繁體版 English
登录 注册

基于主机

"基于主机"的翻译和解释

例句与用法

  • On the other hand , host - based av programs are relatively inexpensive and simple to deploy on small networks
    另一方面,基于主机的反病毒程序在小型网络中部署时比较便宜、简单。
  • Host - based authentication is generally a quick and dirty way to raise the bar a notch , but is close to useless
    基于主机的认证通常是设置防护的快速和直接的方法,但它接近于无效。
  • Both host - based and public key - based authentication using ssh are more secure than rsh rhost - based authentication
    使用ssh的基于主机的认证和基于公钥的认证都比基于rsh rhost的认证安全。
  • Dmdids integrates host - based ids with network - based ids . it mainly comprises of hids , nids and a central manager
    Dmdids主要包括基于主机的入侵检测组件、基于网络的入侵检测组件和中心管理器。
  • This update to sshd config will allow the ssh server to accept host - based authentication requests from the ssh clients
    对sshd _ config的上述更新将允许ssh服务器接受来自ssh客户机的基于主机的认证请求。
  • Host - based authentication is not complete , however , until the ssh client has been configured to use host - based authentication , as well
    但是,在将ssh客户机也配置成使用基于主机的认证之前,基于主机的认证还没有完成。
  • This model provides the ids interface for network and for hosts , which is foundation of the cooperation among different agents
    该模型提供了基于网络和基于主机入侵检测部件的接口,为不同agent之间的相互协作提供了条件。
  • Also , you do not need to have root authority to set up public key - based authentication portions of the host - based authentication setup require root access
    而且,不需要root授权就可以设置基于公钥的认证(部分基于主机的认证需要root访问) 。
  • Tian x g . anomaly detection methods for host - based intrusion detection systems [ d ] . changsha : graduate school of national university of defense technology , 2005 ( in chinese )
    田新广.基于主机的入侵检测方法研究[ d ] .长沙:国防科技大学研究生院, 2005
  • This article describes how to configure openssh for host - based and public key - based authentication for the aix , linux , solaris , and hp - ux operating systems
    本文描述如何为aix 、 linux 、 solaris和hp - ux操作系统上基于主机和基于公钥的认证配置openssh 。
  • 更多例句:  1  2  3  4  5
用"基于主机"造句  
英语→汉语 汉语→英语