目标站点向主体提供受保护的资源。
目标站点PEP检查该PDP的权限。
主体使用该标志向目标站点请求受保护的资源。
Subject makes a request to the target site for the secured resource using the token.
源站点根据标志向目标站点提供SAML验证断言。
The source site provides an SAML authentication assertion to the target site based on the token.
当用户单击这个超链接时,用户就会被推至目标站点。
When the user clicks the hyperlink, the user is forwarded to the target site.
主体向源站点验证并请求到目标站点受保护资源的链接。
Subject authenticates to the source site and requests a link to target site's secured resource.
该过程需要源站点和目标站点之间进行数字签名。
This process requires digital signing between the source and destination sites.
机器人程序通常会跨目标站点重用注册要求的电子邮件地址。
Robots generally reuse E-mail addresses for registrations across target sites.
同时,必须确保Dogear特性能够访问可以添加书签的目标站点。
Also, you must ensure that the Dogear feature has the ability to access target sites that could be bookmarked.
运行清单9内的命令来将文件系统定义从主站点导出到目标站点。
Run the commands in Listing 9 to export the file system definitions from the primary site to the target site.
用db2sdin1用户ID启动目标站点上的db2,如清单14所示。
Start db2 on the target site with the db2sdin1 user ID, as shown in Listing 14.
目标站点可能发送敏感数据,这可能是当代理截获发送回给你。
The target site may send sensitive data, which may be intercepted when the proxy sends it back to you.
在主站点和目标站点上创建同一个称为db2sdin1的db 2实例。
An identical db2 instance called db2sdin1 is created at both the primary site and the target site.
目标站点使用该标志从源站点请求所需要的信息而不需要明确地从主体获取。
The target site USES the token to request the information it needs from the originating site without having to get it explicitly from the subject.
他们常常在人力成本低的地方雇人,让这些人专门到目标站点手工留下垃圾信息。
They seek people in places where labor costs are cheap and pay them to go to a target site and leave a spam message by hand.
引荐垃圾信息(垃圾信息站点假装将用户引荐到列有引用信息的目标站点)。
Referrer spam (when spam sites pretend to refer users to a target site that lists referrers).
总之,在源站点验证的主体从SAML权威获得一个标志并将其提供给目标站点。
In all, a subject having been authenticated at the originating site gets a token from the SAML authority that it provides to the target site.
目标站点上的数据库现在已经完全可访问并且包含所有在主站点上发生的更新。
The database at the target site is now fully accessible and contains all committed updates that occurred on the primary site.
请注意在主站点上所做的任何DB 2配置参数更改都必须手动应用于目标站点。
Note that any DB2 configuration parameter changes made at the primary site must be manually applied to the target site.
逆转磁盘镜像的方向以便目标站点上的磁盘可被镜像到主站点上的磁盘,如清单15所示。
Reverse the disk-mirroring direction such that the disks on the target site are now being mirrored to disks on the primary site, as shown in Listing 15.
通过从HostW运行清单10 内的命令来验证文件系统定义到目标站点的传播。
Validate the propagation of the file system definitions to the target site by running the commands in Listing 10 from HostW.
这就确保了请求者必须补充一定数量的CPU周期才能发布,但目标站点的检查成本又很低。
This ensures that the requester must expend a certain amount of CPU cycles in order to post, but it's quite inexpensive for the target site to check.
尤其是当你还对扫描器的功用和目标站点所存在的缺陷一无所知的情况下,这非常重要。
This is very important since you don't know the scanner's capabilities or the weaknesses of the target website.
到目前为止,本文所讨论的方法大都集中于垃圾信息散布者攻击的最明显的对象—目标站点。
So far in this article I've discussed approaches that focus on the sharp point of the spammer's attack-the target site.
如果在主站点发生站点故障,那么就会调用一个故障转移以便事务可以在目标站点上针对此数据库运行。
When a site failure occurs on the primary site, a failover is invoked so that transactions are run against the database at the target site.
通过在主站点从HostA运行清单7内的代码来同步主站点与目标站点之间的文件系统定义。
Synchronize the file system definition from the primary site to the target site by running the code in Listing 7 from HostA on the primary site.
若主站点故障,就执行清单11内所示的磁盘故障转换以便目标站点上的数据可被用来继续进行目标站点上的数据库处理。
Upon failure of the primary site, perform the disk failover as shown in Listing 11 such that the data on the target site can be used to continue database processing at the target site.
初始化磁盘故障恢复以便磁盘现在从主站点镜像到目标站点,以防将来主站点有任何故障会发生,如清单20所示。
Initiate disk failback such that the disks are now being mirrored from the primary site to the target site, in case any future primary site failures occur, as shown in Listing 20.
而且,如果所需的文件没有位于被镜像的磁盘上,包括来自存储过程创建的二进制文件,那么必须将这些文件手动复制到目标站点。
Also, any required files that do not reside on the mirrored disks, including binary files from the creation of stored procedures, must be manually copied to the target site.
而且,如果所需的文件没有位于被镜像的磁盘上,包括来自存储过程创建的二进制文件,那么必须将这些文件手动复制到目标站点。
Also, any required files that do not reside on the mirrored disks, including binary files from the creation of stored procedures, must be manually copied to the target site.
应用推荐