On the other hand , host - based av programs are relatively inexpensive and simple to deploy on small networks 另一方面,基于主机的反病毒程序在小型网络中部署时比较便宜、简单。
Host - based authentication is generally a quick and dirty way to raise the bar a notch , but is close to useless 基于主机的认证通常是设置防护的快速和直接的方法,但它接近于无效。
Both host - based and public key - based authentication using ssh are more secure than rsh rhost - based authentication 使用ssh的基于主机的认证和基于公钥的认证都比基于rsh rhost的认证安全。
Dmdids integrates host - based ids with network - based ids . it mainly comprises of hids , nids and a central manager Dmdids主要包括基于主机的入侵检测组件、基于网络的入侵检测组件和中心管理器。
This update to sshd config will allow the ssh server to accept host - based authentication requests from the ssh clients 对sshd _ config的上述更新将允许ssh服务器接受来自ssh客户机的基于主机的认证请求。
Host - based authentication is not complete , however , until the ssh client has been configured to use host - based authentication , as well 但是,在将ssh客户机也配置成使用基于主机的认证之前,基于主机的认证还没有完成。
This model provides the ids interface for network and for hosts , which is foundation of the cooperation among different agents 该模型提供了基于网络和基于主机入侵检测部件的接口,为不同agent之间的相互协作提供了条件。
Also , you do not need to have root authority to set up public key - based authentication portions of the host - based authentication setup require root access 而且,不需要root授权就可以设置基于公钥的认证(部分基于主机的认证需要root访问) 。
Tian x g . anomaly detection methods for host - based intrusion detection systems [ d ] . changsha : graduate school of national university of defense technology , 2005 ( in chinese ) 田新广.基于主机的入侵检测方法研究[ d ] .长沙:国防科技大学研究生院, 2005
This article describes how to configure openssh for host - based and public key - based authentication for the aix , linux , solaris , and hp - ux operating systems 本文描述如何为aix 、 linux 、 solaris和hp - ux操作系统上基于主机和基于公钥的认证配置openssh 。