Frequently, the host security of those systems will prevent attackers from gaining control over a host.
那些系统的主机安全性经常会阻止攻击者获得对主机的控制权。
America would host a summit on nuclear security within the next 12 months.
美国将在接下来的12个月之内举办一次关于核安全的峰会。
Note: if you have configured a remote CEI server, you must modify the CEI options to specify the remote host name, RMI port and security Settings.
注意:如果您配置了远程CEI服务器,则必须修改CEI选项,以显示远程主机名、R mi端口和安全设置。
The SOP is a security restriction that basically forbids a page loaded from a certain origin (meaning the protocol/host/port trio of the URL) to access data from a different origin.
SOP是一种安全性约束,它实际上禁止从某个源(即URL的协议/主机/端口三元组)装载的页面访问来自不同源的数据。
Obama said he intended to host a summit on global nuclear security next year.
奥巴马说,他想在明年举办一个全球核安全峰会。
Moscow has threatened to target its missiles at former Warsaw Pact countries that host western military facilities, saying the U.S. missile shield plans threaten Russian security.
莫斯科方面称,美国的导弹防御计划威胁了俄罗斯的安全,并威胁要将其导弹对准这些拥有西方军事设备的从前的华沙条约国家。
So after that, the FS agent works correctly even if all security servers become unavailable regardless of whether the Cached on Host option is enabled or not.
在此之后,即使所有安全服务器不可用,或者没有启用Cached onHost选项,FS代理都能够正常工作。
Specific to Version 6.1, there is a new security infrastructure in that is "secure by default," and includes certificate generation (with host names).
对于Version 6.1来说有点特殊,它具有一种“缺省安全”的新的安全基础结构,并且包括了证书的生成(使用主机名)。
If you decide on a dedicated security monitoring Web service as the host, keep in mind that this is not the same thing as a centralized security monitoring Web service.
如果您决定采用作为主机的专用安全监视Web服务,务必记住这与集中的安全监视Web服务不是同一回事。
Seven years after Delhi won the right to host the event, plans are not even finalised for crucial matters including security and medical care.
在新德里取得举办权7年之后,安全、医疗等重要问题的方案竟然还没有敲定。
When you apply an online policy to a directory on a host by using the Management Console, the policy is saved in the security server and is sent to the FS agent on the host.
当您使用ManagementConsole对主机上的目录应用在线策略时,该策略将保存在安全服务器并发送给主机上的FS代理。
Suppose you host your Web application on a "minority" operating system; you might rely on OpenBSD for its security, for example.
假设您在一个“非主流”操作系统上托管Web应用程序;比如,您可能会依赖OpenBSD来保证安全性。
If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.
如果恶意用户获得了这些密钥信息,那么主机的安全性就很容易受到威胁。
As the two development teams and project managers meet, weekly, they review Security, Schemas, Standards, data transformation requirements, and a host of other integration requirements.
随后两个公司的开发人员和项目经理们会每周碰面,就安全、计划、标准、数据转换以及其他一揽子需求进行讨论磋商。
Depending on the security model of your host, you might best do this as sudo stunnel...
根据主机的安全性模型,您最好是执行下面的命令:sudostunnel…。
Especially when we use IP security protocol in the internal host password credentials to sign, on the basis of these marks strategy is undoubtedly more credibility for the host.
特别在当我们使用IP安全协议中的密码凭证来标志内部主机时,基于这些标志的策略对主机来说无疑更具可信性。
When a secfsd process starts, all policies related to the host are retrieved from the security server via a VMD process, and the policies are cached in memory.
当secfsd进程启动时,与主机相关的所有策略都通过vmd进程从安全服务器获取,并且策略被缓存到内存中。
With the dynamic policy management of the model, the integrated host security system which is composed of protection, detection and response processes can be realized to fully protect host.
该模型以动态策略管理为基础,形成一个集防护、检测和响应为一体的完整安全体系,从而对主机系统实施综合安全保护。
So, Log's security on host is directly related to the security of computer systems.
因此,对主机日志的安全保护直接关系到计算机系统的安全。
Host security is becoming an urgent problem that every computer user has to face. Host hole scanning technique is an important security technology to provide security guarantee for host.
主机安全正成为每一个计算机用户都面临的紧迫问题,主机漏洞扫描技术就是为主机安全提供保证的一项重要的安全技术。
Scuffles between torch bearers and protesters in cities including London and Paris have forced host nations to mount tight security operations to protect the torch on its journey.
在伦敦和巴黎等城市,火炬手和抗议者之间的混战促使(火炬传递)举办国施行严密的安全措施,以保护旅途中的圣火。
Note about the Security Warning: the application needs to read and write files on the client (in this case the client and server are the same host) and is started by an applet.
关于安全警告的注意事项:应用程序需要读写客户机上的文件(在本例中,客户机和服务器位于同一台计算机上),并且是由一个applet启动的。
The security of mobile agent can be classified into two catalogs: host security and agent security.
移动代理的安全问题分主机安全与代理安全两类,综述了后一种安全问题。
It requires various factors to host a successful Olympic Games, such as venue construction and operation, city operation, environment improvement, media service, volunteer service and security.
举办一届成功的奥运会,涉及多方面因素,如场馆建设和运行、城市运行保障、环境整治、新闻宣传、志愿者服务、安全保障等。
It requires various factors to host a successful Olympic Games, such as venue construction and operation, city operation, environment improvement, media service, volunteer service and security.
举办一届成功的奥运会,涉及多方面因素,如场馆建设和运行、城市运行保障、环境整治、新闻宣传、志愿者服务、安全保障等。
应用推荐