因为可以显示系统活动,所以对日志文件的访问通常会受到限制,只有超级用户才可以访问。
Because system activity can be revealing, logs here are typically restricted and available to superusers only.
关于系统上典型的审计日志文件,参见清单1;它还显示了记录的追踪部分。
A typical audit log file on my system is shown in Listing 1; it shows the trail record, as well.
这时,您很有可能访问TrackOrderWeb页面,系统在这个页面上显示在处理定单期间发生的事件的日志。
At this point you will most likely visit the TrackOrder Web page, where the system will display a log of the events which transpired during the processing of the order.
启动该流程后,系统的日志显示只有第一个行为可以执行,如图16所示。
After starting the process the system log shows that only the first activity has been executed as shown in Figure 16.
该日志将显示在系统编辑器中,如图16所示。
The log displays in the system editor, as shown in Figure 16.
系统显示系统活动的运行日志。
清单5显示了一个Linux系统,其中意外地删除了Apache日志,我正使用grep工具查找是否有人打开了该文件。
Listing 5 shows a Linux system where an Apache log has accidentally been deleted, and I am using the grep tool to find out if anyone has it open.
例如,清单1显示了GentooLinux系统上的日志文件列表。
For example, Listing 1 shows a list of logs located on a Gentoo Linux system.
显示系统当前严重警报、事件日志消息、性能和计数器。
Displays your system's current critical alerts, event log messages, performance, and counters.
功能主要包括车辆运行中定位、地图显示、车辆管理、计费、报表管理、系统日志管理及在线注册等。
Function mainly including in the vehicle operates making a reservation, map showing, vehicle managing, charges, the managing, systematic daily record management and registering etc.
系统实现了对数据的分析、处理以及对非法数据的实时发现和显示,同时存入日志,满足了入侵检测系统的基本功能需求。
The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.
系统实现了对数据的分析、处理以及对非法数据的实时发现和显示,同时存入日志,满足了入侵检测系统的基本功能需求。
The system can be data analysis and process, detection and display of illegal data and storage of suspicious data into log file, the system satisfies intrusion detection system of requirements.
应用推荐