Host Based with Special Device drivers.
基于托管并提供特殊设备驱动。
PostgreSQL's authentication depends upon host based configuration.
PostgreSQL的身份验证取决于主机配置。
I have chosen RPG IV free format style as my host based programming language.
我选择了RPGIV自由格式样式作为我的基于主机的编程语言。
Currently, the HostSelector cannot select the host based on the complexity of a given task.
目前,HostSelector无法根据给定任务的复杂程度来选择主机。
Host based on desktop or notebook PC was used as digital signal processing and data processing system.
使用台式机或笔记本为上位机进行数字信号处理及数据分析处理。
It combines the network based IDS and host based IDS into a system, and provides detection, report and response together.
它将基于网络和基于主机的入侵检测系统有机地结合在一起,提供集成化的检测、报告和响应功能。
In essence, a single format-based handler program is able to service multiple host based RPG 5250 programs using a variety of UPDATE methods.
本质上,单个基于格式的Handlder程序能够服务于多个使用各种UPDATE方法的基于主机的RPG 5250程序。
These files provide information about a virtual host, and the topology editor can create units that represent the host based on this information.
这些文件提供了关于一个虚拟主机的信息,而拓扑编辑器可以创建一些基于这些信息的单元。
This system based on single-chip microcomputer control through serial GPRS module as the client, in remote PC host based on VC technical data service center.
本系统是以单片机通过串口控制GPRS模块作为客户端,在远程PC主机上建立以VC技术建立数据服务中心。
This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.
该系统模型既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用主机配置和网络配置相互配合的方式。
It was briefly introduced how to apply the USB host in the digital Temperature-Humidity Recorder, and proposed the realization plan of USB host based on the SL811HS.
将US B主机应用到数字温湿度记录仪系统中,提出了基于SL811HS的USB主机设计的实现方案。
These parasites are often found stranded on lineages of hosts over long periods of time, permitting researchers to learn about evolutionary changes in the host based on changes in the parasite.
很长的时间以内这些寄生物都能经常在寄主的衣服上被发现,使得研究人员能够基于寄生物的演变来研究寄主的进化演进。
The first tools for meeting these requirements are system auditing and host-based intrusion detection.
满足这些需求的第一组工具是系统审计和基于主机的入侵检测。
Existing host-based applications and enterprise data are accessible from the ESB through a set of access services.
现有的基于主机的应用程序和企业数据都可以通过一组访问服务从ESB访问。
This password check is done even if the user is following the public key or host-based authentication.
即使用户采用公共密钥或基于主机的身份验证,也会执行这个密码检查。
In many host-based systems (and even some client/server systems), the two mechanisms are performed by the same physical hardware and, in some cases, the same software.
在很多基于主机的系统中(甚至一些客户端/服务端系统),这两种机制在某些情况下是通过同样的物理硬件和同样的软件来执行的。
IBM provides the middleware platform to host SOA based solutions and to meet the challenges faced by the business community.
IBM提供了中间件平台来支持基于SOA的解决方法并处理业务团体面临的挑战。
Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.
当可信主机上的用户希望登录远程计算机(可以是不可信的系统)时,使用SSH中基于主机的身份验证。
With ssh host-based authentication, hosts must establish a trust relationship, and then all user IDs on the configured hosts will be allowed to login as the same user ID on any other configured host.
对于ssh 基于主机的认证,主机必须建立一个信任关系,然后已配置主机上的所有用户ID都将可以凭相同的用户ID在任何其他已配置主机上登录。
For your DB2 UDB DPF instance to use host-based authentication, each host in the instance must have the SSH client and SSH server configured properly.
为了让DB 2UDBD PF实例使用基于主机的认证,实例中的每个主机必须正确地配置ssh客户机和ssh服务器。
This update to sshd_config will allow the SSH server to accept host-based authentication requests from the SSH clients.
对sshd_config的上述更新将允许ssh服务器接受来自ssh客户机的基于主机的认证请求。
However, host-based authentication is only allowed between two trusted hosts. This trust is based on two criteria.
然而,基于主机的认证只是在两个受信任的主机之间被允许。
This article describes how to configure host-based and PAM authentication and some of the new features and configuration options added in the IBM-supported version of OpenSSH.
本文描述如何配置基于主机的和PAM身份验证方法,以及在IBM支持的OpenSSH版本中新增的一些特性和配置选项。
OpenSSH supports two types of encryption, namely host-based authentication and public-key authentication.
OpenSSH支持两种类型的加密,即基于主机的认证和公钥认证。
The SSH client has now been configured to allow host-based authentication.
ssh客户机现在已经被配置为允许基于主机的认证。
SSH server host-based configuration.
ssh服务器基于主机的配置。
SSH client host-based configuration.
ssh客户机基于主机的配置。
Both host-based and public key-based authentication using SSH are more secure than RSH rhost-based authentication.
使用ssh的基于主机的认证和基于公钥的认证都比基于rshrhost的认证安全。
Comparing host-based authentication to public key-based authentication.
比较基于主机的认证和基于公钥的认证。
Also, you do not need to have root authority to set up public key-based authentication (portions of the host-based authentication setup require root access).
而且,不需要root授权就可以设置基于公钥的认证(部分基于主机的认证需要root访问)。
应用推荐