目标站点向主体提供受保护的资源。
目标站点PEP检查该PDP的权限。
启动目标站点的文件系统,如清单12所示。
Start the file systems at the target site, as shown in Listing 12.
主体使用该标志向目标站点请求受保护的资源。
Subject makes a request to the target site for the secured resource using the token.
源站点根据标志向目标站点提供SAML验证断言。
The source site provides an SAML authentication assertion to the target site based on the token.
当用户单击这个超链接时,用户就会被推至目标站点。
When the user clicks the hyperlink, the user is forwarded to the target site.
如能跨多个目标站点执行内容分析,那么它将更为有效。
Content analysis is even more effective when you can perform it across multiple target sites.
主体向源站点验证并请求到目标站点受保护资源的链接。
Subject authenticates to the source site and requests a link to target site's secured resource.
该过程需要源站点和目标站点之间进行数字签名。
This process requires digital signing between the source and destination sites.
机器人程序通常会跨目标站点重用注册要求的电子邮件地址。
Robots generally reuse E-mail addresses for registrations across target sites.
同时,必须确保Dogear特性能够访问可以添加书签的目标站点。
Also, you must ensure that the Dogear feature has the ability to access target sites that could be bookmarked.
运行清单9内的命令来将文件系统定义从主站点导出到目标站点。
Run the commands in Listing 9 to export the file system definitions from the primary site to the target site.
用db2sdin1用户ID启动目标站点上的db2,如清单14所示。
Start db2 on the target site with the db2sdin1 user ID, as shown in Listing 14.
目标站点可能发送敏感数据,这可能是当代理截获发送回给你。
The target site may send sensitive data, which may be intercepted when the proxy sends it back to you.
在主站点和目标站点上创建同一个称为db2sdin1的db 2实例。
An identical db2 instance called db2sdin1 is created at both the primary site and the target site.
目标站点使用该标志从源站点请求所需要的信息而不需要明确地从主体获取。
The target site USES the token to request the information it needs from the originating site without having to get it explicitly from the subject.
他们通过在 referrer 字段内的客户链接来向目标站点发送请求。
They send requests to target sites with the client link in the referrer field.
他们常常在人力成本低的地方雇人,让这些人专门到目标站点手工留下垃圾信息。
They seek people in places where labor costs are cheap and pay them to go to a target site and leave a spam message by hand.
引荐垃圾信息(垃圾信息站点假装将用户引荐到列有引用信息的目标站点)。
Referrer spam (when spam sites pretend to refer users to a target site that lists referrers).
总之,在源站点验证的主体从SAML权威获得一个标志并将其提供给目标站点。
In all, a subject having been authenticated at the originating site gets a token from the SAML authority that it provides to the target site.
目标站点上的数据库现在已经完全可访问并且包含所有在主站点上发生的更新。
The database at the target site is now fully accessible and contains all committed updates that occurred on the primary site.
请注意在主站点上所做的任何DB 2配置参数更改都必须手动应用于目标站点。
Note that any DB2 configuration parameter changes made at the primary site must be manually applied to the target site.
逆转磁盘镜像的方向以便目标站点上的磁盘可被镜像到主站点上的磁盘,如清单15所示。
Reverse the disk-mirroring direction such that the disks on the target site are now being mirrored to disks on the primary site, as shown in Listing 15.
通过从HostW运行清单10 内的命令来验证文件系统定义到目标站点的传播。
Validate the propagation of the file system definitions to the target site by running the commands in Listing 10 from HostW.
这就确保了请求者必须补充一定数量的CPU周期才能发布,但目标站点的检查成本又很低。
This ensures that the requester must expend a certain amount of CPU cycles in order to post, but it's quite inexpensive for the target site to check.
尤其是当你还对扫描器的功用和目标站点所存在的缺陷一无所知的情况下,这非常重要。
This is very important since you don't know the scanner's capabilities or the weaknesses of the target website.
到目前为止,本文所讨论的方法大都集中于垃圾信息散布者攻击的最明显的对象—目标站点。
So far in this article I've discussed approaches that focus on the sharp point of the spammer's attack-the target site.
如果在主站点发生站点故障,那么就会调用一个故障转移以便事务可以在目标站点上针对此数据库运行。
When a site failure occurs on the primary site, a failover is invoked so that transactions are run against the database at the target site.
如果在主站点发生站点故障,那么就会调用一个故障转移以便事务可以在目标站点上针对此数据库运行。
When a site failure occurs on the primary site, a failover is invoked so that transactions are run against the database at the target site.
应用推荐