• 在遭到破坏系统查找相关内容非常有用的内容因为攻击者通常会删除日志隐藏他们踪迹

    This is a handy thing to look for when investigating a compromised system because attackers often delete logs to hide their tracks.

    youdao

  • 然后文件系统来执行文件操作事务一旦操作完成,相关日志日志文件中删除

    Then the file system "plays" each operation or transaction and once the operation is completed it is deleted from the journal.

    youdao

  • 系统不再存在属于模式日志记录时,影子复制自动删除系统中就只有新的复制

    After the log records pertaining to older schema no longer exist in the system, the shadow replicate is automatically deleted and system only has new master replicates.

    youdao

  • 清单5显示了一个Linux系统其中意外删除Apache日志使用grep工具查找是否有人打开了该文件。

    Listing 5 shows a Linux system where an Apache log has accidentally been deleted, and I am using the grep tool to find out if anyone has it open.

    youdao

  • 如果文件系统利用率达到80%,那么checkspace就会运行logrotate,后者会根据需要压缩删除日志文件

    If more than 80 percent of the filesystem is full, checkspace runs logrotate, which compresses and prunes log files as necessary.

    youdao

  • 因此保护系统日志安全内部用户外部入侵者修改删除显得尤为重要。

    So it is vital to protect system logs without being modified or deleted by inside users or outside intruders.

    youdao

  • 因此保护系统日志安全内部用户外部入侵者修改删除显得尤为重要。

    So it is vital to protect system logs without being modified or deleted by inside users or outside intruders.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定