如果可以在不串行化的情况下将数据返回到客户机,那么,通过直接绑定到一个XML输出主机变量,这是避免任何替换字符的最安全的方法。
If it is possible to return the data to the client without serialization, by binding directly to an XML output host variable, this is the safest way to avoid any kind of substitution character.
SSH可以提供到远程主机的安全加密连接。
Using SSH allows for secure encrypted connections to remote hosts.
集中工具终止安全数据中心中特定主机上的管理访问路径,这随后将利用中介传递通过轻量级客户机(如浏览器)进行的访问。
Central tools terminate that administrative access path onto specific hosts in a secured data center, which then mediate access through a lightweight client, such as a browser.
其结果是,由于对单个专区的修改并不会影响到其他主机,所以交换机的管理更加安全。
As a result of this, the management of the switch becomes safer, because modifying each individual zone does not affect the other hosts.
注意:如果您配置了远程CEI服务器,则必须修改CEI选项,以显示远程主机名、R mi端口和安全设置。
Note: if you have configured a remote CEI server, you must modify the CEI options to specify the remote host name, RMI port and security Settings.
从数据库中获取XML 的最安全的方法是将值取出到一个 XML 本地类型主机变量中。
The safest way to fetch XML from a database is into an XML native type host variable.
那些系统的主机安全性经常会阻止攻击者获得对主机的控制权。
Frequently, the host security of those systems will prevent attackers from gaining control over a host.
选择这种数据的惟一安全的方法是将它绑定到一个BLOB主机变量或一个BLOB FILE主机变量,以便将它写到一个XML文件中。
The only safe way to select this data is to bind it into a BLOB host variable, or a BLOB file host variable, to write it into an XML file.
会话安全由SSL/TLS 保证,并且只允许来自指定主机或地址范围的连接。
The session is secured by use of SSL/TLS and can be restricted to permit connections only from specified hosts or address ranges.
SSH (OpenSSH)提供到远程主机的安全加密连接。
SSH (OpenSSH) provides a secure encrypted connection to remote hosts.
在仍然向您的用户提供高性能、可靠性和易用性的同时,这些技巧可以帮助确保以Domino 为主机的Web站点尽可能安全。
These tips can help ensure that your Domino-hosted Web sites are as secure as possible, while still providing high performance, reliability, and ease-of-use to your users.
当secfsd进程启动时,与主机相关的所有策略都通过vmd进程从安全服务器获取,并且策略被缓存到内存中。
When a secfsd process starts, all policies related to the host are retrieved from the security server via a VMD process, and the policies are cached in memory.
对于Version 6.1来说有点特殊,它具有一种“缺省安全”的新的安全基础结构,并且包括了证书的生成(使用主机名)。
Specific to Version 6.1, there is a new security infrastructure in that is "secure by default," and includes certificate generation (with host names).
使用ssh的基于主机的认证和基于公钥的认证都比基于rshrhost的认证安全。
Both host-based and public key-based authentication using SSH are more secure than RSH rhost-based authentication.
使用以下命令设置代理以指定主机名、不安全端口和安全端口的值。
Set up the proxies using the following command to specify the values of the host name, the insecure port and secured port.
主机PaaS自身可以固化为一个盒子(设备),带有单纯作为安全控制和客户端定制提交访问门户输出的基于 web 的管理控制台。
The hosting PaaS itself can be hardened as a box (appliance) with a web-based administration console exposed as solely an access portal for security control and client-side customization submissions.
通过使用TCPWrappers,或 wrappers,可以轻松地保护您的主机,在客户端接入时,守护进程能安全使用。
Using TCP Wrappers, or wrappers, is an easy way to protect and secure your machines based on daemon use and where the client is coming from.
另外,创建主机keytab文件是非常容易的;因此,不备份这些文件会更安全。
Also, the host keytab file creation is a very straightforward process and can be created quite easily; hence, it is safer not to back up these files.
如果您决定采用作为主机的专用安全监视Web服务,务必记住这与集中的安全监视Web服务不是同一回事。
If you decide on a dedicated security monitoring Web service as the host, keep in mind that this is not the same thing as a centralized security monitoring Web service.
当您使用ManagementConsole对主机上的目录应用在线策略时,该策略将保存在安全服务器并发送给主机上的FS代理。
When you apply an online policy to a directory on a host by using the Management Console, the policy is saved in the security server and is sent to the FS agent on the host.
远程主机shell访问(取代telnet和rlogin明文,不安全协议)。
Remote host shell access (supersedes Telnet and rlogin clear text, insecure protocols).
如果恶意用户获得了这些密钥信息,那么主机的安全性就很容易受到威胁。
If a malicious user gets hold of this key information, then the security of that host machine can be compromised very easily.
更明确地说,SSH是一种更安全的工具,不以明文传输密码,并且执行更加健壮的检查,以确保客户机不是在欺骗它们的主机名。
More specifically, SSH is a more secure utility that does not transmit passwords in clear text, and performs much more robust checks to ensure that clients are not spoofing their hostname.
使用本地主机的安全数据库文件中的用户和组信息装载ldap数据库。
The LDAP database is loaded with the user and group information from the localhost's security database files.
使用安全凭据连接到虚拟主机的用户。
The user which connects to a virtual host using credentials.
客户机和服务器之间的安全通信会话是通过从发起主机上获取请求者(用户和机器)的PAC标识符开始的。
Secure communication sessions between a client and server start by pulling in the requestor's (user's and machine's) PAC identifier from the initiating host machine.
SOP是一种安全性约束,它实际上禁止从某个源(即URL的协议/主机/端口三元组)装载的页面访问来自不同源的数据。
The SOP is a security restriction that basically forbids a page loaded from a certain origin (meaning the protocol/host/port trio of the URL) to access data from a different origin.
首先,记住您正试图实现两个有些矛盾的目标:最小化容器(以及主机)之间的复制,同时需要确保安全隔离。
First, remember you are consolidating two somewhat contradictory goals: you want to minimize duplication among containers (and the host) while needing to ensure isolation.
首先,记住您正试图实现两个有些矛盾的目标:最小化容器(以及主机)之间的复制,同时需要确保安全隔离。
First, remember you are consolidating two somewhat contradictory goals: you want to minimize duplication among containers (and the host) while needing to ensure isolation.
应用推荐