SSH server host-based configuration.
ssh服务器基于主机的配置。
SSH client host-based configuration.
ssh客户机基于主机的配置。
Comparing host-based authentication to public key-based authentication.
比较基于主机的认证和基于公钥的认证。
The SSH client has now been configured to allow host-based authentication.
ssh客户机现在已经被配置为允许基于主机的认证。
The first tools for meeting these requirements are system auditing and host-based intrusion detection.
满足这些需求的第一组工具是系统审计和基于主机的入侵检测。
This password check is done even if the user is following the public key or host-based authentication.
即使用户采用公共密钥或基于主机的身份验证,也会执行这个密码检查。
OpenSSH supports two types of encryption, namely host-based authentication and public-key authentication.
OpenSSH支持两种类型的加密,即基于主机的认证和公钥认证。
Existing host-based applications and enterprise data are accessible from the ESB through a set of access services.
现有的基于主机的应用程序和企业数据都可以通过一组访问服务从ESB访问。
However, host-based authentication is only allowed between two trusted hosts. This trust is based on two criteria.
然而,基于主机的认证只是在两个受信任的主机之间被允许。
Both host-based and public key-based authentication using SSH are more secure than RSH rhost-based authentication.
使用ssh的基于主机的认证和基于公钥的认证都比基于rshrhost的认证安全。
This update to sshd_config will allow the SSH server to accept host-based authentication requests from the SSH clients.
对sshd_config的上述更新将允许ssh服务器接受来自ssh客户机的基于主机的认证请求。
The location of patch files is important for realizing the host-based vulnerability scanner and patch-pushed system(HVSPS).
补丁文件定位是实现主机漏洞扫描及补丁推送系统的关键。
Host-based authentication in SSH is used when a user on a trusted host wants to log on to a remote machine, which could be an untrusted system.
当可信主机上的用户希望登录远程计算机(可以是不可信的系统)时,使用SSH中基于主机的身份验证。
Nowadays, due to the limitation of host-based IDS (intrusion detection system), make the technology of agent-based IDS more and more important.
由于当前基于主机入侵检测系统的局限性,使得基于代理的入侵检测技术显得日益重要。
For your DB2 UDB DPF instance to use host-based authentication, each host in the instance must have the SSH client and SSH server configured properly.
为了让DB 2UDBD PF实例使用基于主机的认证,实例中的每个主机必须正确地配置ssh客户机和ssh服务器。
Also, you do not need to have root authority to set up public key-based authentication (portions of the host-based authentication setup require root access).
而且,不需要root授权就可以设置基于公钥的认证(部分基于主机的认证需要root访问)。
File system integrity checkout is a host-based intrusion detection technique which can check out the unauthorized modification of the host files by intruders.
文件系统完整性校验是一种基于主机的入侵检测技术,可以检测出入侵者对主机文件的非法修改。
In many host-based systems (and even some client/server systems), the two mechanisms are performed by the same physical hardware and, in some cases, the same software.
在很多基于主机的系统中(甚至一些客户端/服务端系统),这两种机制在某些情况下是通过同样的物理硬件和同样的软件来执行的。
Due to the agent system, A_DTDS comes into being a uniform intrusion detection system that is competent for the task of host-based and network-based intrusion detection.
代理体系的引入,将基于主机的入侵检测和基于网络的入侵检测灵活地融为一体,形成一个统一的入侵检测系统。
This article describes how to configure host-based and PAM authentication and some of the new features and configuration options added in the IBM-supported version of OpenSSH.
本文描述如何配置基于主机的和PAM身份验证方法,以及在IBM支持的OpenSSH版本中新增的一些特性和配置选项。
Malware detection techniques can be divided into host-based and network-based, this paper mainly focuses on studies of host-based deep hidden Trojan detection techniques.
恶意代码的检测技术主要分为基于主机的和基于网络节点的检测,本文主要研究针对基于主机的高隐藏性木马的检测技术。
Files in this program, primarily through interviews with reporters on host-based information to investigate the matter and the audience step by step guide to explore the truth.
在这档节目中,主要通过记者型主持人的采访对新闻事件进行调查,并且一步步引领观众发掘事实真相。
This paper designs an Agent-based Distributed Intrusion Detection System. The DIDS system combines host-based intrusion detection and network-based intrusion detection functions.
结合网络入侵和主机入侵方面的检测能力,构建了基于智能体的分布式入侵检测系统的体系结构模型。
Monitoring program behavior is one of the highlighted research topics of host-based anomaly detection recently. The key is to construct a program behavior-based anomaly detection model.
监视程序行为是近年基于主机的异常入侵检测的研究热点,构建程序行为模型是进行异常检测的关键。
We design a CVE-based Intrusion Detection Expert System rule base, it combine the network-based IDS and host-based IDS into a system, and provide detection, report and response together.
本文提出一种基于CVE标准建立的入侵检测专家系统规则库,该入侵检测专家系统是基于网络和主机的混合结合体,提供集成化的检测、报告和响应功能。
To the deficiencies of extant intrusion detection technology the thesis proposes a new framework of an intelligence hybrid host-based intrusion detection system based on Bayesian Network.
针对现存入侵检测技术的不足,提出了一个基于贝叶斯网络的混合式智能入侵检测模型。
With ssh host-based authentication, hosts must establish a trust relationship, and then all user IDs on the configured hosts will be allowed to login as the same user ID on any other configured host.
对于ssh 基于主机的认证,主机必须建立一个信任关系,然后已配置主机上的所有用户ID都将可以凭相同的用户ID在任何其他已配置主机上登录。
The existing host-based prevention technology can do nothing to prevent these infected nodes, and the quarantine mechanism can only limit the propagation range and can't eliminate all of the worms.
现有的基于主机的防护技术对这些感染蠕虫的不可控节点无能为力,而隔离技术只能缩小这些节点的危害范围,无法彻底清除节点中的蠕虫。
The host-based integrity detection technology as well as the user behavior management software based on network traffic analysis technology had been basically mature and used for commercial purposes.
其中,基于主机完整性检测技术以及基于网络流量分析技术的用户行为管理软件已经基本成熟并用于商业用途。
The host-based integrity detection technology as well as the user behavior management software based on network traffic analysis technology had been basically mature and used for commercial purposes.
其中,基于主机完整性检测技术以及基于网络流量分析技术的用户行为管理软件已经基本成熟并用于商业用途。
应用推荐