Tune your IDS system to improve performance.
调优ids系统以提高性能。
The most difficult part of debugging is tracing a message through the system, as it may have different IDs in different components and these need to be correlated.
调试最困难的部分是跟踪信息通过系统,因为消息在不同的组件中可能拥有不同的ID,这些ID需要关联起来。
Servers must be the same IDS version and run on the same operating system, hardware, and disk architecture.
服务器必须使用相同的IDS版本并运行在相同的操作系统、硬件和磁盘架构上。
You also need to consider that two DTDs may actually specify different public and system IDs for the same external entity reference.
您也需要考虑,对于相同的外部实体引用,两个DTD实际指定的可能是不同的公用和系统标识。
The permissions used to access external tables is governed by the user access privileges on the external table by IDS as well as the data file permissions managed by the operating system.
用于访问外部表的权限由IDS通过外部表上的用户访问特权治理,还受到由操作系统管理的数据文件权限的治理。
When configuring IDS memory, we need to consider the total available memory, both physical RAM and virtual memory and daily load on the system.
在配置IDS内存时,我们需要考虑总的可用内存,包括物理ram、虚拟内存和系统上的日常负载。
If we allocate too much memory to IDS, some system operations may suffer, but if we don't allocate enough memory to IDS, then database server would suffer.
如果我们给IDS分配过多的内存,这将有损于一些系统操作,但是如果我们不给IDS分配足够的内存,那么将有损于数据库服务器。
Remember, since the record ID is a system generated field, there is no way to transfer IDs between user databases.
请记住,由于记录ID是系统创建的域,所以无法在用户数据库之间移植id。
Actually, the W3C archive system does have a way of looking at message IDs, you can give it a message ID and it will give you back an E-mail if it's got it.
实际上,W3C归档系统确实有一种查看消息ID的方法,可以为它提供一个消息id,如果有,它将为您返回一封电子邮件。
By looking at the values specified in the DTD for that entity's system and public IDs, you can ensure that the same value is returned for all documents.
通过查看用于实体系统和公用标识的DTD中指定的值,可以确保对于所有文档返回相同的值。
Another approach is to fine-tune your IDS (intrusion detection system) and IPS (intrusion detection and prevention system) to look for botlike activity.
还有一个办法是调整你的IDS(入侵检测系统)和IPS(入侵防御系统)来查找有僵尸嫌疑的行为。
But using 8.0 meant we couldn't install IDS on the system. Well, at least not on the same system...
但同时,使用8.0也意味着不能在系统上安装ids。
Now let us have a close look at our system configuration and the current cutover process to see where we can make use of IDS 9.4 improved ontape utility to improve the process.
现在我们进一步来看一下系统配置和当前转换过程,看我们可以在何处使用IDS 9.4改善的ontape实用程序来改善该过程。
Installing db2 UDB with the default user IDs (for example, db2admin) and providing a weak password (or none at all) can put your system at risk.
用默认用户ID(如db2admin)安装db 2UDB并使用弱口令(或者根本没有)可能将系统置于风险中。
AGS Server Studio is a multi-platform suite that has a system of management tools for IDS.
AGSServerStudio是一个拥有一组系统的IDS管理工具的多平台套件。
The RFIDIC system also assigns its own identifiers to those entities that are referred to as internal IDs.
RFIDIC系统也为这些实体分派它自己的标识,这称为内部ID (internal ID)。
He used a network orientation to build his design, and the result was a DBMS called the Integrated Data Store (IDS) that was designed to run under GE's GECOS operating system.
他使用了网络导向来构建其设计,结果是一个称为IntegratedDataStore (IDS)的DBMS,被设计为在GE的GECOS操作系统下运行。
As you start the Catalog server and each of the ObjectGrid servers, notice the process IDs assigned by the operating system to each.
在启动CatalogServer和每个ObjectGrid服务器时,注意操作系统赋予各个进程的进程id。
This lets you map Notes IDs or Notes group IDs to external system security, thereby extending Domino security and mapping it to security policies already established for the external system.
这允许您把NotesIDs或 Notesgroup IDs映射到外部系统安全性,从而扩展Domino 安全性并将它映射到为外部系统建立的安全政策。
The syscdc system database in IDS contains the change data capture functions and system tables.
IDS 中的 syscdc系统数据库包含变更数据捕捉函数和系统表。
For example, if DB2 is configured with an operating-system-based authentication mechanism, users need valid operating system user IDs and passwords.
例如,如果DB 2使用一个基于操作系统的验证机制配置,则用户需要验证操作系统用户ID和密码。
IDS tools thus form an integral part of a thorough and complete security system.
因此IDS形成了一个完整和彻底的安全系统的主要部分。
The unique function of IDS makes it play an irreplaceable role in network security system.
IDS独特的作用使它在网络安全体系中占有不可替代的地位。
Installing IDS will help you understand many of the concepts that are tested on the System Administration for IBM IDS V11 Certification exam.
安装IDS可以帮助您理解IBM IDSV11系统管理认证考试中要考的很多概念。
Thinking about seeking certification on System Administration for IBM IDS 11 (Exam 918)?
您打算获得IBMIDS11系统管理(考试918)的认证吗?
For added security, consider installing and configuring an Intrusion Detection System (IDS), such as Snort, on each machine.
为了加强安全,可以考虑在所有机器上安装和配置入侵检测系统(IDS),例如Snort。
This tutorial is the fourth in a series of eight tutorials that can help you prepare for the System Administration for IBM IDS V11 Certification (Exam 918).
本教程是一个由8篇教程组成的系列中的第4篇教程,这个系列可以帮助您准备IBMIDS V11系统管理(918考试)认证。
Intrusion detection system (IDS) is the key component of the architecture of information security.
入侵检测系统(IDS)是信息安全体系结构的重要组成部分。
It combines the network based IDS and host based IDS into a system, and provides detection, report and response together.
它将基于网络和基于主机的入侵检测系统有机地结合在一起,提供集成化的检测、报告和响应功能。
This paper is aimed at testing the rules of the current network intrusion detection system (IDS), a flexible, real-time; rules can be dynamically adjusted to the invasion plan.
本篇论文针对当前网络入侵检测系统(IDS)的检测规则,提出了一个具有弹性的、实时的,能动态调整入侵规则的方案。
应用推荐