• When this happens, select the component machine by IP address or host name to see the detail log and trace files for the failure.

    出现这种情况,可以通过IP地址主机名称选中组件查看失败配置详细日志跟踪文件

    youdao

  • Server P is running on host P and holds an exclusive file lock for its own recovery log files.

    服务器P主机p上运行,且恢复日志文件持有排它文件锁定

    youdao

  • For a demonstration host, you can use any log on name and password.

    可以使用任意登陆密码登陆示范主机

    youdao

  • If you do not know your host name, you can find it by looking in the Cast Iron error log.

    如果知道自己主机可以CastIron错误日志中找到

    youdao

  • GRANT: Provides any user on any host the ability to access the db2 backup images and log files associated with databases generated on the node issuing the GRANT option.

    GRANT任意主机的任意用户提供访问db2备份镜像日志文件能力这些镜像和日志文件与发出GRANT选项的节点生成数据库有关

    youdao

  • Typically, this would be used to either email or log a message to a log file about a certain host (s) being denied or allowed. The basic format of the spawn option is.

    通常这会通过电子邮件直接记录关于某个主机拒绝被允许消息日志文件中。

    youdao

  • A simple way to store log messages in this environment is to store them in their host-specific log files.

    这种环境中保存日志消息一种简单方法它们保存到主机特定的日志文件中。

    youdao

  • Using the following config settings, a user on a trusted host can log onto the remote machine without providing the password.

    通过使用以下配置设置可信主机用户就可以登录远程计算机需要提供密码

    youdao

  • You typically use SSH to allow users to log in to a remote host and execute commands.

    通常使用SSH允许用户登录一个远程主机执行命令

    youdao

  • Looking at Figure 1, assume that you have used SSH to log in to a remote host.

    下图1,这里假设用户已经使用SSH登录台远程主机

    youdao

  • Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.

    可信主机用户希望登录远程计算机(可以可信系统)时,使用SSH基于主机身份验证

    youdao

  • Now, whenever you need to log in to a remote host with your public key, you can use the script of your personal key with the list of accepted keys for the user on the remote host.

    现在每当需要使用公钥登录远程主机时,可以结合使用个人密钥脚本远程主机用户接受密钥列表

    youdao

  • Before you log on, you should test your connection to the host.

    登陆之前测试与主机的连接

    youdao

  • If you do not have access to your log files, you can request them from your website host.

    如果没有进入日志文件,你可以要求他们你的网站主办

    youdao

  • The result of issuing this command is that you can use SSH to log into the guest from the host by typing ssh localhost -p 2222.

    执行命令结果可以使用SSH通过输入 sshlocalhost -p 2222主机登录客户端。

    youdao

  • Check the log file /opt/ibm/director/am/logs/aminfr.log on the host blade2 to see if the creation process is finished when you see these logs

    检查blade2主机日志文件 /opt/ibm/director/am/logs/aminfr.log查看创建过程是否完成

    youdao

  • For the root user of the Solaris 10 machine to be able to log in using telnet/ssh/rlogin with the above setup, you are required to create a Kerberos principal of type root/<host name>.

    为了通过上面设置使得 Solaris10计算机root用户能够使用telnet/ssh/rlogin 进行登录需要创建一个 root/<hostname>类型Kerberos主体

    youdao

  • To access information on the Internet, a user must first log on, or connect, to the client computer's host network.

    访问因特网上的信息用户必须首先登录连接客户机主机网络

    youdao

  • If you have multiple virtual hosts logging to the same access log, recording the server name (which should be set for each host) will help you see which connection was for which site.

    如果多个虚拟主机服务器名称记录(应为每个主机设定)帮助看到哪些连接用于记录地点相同访问日志

    youdao

  • Finally, placed backdoor, erasing invasion, cleaning log, new traces, acquiring or modify account information, network monitor (sniffer), against other host or other illegal activities.

    最后放置后门程序擦除入侵痕迹清理日志新建账号获取修改信息网络监听(sniffer)、攻击其他主机或者进行其他非法活动

    youdao

  • Determined growth curve of R. prowazekii in host cells displayed only the lag and log phases without stationary and declining phases.

    用本法试测立克次体宿主细胞内生长曲线表现出迟缓对数生长期,而无稳定期衰退期

    youdao

  • Useful information could be abstracted from audit log of computers by most of host-based intrusion detection systems. Therefore, audit system become a target to be compromised by hackers or attackers.

    审计日志多种入侵检测系统重要信息来源因而审计系统就成为黑客攻击者对付的主要目标

    youdao

  • Useful information could be abstracted from audit log of computers by most of host-based intrusion detection systems. Therefore, audit system become a target to be compromised by hackers or attackers.

    审计日志多种入侵检测系统重要信息来源因而审计系统就成为黑客攻击者对付的主要目标

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定