网络信息安全包括主机安全和网络安全两部分。
The security of Internet information include two components: security of host computor and security of network.
那些系统的主机安全性经常会阻止攻击者获得对主机的控制权。
Frequently, the host security of those systems will prevent attackers from gaining control over a host.
模型以多级安全策略为基础,以全面增强主机安全。
This model based on the multilevel security policy, to increase host security in every aspects.
对生产控制层的主机安全防护主要是对工作站主机进行保护。
The main protection of the production control layer is to protect the host of the workstation.
选择安全的口令是一种最常见和最重要的保护主机安全的方法。
The selection of safe password is one of the most common and important methods of protecting computers safety.
安全扫描器是自动检测远端或本地网络和主机安全脆弱点的软件。
Security scanner is a program which can check automatically vulnerabilities of remote or local networks and hosts.
移动代理的安全问题分主机安全与代理安全两类,综述了后一种安全问题。
The security of mobile agent can be classified into two catalogs: host security and agent security.
从企业网角度上还可以分为,接入点安全、网络设备安全和内部主机安全。
From the Angle of enterprise network, it includes security of connection, security of the network equipments and security of internal host computer.
目前,主机安全检测方式主要有利用自动化漏洞扫描工具进行检测和人工检测两种。
At present, there are two main methods of host security detection. One is detection by using automated vulnerability scanning tools, the other is manual detection.
文章提出一种主机安全的模型框架,力图同时防范来自内、外部的攻击,全面增强主机安全。
The paper presents a model of host (server) security trying to check attacks from both outsiders and insiders and to increase host security in every aspects.
油滤芯的作用是滤除空压机专用油中的金属颗粒、杂质等,使进入主机的油是非常干净的,以保护主机安全运行。
Oil filter's role is to filter out the air compressor for oil metal particles, the impurities, so as to make into the host is very clean oil, to protect the host safety operation.
主机安全正成为每一个计算机用户都面临的紧迫问题,主机漏洞扫描技术就是为主机安全提供保证的一项重要的安全技术。
Host security is becoming an urgent problem that every computer user has to face. Host hole scanning technique is an important security technology to provide security guarantee for host.
如果可以在不串行化的情况下将数据返回到客户机,那么,通过直接绑定到一个XML输出主机变量,这是避免任何替换字符的最安全的方法。
If it is possible to return the data to the client without serialization, by binding directly to an XML output host variable, this is the safest way to avoid any kind of substitution character.
SSH可以提供到远程主机的安全加密连接。
Using SSH allows for secure encrypted connections to remote hosts.
集中工具终止安全数据中心中特定主机上的管理访问路径,这随后将利用中介传递通过轻量级客户机(如浏览器)进行的访问。
Central tools terminate that administrative access path onto specific hosts in a secured data center, which then mediate access through a lightweight client, such as a browser.
其结果是,由于对单个专区的修改并不会影响到其他主机,所以交换机的管理更加安全。
As a result of this, the management of the switch becomes safer, because modifying each individual zone does not affect the other hosts.
注意:如果您配置了远程CEI服务器,则必须修改CEI选项,以显示远程主机名、R mi端口和安全设置。
Note: if you have configured a remote CEI server, you must modify the CEI options to specify the remote host name, RMI port and security Settings.
从数据库中获取XML 的最安全的方法是将值取出到一个 XML 本地类型主机变量中。
The safest way to fetch XML from a database is into an XML native type host variable.
选择这种数据的惟一安全的方法是将它绑定到一个BLOB主机变量或一个BLOB FILE主机变量,以便将它写到一个XML文件中。
The only safe way to select this data is to bind it into a BLOB host variable, or a BLOB file host variable, to write it into an XML file.
会话安全由SSL/TLS 保证,并且只允许来自指定主机或地址范围的连接。
The session is secured by use of SSL/TLS and can be restricted to permit connections only from specified hosts or address ranges.
SSH (OpenSSH)提供到远程主机的安全加密连接。
SSH (OpenSSH) provides a secure encrypted connection to remote hosts.
在仍然向您的用户提供高性能、可靠性和易用性的同时,这些技巧可以帮助确保以Domino 为主机的Web站点尽可能安全。
These tips can help ensure that your Domino-hosted Web sites are as secure as possible, while still providing high performance, reliability, and ease-of-use to your users.
当secfsd进程启动时,与主机相关的所有策略都通过vmd进程从安全服务器获取,并且策略被缓存到内存中。
When a secfsd process starts, all policies related to the host are retrieved from the security server via a VMD process, and the policies are cached in memory.
对于Version 6.1来说有点特殊,它具有一种“缺省安全”的新的安全基础结构,并且包括了证书的生成(使用主机名)。
Specific to Version 6.1, there is a new security infrastructure in that is "secure by default," and includes certificate generation (with host names).
使用ssh的基于主机的认证和基于公钥的认证都比基于rshrhost的认证安全。
Both host-based and public key-based authentication using SSH are more secure than RSH rhost-based authentication.
使用以下命令设置代理以指定主机名、不安全端口和安全端口的值。
Set up the proxies using the following command to specify the values of the host name, the insecure port and secured port.
主机PaaS自身可以固化为一个盒子(设备),带有单纯作为安全控制和客户端定制提交访问门户输出的基于 web 的管理控制台。
The hosting PaaS itself can be hardened as a box (appliance) with a web-based administration console exposed as solely an access portal for security control and client-side customization submissions.
通过使用TCPWrappers,或 wrappers,可以轻松地保护您的主机,在客户端接入时,守护进程能安全使用。
Using TCP Wrappers, or wrappers, is an easy way to protect and secure your machines based on daemon use and where the client is coming from.
通过使用TCPWrappers,或 wrappers,可以轻松地保护您的主机,在客户端接入时,守护进程能安全使用。
Using TCP Wrappers, or wrappers, is an easy way to protect and secure your machines based on daemon use and where the client is coming from.
应用推荐