本文的第二个工作是用户操作日志的设计与实现。
The second job of this paper is design and implement of users operation logs.
用户操作日志包括用户管理日志、黑车日志、登录注销日志的后台自动产生功能的设计与实现,以及用户对日志信息的查询、备份、导出等功能的设计与实现。
This part not only implements function of user management logs, black car logs, login and logout logs to automatically produce, but also logs query, logs backup, logs export etc for users.
探测器在操作系统内核级上监视所有数据库事务,包括特权用户的事务,而不依赖于数据库审计日志。
The probes monitor all database transactions, including those of privileged users, at the operating system kernel level without relying on database audit logs.
管理员有权查看公司所有用户的操作日志。
The administrator has the privileges to view the operation logs of all users of his company.
Linux操作系统中有很多文件:配置文件、文本文件、文档文件、日志文件、用户文件,这个清单还在不断增长。
The Linux operating system is loaded with files: configuration files, text files, documentation files, log files, user files, and the list goes on and on.
mqsilist之类的查询操作也是部署消息,因此也会在用户日志中看到相应的部署信息。
Querying operations like mqsilist is also a deploy message so you would notice deployment information in the userlog.
这个选项可以对任何用户的键盘操作进行日志记录,它可以配置为在本地存储审计信息,也可以使用KornShell连网功能执行远程存储。
This option enables keyboard logging of any user and can be configured to store the audit information locally or remotely using Korn Shell networking.
Logging:此视图提供了一个集中式用户界面,此界面包含每个VM的特定于操作系统、特定于中间件和特定于Workload Deployer代理的日志的集合。
Logging: This view provides a centralized user interface with a collection of OS-specific, middleware-specific, and Workload Deployer agent-specific logs for each VM.
检索方式:按录像时间、地点进行检索,可检索录像文件,图片及用户操作和报警日志。
Retrieve Methods: Both the record timer and the record sites could be the retrieve conditions, the retrieve objects are recorded files, pictures and user's operation records and warning logs.
有没有任何解决方案如何操作在页面作为日志用户?
Is there any solution how to manipulate in page as logged user?
安全审计系统能够及时地将用户操作以日志的形式记录下来,并且对违规操作进行阻断,日志信息可以为事后取证提供证据。
Security audit system can record the user's actions and block the user's illegal operations in a timely manner. The log information can provide evidence for the computer forensics.
如果因出错而无法完成重构操作,则有关该错误的信息将写入应用程序事件日志中,对此应用程序事件日志拥有“普通用户”权限的任何用户都可以查看该信息。
If an error prevents a refactoring operation from completing, information about the error is written to the application event log, where any user who has "Normal user" permissions can view it.
如果因出错而无法完成重构操作,则有关该错误的信息将写入应用程序事件日志中,对此应用程序事件日志拥有“普通用户”权限的任何用户都可以查看该信息。
If an error prevents a refactoring operation from completing, information about the error is written to the application event log, where any user who has "Normal user" permissions can view it.
应用推荐