• ssh服务器基于主机的配置

    SSH server host-based configuration.

    youdao

  • ssh客户机基于主机的配置

    SSH client host-based configuration.

    youdao

  • 比较基于主机的认证基于公钥的认证。

    Comparing host-based authentication to public key-based authentication.

    youdao

  • 然而基于主机认证只是两个受信任主机之间被允许

    However, host-based authentication is only allowed between two trusted hosts. This trust is based on two criteria.

    youdao

  • ssh客户机现在已经被配置允许基于主机的认证

    The SSH client has now been configured to allow host-based authentication.

    youdao

  • 两种基本类型入侵检测基于主机的基于网络的。

    There are two basic types of intrusion detection: host-based and network-based.

    youdao

  • 基于主机入侵防护系统HIPS技术保护网络边界

    Host -based intrusion -prevention system (HIPS ) technology protects endpoints behind the network perimeter .

    youdao

  • 满足这些需求第一工具系统审计基于主机入侵检测

    The first tools for meeting these requirements are system auditing and host-based intrusion detection.

    youdao

  • 选择RPGIV自由格式样式作为基于主机的编程语言

    I have chosen RPG IV free format style as my host based programming language.

    youdao

  • 使用MQSeries基于主机的应用程序交互一种方式

    Using MQSeries is one way to interact with mainframe-based applications.

    youdao

  • OpenSSH支持两种类型加密基于主机的认证公钥认证。

    OpenSSH supports two types of encryption, namely host-based authentication and public-key authentication.

    youdao

  • 即使用户采用公共密钥基于主机身份验证,也会执行这个密码检查

    This password check is done even if the user is following the public key or host-based authentication.

    youdao

  • 现有基于主机应用程序企业数据可以通过访问服务ESB访问

    Existing host-based applications and enterprise data are accessible from the ESB through a set of access services.

    youdao

  • 使用ssh基于主机认证基于公钥的认证基于rshrhost的认证安全

    Both host-based and public key-based authentication using SSH are more secure than RSH rhost-based authentication.

    youdao

  • 文件系统完整性校验一种基于主机入侵检测技术可以检测入侵者主机文件非法修改

    File system integrity checkout is a host-based intrusion detection technique which can check out the unauthorized modification of the host files by intruders.

    youdao

  • 而且需要root授权就可以设置基于公钥认证(部分基于主机认证需要root访问)。

    Also, you do not need to have root authority to set up public key-based authentication (portions of the host-based authentication setup require root access).

    youdao

  • 基于网络基于主机入侵检测系统有机地结合在一起提供集成化的检测报告和响应功能。

    It combines the network based IDS and host based IDS into a system, and provides detection, report and response together.

    youdao

  • 监视程序行为近年基于主机异常入侵检测研究热点构建程序行为模型是进行异常检测的关键

    Monitoring program behavior is one of the highlighted research topics of host-based anomaly detection recently. The key is to construct a program behavior-based anomaly detection model.

    youdao

  • 可信主机用户希望登录远程计算机(可以可信系统)时,使用SSH基于主机身份验证

    Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.

    youdao

  • 对sshd_config的上述更新允许ssh服务器接受来自ssh客户机基于主机的认证请求

    This update to sshd_config will allow the SSH server to accept host-based authentication requests from the SSH clients.

    youdao

  • MQSeries/JCA/CCF现有基于主机的服务可以公开Web 服务,从而外界展示它们

    MQSeries/JCA/CCF: Existing mainframe-based services can be exposed as web services, thus revealing them to the outside world.

    youdao

  • 代理体系引入,将基于主机入侵检测基于网络的入侵检测灵活地融为一体,形成一个统一的入侵检测系统

    Due to the agent system, A_DTDS comes into being a uniform intrusion detection system that is competent for the task of host-based and network-based intrusion detection.

    youdao

  • 根据以上背景本文通过自主开发设计实现基于主机银行业务系统基础提出查询优化策略方案

    Based on the above background, this pape designs and achieves a mainframe-based banking system by self-development, then proposes some query optimization strategy based on the system.

    youdao

  • 本文采用三层架构模式基于主机银行业务系统整体框架进行了设计并且设计了一良好用户接口程序接口。

    This thesis USES three-tier model to design the mainframe-based banking system's overall framework, and design a good user interface and programming interface.

    youdao

  • 恶意代码检测技术主要分为基于主机基于网络节点的检测,本文主要研究针对基于主机的隐藏性木马的检测技术。

    Malware detection techniques can be divided into host-based and network-based, this paper mainly focuses on studies of host-based deep hidden Trojan detection techniques.

    youdao

  • 本文描述如何配置基于主机的PAM身份验证方法,以及IBM支持OpenSSH版本中新增的一些特性配置选项

    This article describes how to configure host-based and PAM authentication and some of the new features and configuration options added in the IBM-supported version of OpenSSH.

    youdao

  • 为了DB 2UDBD PF实例使用基于主机认证,实例中的每个主机必须正确地配置ssh客户机ssh服务器。

    For your DB2 UDB DPF instance to use host-based authentication, each host in the instance must have the SSH client and SSH server configured properly.

    youdao

  • 本质单个基于格式的Handlder程序能够服务多个使用各种UPDATE方法基于主机RPG 5250程序

    In essence, a single format-based handler program is able to service multiple host based RPG 5250 programs using a variety of UPDATE methods.

    youdao

  • 很多基于主机系统中(甚至一些客户端/服务端系统),两种机制某些情况通过同样物理硬件同样的软件来执行的。

    In many host-based systems (and even some client/server systems), the two mechanisms are performed by the same physical hardware and, in some cases, the same software.

    youdao

  • 很多基于主机系统中(甚至一些客户端/服务端系统),两种机制某些情况通过同样物理硬件同样的软件来执行的。

    In many host-based systems (and even some client/server systems), the two mechanisms are performed by the same physical hardware and, in some cases, the same software.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定