The rules can specify which file to log the message to, what machine to send the logging message to, what user to send the message to (in the form of console messages), etc.
规则可以指定记录消息的文件,将记录消息发送给哪台计算机,将消息发送给什么用户(以控制台消息的形式)等。
It is also easier to trace, log, and debug issues, even when the total number of rules is very high.
跟踪、记录和调试问题也更加容易,即使是在规则总数非常大的情况下。
You'll again want to re-construct the query example with strong input validation rules and ensure the hacker cannot log in with his malicious userid.
您又将需要利用有力的输入确认规则来重构查询示例,并确保黑客不能使用恶意userid登录。
These rules enable you to finely tune what can and cannot be logged with the mechanism — which, on a high-volume, hard-working server can translate to log files of a manageable size.
这些规则使您可以很好地调整使用该机制记录的内容 ——在一台高容量而且工作繁重的服务器上使用 syslog 机制可以转换为可改变大小的日志文件。
Selecting Log transformation execution will print a log of all the rules that execute during the transformation.
选中Logtransformationexecution将打印出转换过程中执行的所有规则。
For example, a login process element includes a series of activities, the log-in credential data, and log-in rules for completing a user log-in process.
例如,登录流程元素包含一系列活动,登录证书数据以及完成用户登录过程的登录规则。
By analyzing and manually labeling a large number of real user query log, we found rules were very useful in identifying user intents.
本文通过对真实用户查询日志的标注和分析,发现基于规则的方法可以对用户意图进行有效的识别。
Configure HTTP rewrite rules to log out to an unprotected uri.
配置http重写规则登出到未受保护的url。
The term "other operations" as mentioned in these Operating Rules refers to the feedback of doubtful information, check of log inquiries, statistical analysis, and system management, etc.
本操作规程所称其他操作是指疑义信息反馈、核查日志查询、统计分析、系统管理等操作。
So IDS can extract security mode rules from the log audit data.
入侵检测系统可以从日志审计数据中提取安全模式规则。
The general principles relating to brevet cards and Log Books are located in the FIG General Judging Rules and the Code of Points.
一般依据FIG裁判员规则总则和技巧评分规则发放裁判员晋级卡和裁判员证书。
Classify the log file data and prepare for later data analysis, in the case of a large number of log data and based on data preprocessing rules.
在大量日志数据情况下,依据数据预处理的规则,把日志文件的数据内容分类,为后面的数据分析做好准备。
You can control the feedback in the log concerning the evaluation of the filter rules of applied filters: having this option checked will give detailed feedback for each single filter rule;
您可以控制日志中关于所应用过滤器的过滤规则评分的反馈 :选中此选项将给出每个单独过滤器规则 的详细反馈 ; 否则的话 , 只会给出关于单个过滤器组合评分的结果 。
Finally, combined core analysis data with log interpretation data, the rules for reservoir develop distribution and quality is worked over on the basic of fruit of reservoir origin mechanism.
最后,在岩心分析资料和测井解释结果的基础上,结合有关储层成因机制的研究成果,对研究区内各种储层类型分别进行储层发育分布规律研究和质量评价研究。
On the other hand , parents who are themselves online are more likely to set rules about when or for how long their kids can log on at home .
另一方面,本身有上网习惯的父母,更有可能规定他们的孩子在何时上网,及上网多长时间。
On the other hand , parents who are themselves online are more likely to set rules about when or for how long their kids can log on at home .
另一方面,本身有上网习惯的父母,更有可能规定他们的孩子在何时上网,及上网多长时间。
应用推荐