examples of using Local users in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
Local users may interrogate the ntp server more closely.
Quick creation of local users is also supported.
Local users may gain superuser privileges.
Userinfo(2.5-4) display information about local users.
Contact data for local users and out of external data bases.
People also translate
Mobee is aimed at visitors to the Principality, as well as local users.
They could be expoited by local users, leading to e. g.
Local users might be able to conduct several attacks like e. g.
Create, modify, or delete local users and groups.
Local users are represented throughout the platform with the pictogram.
This might allow local users to modify arbitrary files.
For problem-solving instructions, see Troubleshooting Local Users and Groups.
Select"Search for Local Users" and follow the on-screen instructions.
Pearson is our general distribution partner for Brazil and supports our local users with its long-standing expertise.
Your local users know their stores, restaurants, offices, and branches best.
Exploiting them might allow local users to modify arbitrary files.
Using local users for SQL Server can create noticeable impact for short transactions.
Active Directory users are the only supported users; local users and groups are not supported.
Exploiting them might allow local users to conduct a Denial-of-Service against a vulnerable system or to compromise the root account.
Pearson is a local distribution partner for Canada and supports our local users with its long-standing expertise.
Exploiting them might allow local users to conduct a Denial-of-Service against a vulnerable system.
You can specify additional IP addresses whose users can see debugging output,or even disable output to local users.
The vulnerability allows local users to delete arbitrary files and directories.
For local users on the internal network, access through Citrix Receiver for HTML5 to resources provided by XenDesktop and XenApp is disabled by default.
Exploiting them might allow local users to compromise the administrator account.
This could allow local users to edit it such that arbitrary commands could be executed whenever any local user executed a program under WINE.
The PaX Team discovered a potential buffer overflow in therandom number generator which may permit local users to cause a denial of service or gain additional privileges.
This can be exploited by local users to trigger a denial of service(DoS) by causing the kernel to execute an infinite loop.
Olaf Kirch discovered anissue with the i915 driver that may allow local users to cause memory corruption by use of an ioctl with insufficient privilege restrictions.
As flexibility is essential, local users create their own sub-processes and tools to optimize their work and support the collaboration with other process related roles.