When this happens, select the component machine by IP address or host name to see the detail log and trace files for the failure.
出现这种情况时,可以通过IP地址或主机名称选中这台组件机,以查看失败配置的详细日志和跟踪文件。
Server P is running on host P and holds an exclusive file lock for its own recovery log files.
服务器P在主机p上运行,且对其恢复日志文件持有排它文件锁定。
For a demonstration host, you can use any log on name and password.
可以使用任意登陆名和密码登陆示范主机。
If you do not know your host name, you can find it by looking in the Cast Iron error log.
如果您不知道自己的主机名,则可以在CastIron错误日志中找到它。
GRANT: Provides any user on any host the ability to access the db2 backup images and log files associated with databases generated on the node issuing the GRANT option.
GRANT:为任意主机上的任意用户提供访问db2备份镜像和日志文件的能力,这些镜像和日志文件与发出GRANT选项的节点上生成的数据库有关。
Typically, this would be used to either email or log a message to a log file about a certain host (s) being denied or allowed. The basic format of the spawn option is.
通常,这会通过电子邮件或直接记录关于某个主机被拒绝或被允许的消息到日志文件中。
A simple way to store log messages in this environment is to store them in their host-specific log files.
在这种环境中保存日志消息的一种简单方法是将它们保存到主机特定的日志文件中。
Using the following config settings, a user on a trusted host can log onto the remote machine without providing the password.
通过使用以下配置设置,可信主机上的用户就可以登录远程计算机,不需要提供密码。
You typically use SSH to allow users to log in to a remote host and execute commands.
您通常使用SSH来允许用户登录到一个远程主机并执行命令。
Looking at Figure 1, assume that you have used SSH to log in to a remote host.
看一下图1,这里假设用户已经使用SSH登录到一台远程主机。
Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.
当可信主机上的用户希望登录远程计算机(可以是不可信的系统)时,使用SSH中基于主机的身份验证。
Now, whenever you need to log in to a remote host with your public key, you can use the script of your personal key with the list of accepted keys for the user on the remote host.
现在,每当需要使用公钥登录到远程主机时,您可以结合使用个人密钥脚本和远程主机上该用户接受的密钥列表。
Before you log on, you should test your connection to the host.
在登陆之前,要测试与主机的连接。
If you do not have access to your log files, you can request them from your website host.
如果你没有进入你的日志文件,你可以要求他们从你的网站主办。
The result of issuing this command is that you can use SSH to log into the guest from the host by typing ssh localhost -p 2222.
执行该命令的结果是可以使用SSH通过输入 sshlocalhost -p 2222从主机端登录客户端。
Check the log file /opt/ibm/director/am/logs/aminfr.log on the host blade2 to see if the creation process is finished when you see these logs
检查blade2主机上的日志文件 /opt/ibm/director/am/logs/aminfr.log,查看创建过程是否完成
For the root user of the Solaris 10 machine to be able to log in using telnet/ssh/rlogin with the above setup, you are required to create a Kerberos principal of type root/<host name>.
为了通过上面的设置,使得 Solaris10计算机的root用户能够使用telnet/ssh/rlogin 进行登录,您需要创建一个 root/<hostname>类型的Kerberos主体。
To access information on the Internet, a user must first log on, or connect, to the client computer's host network.
要访问因特网上的信息,用户必须首先登录或连接到客户机的主机网络。
If you have multiple virtual hosts logging to the same access log, recording the server name (which should be set for each host) will help you see which connection was for which site.
如果您有多个虚拟主机服务器的名称记录(应为每个主机设定)会帮助你看到哪些连接,用于记录到的地点在相同的访问日志。
Finally, placed backdoor, erasing invasion, cleaning log, new traces, acquiring or modify account information, network monitor (sniffer), against other host or other illegal activities.
最后,放置后门程序,擦除入侵痕迹,清理日志,新建账号,获取或修改信息、网络监听(sniffer)、攻击其他主机或者进行其他非法活动。
Determined growth curve of R. prowazekii in host cells displayed only the lag and log phases without stationary and declining phases.
用本法试测立克次体在宿主细胞内的生长曲线,只表现出迟缓期及对数生长期,而无稳定期及衰退期。
Useful information could be abstracted from audit log of computers by most of host-based intrusion detection systems. Therefore, audit system become a target to be compromised by hackers or attackers.
审计日志是多种入侵检测系统的重要信息来源,因而审计系统就成为黑客或攻击者对付的主要目标。
Useful information could be abstracted from audit log of computers by most of host-based intrusion detection systems. Therefore, audit system become a target to be compromised by hackers or attackers.
审计日志是多种入侵检测系统的重要信息来源,因而审计系统就成为黑客或攻击者对付的主要目标。
应用推荐