| 1. | Make sure uids and gids be identical on all servers 确保uid和gid在所有服务器中都相同。
|
| 2. | The design of cadastre mis based on gid 的地籍管理信息系统设计
|
| 3. | This uid gid mapping is commonly used with another advanced feature that supports delegation of user credentials 这种uid / gid的映射通常都是与另外一种支持用户证书委托的高级特性一起使用的。
|
| 4. | Moreover , the data format required and the way how to plot the finite element map by means of gid software are introduced 另外,还研究了细观有限元剖分数据在gid软件中实现无网格可视化的格式和方法。
|
| 5. | Recipients are looked up in this map to determine the gid ( group privileges ) to be used when writing to the target mailbox 这个表用于查找接收人相应的组标识号。当邮件写入目标邮箱时,此组标识号被使用。
|
| 6. | Instead , set your program s privileges to be equal to the privileges you intend for example , set its effective id or file system id , effective gid , and use setgroups to clear out any unneeded groups , then make the 换一种方式,将您的程序的特权设置得恰好是您想要的特权(例如,设置它的有效id 、文件系统id或者有效gid ,并通过setgroups来清除所有不需要的组) ;然后调用
|