• 本文第二工作用户操作日志设计实现

    The second job of this paper is design and implement of users operation logs.

    youdao

  • 用户操作日志包括用户管理日志黑车日志登录注销日志后台自动产生功能的设计实现以及用户日志信息的查询备份导出功能的设计与实现。

    This part not only implements function of user management logs, black car logs, login and logout logs to automatically produce, but also logs query, logs backup, logs export etc for users.

    youdao

  • 探测器操作系统内核级上监视所有数据库事务包括特权用户事务,而不依赖于数据库审计日志

    The probes monitor all database transactions, including those of privileged users, at the operating system kernel level without relying on database audit logs.

    youdao

  • 管理员有权查看公司所有用户操作日志

    The administrator has the privileges to view the operation logs of all users of his company.

    youdao

  • Linux操作系统很多文件配置文件、文本文件、文档文件、日志文件、用户文件,这个清单不断增长。

    The Linux operating system is loaded with files: configuration files, text files, documentation files, log files, user files, and the list goes on and on.

    youdao

  • mqsilist之类查询操作也是部署消息因此用户日志中看到相应的部署信息

    Querying operations like mqsilist is also a deploy message so you would notice deployment information in the userlog.

    youdao

  • 这个选项可以任何用户键盘操作进行日志记录,它可以配置在本地存储审计信息可以使用KornShell连网功能执行远程存储。

    This option enables keyboard logging of any user and can be configured to store the audit information locally or remotely using Korn Shell networking.

    youdao

  • Logging视图提供了一个集中式用户界面,此界面包含每个VM特定于操作系统、特定于中间件特定于Workload Deployer代理的日志集合

    Logging: This view provides a centralized user interface with a collection of OS-specific, middleware-specific, and Workload Deployer agent-specific logs for each VM.

    youdao

  • 检索方式:按录像时间、地点进行检索,检索录像文件图片用户操作报警日志

    Retrieve Methods: Both the record timer and the record sites could be the retrieve conditions, the retrieve objects are recorded files, pictures and user's operation records and warning logs.

    youdao

  • 有没有任何解决方案如何操作页面作为日志用户

    Is there any solution how to manipulate in page as logged user?

    youdao

  • 安全审计系统能够及时用户操作日志的形式记录下来并且违规操作进行阻断日志信息可以事后取证提供证据

    Security audit system can record the user's actions and block the user's illegal operations in a timely manner. The log information can provide evidence for the computer forensics.

    youdao

  • 如果出错而无法完成重构操作,则有关错误信息写入应用程序事件日志中,对此应用程序事件日志拥有普通用户权限任何用户可以查看信息。

    If an error prevents a refactoring operation from completing, information about the error is written to the application event log, where any user who has "Normal user" permissions can view it.

    youdao

  • 如果出错而无法完成重构操作,则有关错误信息写入应用程序事件日志中,对此应用程序事件日志拥有普通用户权限任何用户可以查看信息。

    If an error prevents a refactoring operation from completing, information about the error is written to the application event log, where any user who has "Normal user" permissions can view it.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定