You cannot write to the Security log.
您无法写入安全性记录档。
And the system also provides certain support for the auditing function of security Log.
系统对安全日志审核功能也提供了一定的支持。
When the system security log reaches its maximum size it will stop recording security events.
当系统安全达到它的最大的限度时,它将停止记录安全事件。
Most of the events below are in the Security log; many are only logged on the domain controller.
以下是安全日志中的绝大部分事件,部分仅仅是域控制器的记录。
The design of a simulation system security log user interface, using MD5 algorithm users log on password security authentication.
设计一个模拟的系统用户安全登录界面,采用MD5算法实现用户登录口令的安全认证。
Network security log management center is made up of transform module, statistics analysis module, and policy reconfiguration module.
网络安全日志管理中心由转换模块、统计分析模块和策略再配置模块组成。
This event should also be logged in the system, either by sending an email to the administrator, writing the event to a security log, or both.
这一事件也应该被记录在系统中,还要给管理员发送邮件,将事件写入安全日志。
This security mechanism could satisfied all needs a network management system requests on security, such as authorization and verification, confidentiality, integrity and security log.
所设计的安全机制能够满足网管系统安全性所需要的授权与验证、保密性、完整性、安全日志等要求。
Centralizing the implementation of security policies, log analysis and reporting is a good thing.
安全策略、日志分析与报告的中心化实现是个不错的主义。
If an attempt is made to send a log when all security servers are not working correctly, the log is stored in a temporary file on the agent.
如果在所有安全服务器都未正常运行时尝试发送日志,那么日志就被存储到代理的临时文件中。
Check the administrative log for messages specific to security plug-ins.
检查管理日志中与安全性插件相关的消息。
For instance, one log message might be produced for security advisors, while another could be produced to aid performance tuning.
举例来说,一条日志消息可能是为安全顾问产生的,而另外一条日志消息则可能是会为了帮助进行性能调优而产生的。
The Security Architect will log into the TSPM UI and author a policy which requires that messages are encrypted and authenticated with a SAML assertion.
安全架构师将登录到TSPMUI并编写一个策略,该策略要求通过SAML断言对消息进行加密和身份验证。
The file my-realm.xml defines three GBeans that coordinate authentication type, login usage, and the security realm users log in to.
文件my - realm . xml定义了三个GBeans用来协调身份验证类型、登录用法以及用户登录到的安全领域。
You create a simple login system where users can visit and log in using form-based authentication and J2EE declarative security using Geronimo's SQLLoginModule.
将使用Geronimo的SQLLoginModule创建一个简单的登录系统,用户可以用基于表单的认证和J2EE声明式安全性访问和登录系统。
Last week, the UK Guardian newspaper reported that security researchers had discovered a log of locations being locally cached on an iPhone 4, from a report posted at o 'reilly.
英国卫报上周报,o ' Reilly上一则新闻报道有安全研究员在iPhone4的本地缓存中查到一组位置信息。
A good security analyst also needs to employ a good auditing tool, such as Tacacs +, to log attacks.
一名优秀的安全分析师还需要使用一种好的审计工具(如tacacs +)来记录攻击。
This my-realm GBean specifies the domain that users log in to and defines the System and Security modules.
这个my - realmGBean指定用户登录到的域并且定义System和Security模块。
Based on the security mode for your CLR assembly, you can execute SQL using ADO.NET, send E-mail, log events, and perform any other action that is available to you through the.net framework.
根据CLRassembly的安全模式,您可以使用ADO.NET执行SQL、发送e - mail、记录事件和执行. NETframework允许的任何其他操作。
Log on to the administration console (if you haven't configured security, then you can use any user ID).
登录管理控制台(如果没有配置安全性,则可以使用任何用户ID)。
The log should show what type security problem a cloud service type had and when and how the problem was fixed.
日志应该显示一个云服务类型拥有何种类型的安全问题,以及该问题是在何时和如何修复的。
The log file can provide hints on potential problems, faults, security lapses and, if used correctly, can even help provide warnings on load and capacity of your servers.
日志文件可以提供关于潜在问题、错误和安全漏洞等方面的提示,如果使用正确,甚至可以提供关于服务器负载和容量方面的警告。
There, you'll see an option to reset your security token and have it sent to your E-mail address. After you have your security token, use it in combination with your password to log in.
这里,可以看到一个重置安全令牌并将其发送到您的电子邮件地址的选项,有了安全令牌后,将它与您的密码一起用于登录。
If the log in is unsuccessful, you can edit the security realm and retest until it is successful.
如果登录成功,您可以编辑安全领域并重新测试,直到安全领域连接成功为止。
Very roughly, the idea is that the user will log in to the client, and then the client will make various security assertions to the server.
概括地讲,该思想就是用户登录到客户机,然后客户机向服务器做出各种安全断言。
Right, only log and diamond trucks. The latter resemble bakery delivery for security reasons.
猜对了,原木和钻石开采车。后者像面包运输车一样,是为了安全起见。
Putting the user's identity in the log messages can be a great help for a security-aware application.
将用户的标识放到日志消息中,这对于对安全性敏感的应用程序是非常大的一个帮助。
However, as the amount of the log audit date is too large, we can apply data mining technology into security mode rule extraction.
但由于这些日志审计数据量非常庞大,因此采用数据挖掘技术从中进行安全模式规则的提取。
For audit to understand how to print each object as a record to the audit log, it needs a corresponding entry in the /etc/security/events file.
为了让审计系统了解如何将每个对象作为一条记录输出到审计日志中,需要使用 /etc/security/events文件中的相应条目。
In network system there is a large amount of log audit data which contain much information related to security.
网络系统中存在大量的日志审计数据,在这些日志审计数据中含有许多与安全有关的信息。
应用推荐