• 因为可以显示系统活动,所以对日志文件的访问通常受到限制只有超级用户才可以访问。

    Because system activity can be revealing, logs here are typically restricted and available to superusers only.

    youdao

  • 关于系统典型审计日志文件,参见清单1它还显示了记录的追踪部分

    A typical audit log file on my system is shown in Listing 1; it shows the trail record, as well.

    youdao

  • 这时很有可能访问TrackOrderWeb页面系统在这个页面上显示处理定单期间发生事件日志

    At this point you will most likely visit the TrackOrder Web page, where the system will display a log of the events which transpired during the processing of the order.

    youdao

  • 启动流程系统日志显示只有第一行为可以执行如图16所示。

    After starting the process the system log shows that only the first activity has been executed as shown in Figure 16.

    youdao

  • 日志显示系统编辑器中,如图16所示。

    The log displays in the system editor, as shown in Figure 16.

    youdao

  • 系统显示系统活动运行日志

    System presents the running log of the system activity.

    youdao

  • 清单5显示一个Linux系统其中意外删除了Apache日志使用grep工具查找是否有人打开了该文件。

    Listing 5 shows a Linux system where an Apache log has accidentally been deleted, and I am using the grep tool to find out if anyone has it open.

    youdao

  • 例如清单1显示GentooLinux系统日志文件列表

    For example, Listing 1 shows a list of logs located on a Gentoo Linux system.

    youdao

  • 显示系统当前严重警报事件日志消息性能计数器

    Displays your system's current critical alerts, event log messages, performance, and counters.

    youdao

  • 功能主要包括车辆运行中定位地图显示、车辆管理计费、报表管理、系统日志管理在线注册

    Function mainly including in the vehicle operates making a reservation, map showing, vehicle managing, charges, the managing, systematic daily record management and registering etc.

    youdao

  • 系统实现数据分析处理以及对非法数据实时发现显示,同时存入日志满足入侵检测系统的基本功能需求

    The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.

    youdao

  • 系统实现数据分析处理以及对非法数据实时发现显示,同时存入日志满足入侵检测系统的基本功能需求

    The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定