If a computer user fails to log off, the system is accessible to all.
如果一位电脑用户没有登出,所有人都可以进入该系统。
It's time to leave the office for the night. Firstly I log off my computer, then I set the electronic security system.
是时间离开办公室了,首先我得注销我得电脑,然后我设置电子安全系统。
Management of commands that run automatically when users log onto the computer system.
用户登录到计算机系统时自动运行命令的管理。
Redesigned and re-implemented the Log Analysis subsystem of Computer Log Forensic system.
重新设计并实现了计算机日志勘察取证系统日志分析平台。
It is composed of browsing screen module, looking over operation log module, computer configure scout module, sending message module and system configure module.
实时浏览模块、操作日志查看模块、计算机配置浏览模块、消息发送模块和系统配置模块,构成了系统的完整结构。
The redundant data in log files and the delay for detecting abnormal trails are the inherent problems existing in the traditional secure monitoring subsystem of a computer system.
传统的计算机设计系统的安全监视功能存在日志数据冗余和异常线索检测时延过长等固有问题。
You must either log on to your computer as an Administrator or ask your System Administrator to install this feature for you.
需以管理员注册或请系统管理员安装此功能。
The system cannot log you on to this domain because the system's computer account in its primary domain is missing or the password on that account is incorrect.
系统无法让您登入此网域,因为主要网域的系统电脑帐户遗失,或该帐户密码不正确。
Security audit system can record the user's actions and block the user's illegal operations in a timely manner. The log information can provide evidence for the computer forensics.
安全审计系统能够及时地将用户操作以日志的形式记录下来,并且对违规操作进行阻断,日志信息可以为事后取证提供证据。
Security audit system can record the user's actions and block the user's illegal operations in a timely manner. The log information can provide evidence for the computer forensics.
安全审计系统能够及时地将用户操作以日志的形式记录下来,并且对违规操作进行阻断,日志信息可以为事后取证提供证据。
应用推荐