• You cannot write to the Security log.

    无法写入安全性记录档

    youdao

  • And the system also provides certain support for the auditing function of security Log.

    系统安全日志审核功能提供了一定支持

    youdao

  • When the system security log reaches its maximum size it will stop recording security events.

    系统安全达到最大的限度时,停止记录安全事件。

    youdao

  • Most of the events below are in the Security log; many are only logged on the domain controller.

    以下安全日志中的绝大部分事件,部分仅仅控制器记录

    youdao

  • The design of a simulation system security log user interface, using MD5 algorithm users log on password security authentication.

    设计一个模拟系统用户安全登录界面采用MD5算法实现用户登录口令的安全认证

    youdao

  • Network security log management center is made up of transform module, statistics analysis module, and policy reconfiguration module.

    网络安全日志管理中心转换模块统计分析模块策略再配置模块组成。

    youdao

  • This event should also be logged in the system, either by sending an email to the administrator, writing the event to a security log, or both.

    事件应该记录系统中,还要管理员发送邮件,将事件写入安全日志

    youdao

  • This security mechanism could satisfied all needs a network management system requests on security, such as authorization and verification, confidentiality, integrity and security log.

    设计的安全机制能够满足网管系统安全性所需要的授权验证保密性完整性、安全日志要求

    youdao

  • Centralizing the implementation of security policies, log analysis and reporting is a good thing.

    安全策略日志分析报告中心化实现是个不错主义。

    youdao

  • If an attempt is made to send a log when all security servers are not working correctly, the log is stored in a temporary file on the agent.

    如果所有安全服务器正常运行尝试发送日志,那么日志就存储代理的临时文件

    youdao

  • Check the administrative log for messages specific to security plug-ins.

    检查管理日志中安全性插件相关消息

    youdao

  • For instance, one log message might be produced for security advisors, while another could be produced to aid performance tuning.

    举例来说,日志消息可能安全顾问产生的,另外一条日志消息则可能为了帮助进行性能调优而产生的。

    youdao

  • The Security Architect will log into the TSPM UI and author a policy which requires that messages are encrypted and authenticated with a SAML assertion.

    安全架构师登录TSPMUI并编写一个策略,该策略要求通过SAML断言对消息进行加密身份验证

    youdao

  • The file my-realm.xml defines three GBeans that coordinate authentication type, login usage, and the security realm users log in to.

    文件my - realm . xml定义了三个GBeans用来协调身份验证类型登录用法以及用户登录安全领域

    youdao

  • You create a simple login system where users can visit and log in using form-based authentication and J2EE declarative security using Geronimo's SQLLoginModule.

    使用GeronimoSQLLoginModule创建一个简单登录系统用户可以基于表单认证J2EE声明式安全性访问登录系统。

    youdao

  • Last week, the UK Guardian newspaper reported that security researchers had discovered a log of locations being locally cached on an iPhone 4, from a report posted at o 'reilly.

    英国卫报周报,o ' Reilly上一则新闻报道安全研究员iPhone4本地缓存中查到位置信息。

    youdao

  • A good security analyst also needs to employ a good auditing tool, such as Tacacs +, to log attacks.

    优秀安全分析师需要使用一种好的审计工具(tacacs +)记录攻击

    youdao

  • This my-realm GBean specifies the domain that users log in to and defines the System and Security modules.

    这个my - realmGBean指定用户登录并且定义SystemSecurity模块

    youdao

  • Based on the security mode for your CLR assembly, you can execute SQL using ADO.NET, send E-mail, log events, and perform any other action that is available to you through the.net framework.

    根据CLRassembly安全模式可以使用ADO.NET执行SQL发送e - mail记录事件执行. NETframework允许任何其他操作

    youdao

  • Log on to the administration console (if you haven't configured security, then you can use any user ID).

    登录管理控制台(如果没有配置安全性可以使用任何用户ID)。

    youdao

  • The log should show what type security problem a cloud service type had and when and how the problem was fixed.

    日志应该显示一个服务类型拥有何种类型的安全问题以及问题在何时如何修复的。

    youdao

  • The log file can provide hints on potential problems, faults, security lapses and, if used correctly, can even help provide warnings on load and capacity of your servers.

    日志文件可以提供关于潜在问题错误安全漏洞等方面提示如果使用正确甚至可以提供关于服务器负载容量方面警告

    youdao

  • There, you'll see an option to reset your security token and have it sent to your E-mail address. After you have your security token, use it in combination with your password to log in.

    这里可以看到一个重置安全发送电子邮件地址选项了安全令牌您的密码一起用于登录

    youdao

  • If the log in is unsuccessful, you can edit the security realm and retest until it is successful.

    如果登录成功可以编辑安全领域重新测试,直到安全领域连接成功为止。

    youdao

  • Very roughly, the idea is that the user will log in to the client, and then the client will make various security assertions to the server.

    概括地讲,思想就是用户登录客户机然后客户机服务器做出各种安全断言

    youdao

  • Right, only log and diamond trucks. The latter resemble bakery delivery for security reasons.

    猜对了,原木钻石开采车后者面包运输车一样,是为了安全起见。

    youdao

  • Putting the user's identity in the log messages can be a great help for a security-aware application.

    用户标识放到日志消息对于对安全性敏感应用程序非常大的一个帮助

    youdao

  • However, as the amount of the log audit date is too large, we can apply data mining technology into security mode rule extraction.

    由于这些日志审计数据非常庞大因此采用数据挖掘技术从中进行安全模式规则提取

    youdao

  • For audit to understand how to print each object as a record to the audit log, it needs a corresponding entry in the /etc/security/events file.

    为了让审计系统了解如何每个对象作为条记录输出审计日志中需要使用 /etc/security/events文件中的相应条目

    youdao

  • In network system there is a large amount of log audit data which contain much information related to security.

    网络系统存在大量日志审计数据,在这些日志审计数据中含有许多与安全有关信息

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定