Examples of using Read access in English and their translations into Russian
{-}
-
Official
-
Colloquial
Database for read access.
Read access time CD MS.
All users andgroups have only Read access.
Read access to one or more tables.
Best-in-class random read access times at 295 IOPS.
Pull code from a server which doesn't allow global read access.
The real read access for a simple user("user") is provided.
Administrators have Full Control; all other users andgroups have only Read access.
All users must have Read access to all WMI filters.
To make folders within the share visible only to those who have read access, select Enable.
That means you have full read access to the source code of this program.
Administrators have Full Control; all other users andgroups have only Read access and Write access. .
Conf has read access only for the root account and cannot be accessed by any other users.
The SMS Provider must have read access to the location specified.
The dialog box will display only the reports that do not contain a report prompt andreports for which the user has Read access.
Many servers will provide read access for an"anonymous bind" but require a password for anything else.
Although most people just download the installer,you also have full read access to the source code of this program.
This may allow attackers to gain read access to otherwise protected resources, depending on how the library is used.
Client logs allow user accessAll of the client log files allow users Read access and Interactive Users Write access. .
If you grant a user the Read access right to a file, that user will be able to read this file and its unprotected attributes.
Philip Martin discovered that HTTP-based Subversion servers crash when processing lock requests on repositories which support unauthenticated read access.
Note that everyone that has read access to the private key file can use it to have the same passwordless access to the remote site.
The fields Username and Password should only be filled in if the repository does not provide anonymous read access, and only if the authentication is not stored by Subversion itself.
If you grant a user the Read access right to a file directory, that user will be able to read all files in this directory for which the Access Control Lists are not specified.
While it introduces more configuration overhead, the more secure method is to manually enable policy logging on the management point andmanually configure the log folder so that the Client Status Reporting Service Account has read access.
The real-time read access to the aviation safety occurrences databases would be provided to all missions(including the new missions) after the full implementation of the module.
The SVM image file and the configuration file in XML format must be located in the same folder on the computer hosting the Administration Console of Kaspersky Security Center, orin the same folder on the network resource to which the user account performing the installation has read access.
In the view of OIOS, read access to the entire database should be made available to all peacekeeping missions on a real-time basis to maximize the benefits of the database Recommendation 4.
A vulnerability was discovered in mysql-connector-java, a Java database(JDBC) driver for MySQL, which may result in unauthorized update, insert ordelete access to some MySQL Connectors accessible data as well as read access to a subset of MySQL Connectors accessible data.
Select the Read check box to enable handlers that require read access to a virtual directory or clear the Read check box to disable handlers that require read access to a virtual directory.