ssh服务器基于主机的配置。
ssh客户机基于主机的配置。
比较基于主机的认证和基于公钥的认证。
Comparing host-based authentication to public key-based authentication.
然而,基于主机的认证只是在两个受信任的主机之间被允许。
However, host-based authentication is only allowed between two trusted hosts. This trust is based on two criteria.
ssh客户机现在已经被配置为允许基于主机的认证。
The SSH client has now been configured to allow host-based authentication.
有两种基本类型的入侵检测:基于主机的和基于网络的。
There are two basic types of intrusion detection: host-based and network-based.
基于主机的入侵防护系统(HIPS)技术保护网络边界…
Host -based intrusion -prevention system (HIPS ) technology protects endpoints behind the network perimeter .
满足这些需求的第一组工具是系统审计和基于主机的入侵检测。
The first tools for meeting these requirements are system auditing and host-based intrusion detection.
我选择了RPGIV自由格式样式作为我的基于主机的编程语言。
I have chosen RPG IV free format style as my host based programming language.
使用MQSeries是与基于主机的应用程序交互的一种方式。
Using MQSeries is one way to interact with mainframe-based applications.
OpenSSH支持两种类型的加密,即基于主机的认证和公钥认证。
OpenSSH supports two types of encryption, namely host-based authentication and public-key authentication.
即使用户采用公共密钥或基于主机的身份验证,也会执行这个密码检查。
This password check is done even if the user is following the public key or host-based authentication.
现有的基于主机的应用程序和企业数据都可以通过一组访问服务从ESB访问。
Existing host-based applications and enterprise data are accessible from the ESB through a set of access services.
使用ssh的基于主机的认证和基于公钥的认证都比基于rshrhost的认证安全。
Both host-based and public key-based authentication using SSH are more secure than RSH rhost-based authentication.
文件系统完整性校验是一种基于主机的入侵检测技术,可以检测出入侵者对主机文件的非法修改。
File system integrity checkout is a host-based intrusion detection technique which can check out the unauthorized modification of the host files by intruders.
而且,不需要root授权就可以设置基于公钥的认证(部分基于主机的认证需要root访问)。
Also, you do not need to have root authority to set up public key-based authentication (portions of the host-based authentication setup require root access).
它将基于网络和基于主机的入侵检测系统有机地结合在一起,提供集成化的检测、报告和响应功能。
It combines the network based IDS and host based IDS into a system, and provides detection, report and response together.
监视程序行为是近年基于主机的异常入侵检测的研究热点,构建程序行为模型是进行异常检测的关键。
Monitoring program behavior is one of the highlighted research topics of host-based anomaly detection recently. The key is to construct a program behavior-based anomaly detection model.
当可信主机上的用户希望登录远程计算机(可以是不可信的系统)时,使用SSH中基于主机的身份验证。
Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.
对sshd_config的上述更新将允许ssh服务器接受来自ssh客户机的基于主机的认证请求。
This update to sshd_config will allow the SSH server to accept host-based authentication requests from the SSH clients.
MQSeries/JCA/CCF:现有的基于主机的服务可以公开为Web 服务,从而向外界展示它们。
MQSeries/JCA/CCF: Existing mainframe-based services can be exposed as web services, thus revealing them to the outside world.
代理体系的引入,将基于主机的入侵检测和基于网络的入侵检测灵活地融为一体,形成一个统一的入侵检测系统。
Due to the agent system, A_DTDS comes into being a uniform intrusion detection system that is competent for the task of host-based and network-based intrusion detection.
根据以上背景,本文通过自主开发和设计实现了基于主机的银行业务系统,并在此基础上提出了查询优化的策略方案。
Based on the above background, this pape designs and achieves a mainframe-based banking system by self-development, then proposes some query optimization strategy based on the system.
本文采用三层架构模式对基于主机的银行业务系统的整体框架进行了设计,并且设计了一套良好的用户接口与程序接口。
This thesis USES three-tier model to design the mainframe-based banking system's overall framework, and design a good user interface and programming interface.
恶意代码的检测技术主要分为基于主机的和基于网络节点的检测,本文主要研究针对基于主机的高隐藏性木马的检测技术。
Malware detection techniques can be divided into host-based and network-based, this paper mainly focuses on studies of host-based deep hidden Trojan detection techniques.
本文描述如何配置基于主机的和PAM身份验证方法,以及在IBM支持的OpenSSH版本中新增的一些特性和配置选项。
This article describes how to configure host-based and PAM authentication and some of the new features and configuration options added in the IBM-supported version of OpenSSH.
为了让DB 2UDBD PF实例使用基于主机的认证,实例中的每个主机必须正确地配置ssh客户机和ssh服务器。
For your DB2 UDB DPF instance to use host-based authentication, each host in the instance must have the SSH client and SSH server configured properly.
本质上,单个基于格式的Handlder程序能够服务于多个使用各种UPDATE方法的基于主机的RPG 5250程序。
In essence, a single format-based handler program is able to service multiple host based RPG 5250 programs using a variety of UPDATE methods.
在很多基于主机的系统中(甚至一些客户端/服务端系统),这两种机制在某些情况下是通过同样的物理硬件和同样的软件来执行的。
In many host-based systems (and even some client/server systems), the two mechanisms are performed by the same physical hardware and, in some cases, the same software.
在很多基于主机的系统中(甚至一些客户端/服务端系统),这两种机制在某些情况下是通过同样的物理硬件和同样的软件来执行的。
In many host-based systems (and even some client/server systems), the two mechanisms are performed by the same physical hardware and, in some cases, the same software.
应用推荐