This event should also be logged in the system, either by sending an email to the administrator, writing the event to a security log, or both.
这一事件也应该被记录在系统中,还要给管理员发送邮件,将事件写入安全日志。
You create a simple login system where users can visit and log in using form-based authentication and J2EE declarative security using Geronimo's SQLLoginModule.
将使用Geronimo的SQLLoginModule创建一个简单的登录系统,用户可以用基于表单的认证和J2EE声明式安全性访问和登录系统。
This my-realm GBean specifies the domain that users log in to and defines the System and Security modules.
这个my - realmGBean指定用户登录到的域并且定义System和Security模块。
In network system there is a large amount of log audit data which contain much information related to security.
网络系统中存在大量的日志审计数据,在这些日志审计数据中含有许多与安全有关的信息。
Grid is different from the distributed system, it's sweeping and its configuration is more complex, so the demand to the log system and the security audit is also higher.
网格不同于传统的分布式系统,网络规模更大,结构更加复杂,对日志系统和安全审计也提出了更高的要求。
It's time to leave the office for the night. Firstly I log off my computer, then I set the electronic security system.
是时间离开办公室了,首先我得注销我得电脑,然后我设置电子安全系统。
Log analysis regard as component part of network security defending system, it plays a very important role in the network security.
日志分析作为网络安全防御系统的组成部分,在网络安全中起着重要的作用。
The importance of designing and realizing a FTP log analysis system is stated clearly in this article from the Angle of network security protection.
本文从网络安全防范的角度讲述了设计和实现一个FTP日志分析系统的重要性。
Security audit system can record the user's actions and block the user's illegal operations in a timely manner. The log information can provide evidence for the computer forensics.
安全审计系统能够及时地将用户操作以日志的形式记录下来,并且对违规操作进行阻断,日志信息可以为事后取证提供证据。
The system's capabilities of log and filtering can enhance the system security and allow the system to be in a better management and control.
系统的日志和过滤功能则可以加强系统的安全性,使系统得到更好的管理和控制。
And the system also provides certain support for the auditing function of security Log.
系统对安全日志审核功能也提供了一定的支持。
This security mechanism could satisfied all needs a network management system requests on security, such as authorization and verification, confidentiality, integrity and security log.
所设计的安全机制能够满足网管系统安全性所需要的授权与验证、保密性、完整性、安全日志等要求。
In order to solve security issues of the system log, the usual solution is: to make real-time backup for the system log in a machine outside of the protected system.
为了解决系统日志的安全问题,通常的解决方法是:在被保护系统之外的机器上对系统日志进行实时备份。
The design of a simulation system security log user interface, using MD5 algorithm users log on password security authentication.
设计一个模拟的系统用户安全登录界面,采用MD5算法实现用户登录口令的安全认证。
When the system security log reaches its maximum size it will stop recording security events.
当系统安全达到它的最大的限度时,它将停止记录安全事件。
If your question concerns the issue of payment or log on, or if you have not been able to find the answer elsewhere, please use our email security system to support the ticket to contact us.
如果您的问题涉及的问题,付款或登录,或者如果您没有能够找到问题的答案在其他地方,请使用我们的电子邮件安全系统,以支持票与我们联系。
The running management system of mobile official portal is an import security system. Log management takes on import function in the whole portal, it logs visiting behaviors.
移动办公门户运行管理系统是一个安全性因素很重要的系统,日志管理在整个系统中担任着重要功能,用于记录访问行为。
Considered from the data security Angle, this system establishes log-in boundary plane for each sale to realize the identification.
从数据安全角度考虑,本系统对各个销售点都设置了登录界面以实现身份验证。
Considered from the data security Angle, this system establishes log-in boundary plane for each sale to realize the identification.
从数据安全角度考虑,本系统对各个销售点都设置了登录界面以实现身份验证。
应用推荐