最后,从用户密码保护、登录过程的安全性和登录日志的实现三个方面介绍了管理系统所采取的安全设计方法。
The security design means of management system are introduced from three parts, they are protecting user password, logging process safety & the implementation of logging in.
这些文件包含用户登录和系统数据日志。
但是您可能并不始终具有访问日志的权限,或者并不总是能够登录到浏览器来获取信息。
But, you may not always have access to the logs or want to be logged in to your browser to get the information.
要详细了解sqlserver 2008为何无法让sqlserveruser登录,可以检查sql server 2008上的日志文件。
To get more details on why SQL server 2008 failed to login sqlserveruser, you can review the log files on SQL server 2008.
与上一个示例一样,您需要检查sqlserver上的日志文件,了解sqlserveruser登录失败的具体原因(见图11)。
As with the previous case, you'll need to review the log files on SQL server to get more details on why it failed to login sqlserveruser (Figure 11).
同样,每当用户登录门户或从门户注销,会话日志记录器都会创建一个记录。
Likewise, the session logger creates a record whenever a user logs in or out of the portal.
这一变更可以帮助您调试有关单点登录的问题,而无需淹没于无关的日志文件中。
This change helps you debug problems with single sign-on without drowning yourself in unrelated log files.
协调器没有登录任何有关该事务的日志,所以不需要做什么。
Coordinator hadn't logged anything concerning this transaction, so it has nothing to do.
它涵盖任何安全管理解决方案都具有的要素,比如用户认证、访问权限控制、审计、单点登录、高可用性和日志记录。
This includes authentication of users, control of access privileges, auditing, single sign-on, high availability, and logging that are elements of any security management solution.
为进一步增强安全性,您还可实现登录尝试失败的日志记录。
To further increase security, you can implement logging of failed login attempts.
考虑从即时消息日志、电话记录或其他来源中提取登录时间及活动时间,构建附加数据集及重叠数据集。
Consider extracting login and activity times from your instant messaging logs, phone records, or other sources to build additional and overlapping data sets.
检查系统日志中的重要消息,比如失败的登录尝试和出现问题的守护进程。
Watch syslog for important messages, such as failed login attempts and daemons with errors.
会话日志程序—跟踪登录和注销命令。
支持对所有登录尝试的日志记录进行审核。
拒绝连接请求登录与日志级别信息(默认激活) ,其原因就块。
Rejected CONNECT requests are logged with log level info (enabled by default) and the reason for the block.
用户登录后可以进行发表日志、当然用户有对自己发表的日志的修改和删除的权限。
After the user logs can be published logs, of course, the user logs own posts and modify, and delete permissions.
此算法会导致安全日志填满,与密码无效的登录尝试。
This algorithm resulted in security logs filling up with "invalid password" logon attempts.
通过日志和审计,你可以找出是否有人试图登录路由器或者试图进行管理员账户登录。
Pass log and audit, you can be found out whether somebody tries to log onto a road by implement perhaps try to undertake administrator account logins.
该系统为用户提供了在网上展现自己的平台,主要功能有用户注册、登录、用户博客管理、浏览日志和评论等功能。
Functions of delivering a new log, modifications and deletions of logs and comments and user info is provided in manage system for users.
用户操作日志包括用户管理日志、黑车日志、登录注销日志的后台自动产生功能的设计与实现,以及用户对日志信息的查询、备份、导出等功能的设计与实现。
This part not only implements function of user management logs, black car logs, login and logout logs to automatically produce, but also logs query, logs backup, logs export etc for users.
最后,最后一行显示了用户的AP要么不登录或已被删除从日志以后。
Finally, the last line shows that a user 'ap' has either not logged in or was deleted later on from the log.
最后,最后一行显示了用户的AP要么不登录或已被删除从日志以后。
Finally, the last line shows that a user 'ap' has either not logged in or was deleted later on from the log.
应用推荐