因此,对主机日志的安全保护直接关系到计算机系统的安全。
So, Log's security on host is directly related to the security of computer systems.
主机日志的分析方法有很多,文章对这些方法进行了分类并对它们进行了详细的讨论。
There exists many methods for analysis of host audit trails, these methods are classified and discussed in this paper.
这个白皮书提供了关于日志和rsyslog的详细介绍,包括配置和复杂的多主机日志网络。
This white paper provides a detailed introduction to logging and rsyslog, including configuration and complex multi-host logging networks.
出现这种情况时,可以通过IP地址或主机名称选中这台组件机,以查看失败配置的详细日志和跟踪文件。
When this happens, select the component machine by IP address or host name to see the detail log and trace files for the failure.
脚本运行之后,主机之上的日志就会出现了。
The log on the master machine will show after the script has run.
服务器P在主机p上运行,且对其恢复日志文件持有排它文件锁定。
Server P is running on host P and holds an exclusive file lock for its own recovery log files.
在这种环境中保存日志消息的一种简单方法是将它们保存到主机特定的日志文件中。
A simple way to store log messages in this environment is to store them in their host-specific log files.
通常,这会通过电子邮件或直接记录关于某个主机被拒绝或被允许的消息到日志文件中。
Typically, this would be used to either email or log a message to a log file about a certain host (s) being denied or allowed. The basic format of the spawn option is.
如果您不知道自己的主机名,则可以在CastIron错误日志中找到它。
If you do not know your host name, you can find it by looking in the Cast Iron error log.
检查blade2主机上的日志文件 /opt/ibm/director/am/logs/aminfr.log,查看创建过程是否完成
Check the log file /opt/ibm/director/am/logs/aminfr.log on the host blade2 to see if the creation process is finished when you see these logs
承载数据库的LDAP的主机名在WebSphere 中配置,并作为二进制条目包含在事务日志中。
The host name of the LPAR that hosts the database is configured in WebSphere and is contained as a binary entry in the transaction logs.
除了脚本包日志外,还要注意Generalinformation部分下的Locatedat字段中的主机名。
In addition to the script package logs, make note of the hostname in the Located at field under the General information section above.
例如,文件系统开发者可能会设计出一种日志,该日志存储在主机文件系统上需要修改的字节范围。
For example, a filesystem developer could design a journal that stores spans of bytes that need to be modified on the host filesystem.
GRANT:为任意主机上的任意用户提供访问db2备份镜像和日志文件的能力,这些镜像和日志文件与发出GRANT选项的节点上生成的数据库有关。
GRANT: Provides any user on any host the ability to access the db2 backup images and log files associated with databases generated on the node issuing the GRANT option.
如果您有多个虚拟主机服务器的名称记录(应为每个主机设定)会帮助你看到哪些连接,用于记录到的地点在相同的访问日志。
If you have multiple virtual hosts logging to the same access log, recording the server name (which should be set for each host) will help you see which connection was for which site.
最后,放置后门程序,擦除入侵痕迹,清理日志,新建账号,获取或修改信息、网络监听(sniffer)、攻击其他主机或者进行其他非法活动。
Finally, placed backdoor, erasing invasion, cleaning log, new traces, acquiring or modify account information, network monitor (sniffer), against other host or other illegal activities.
最后,放置后门程序,擦除入侵痕迹,清理日志,新建账号,获取或修改信息、网络监听(sniffer)、攻击其他主机或者进行其他非法活动。
Finally, placed backdoor, erasing invasion, cleaning log, new traces, acquiring or modify account information, network monitor (sniffer), against other host or other illegal activities.
应用推荐