基于主机的
例句与用法
- On the other hand , host - based av programs are relatively inexpensive and simple to deploy on small networks
另一方面,基于主机的反病毒程序在小型网络中部署时比较便宜、简单。 - Host - based authentication is generally a quick and dirty way to raise the bar a notch , but is close to useless
基于主机的认证通常是设置防护的快速和直接的方法,但它接近于无效。 - Both host - based and public key - based authentication using ssh are more secure than rsh rhost - based authentication
使用ssh的基于主机的认证和基于公钥的认证都比基于rsh rhost的认证安全。 - Dmdids integrates host - based ids with network - based ids . it mainly comprises of hids , nids and a central manager
Dmdids主要包括基于主机的入侵检测组件、基于网络的入侵检测组件和中心管理器。 - This update to sshd config will allow the ssh server to accept host - based authentication requests from the ssh clients
对sshd _ config的上述更新将允许ssh服务器接受来自ssh客户机的基于主机的认证请求。 - Host - based authentication is not complete , however , until the ssh client has been configured to use host - based authentication , as well
但是,在将ssh客户机也配置成使用基于主机的认证之前,基于主机的认证还没有完成。 - Also , you do not need to have root authority to set up public key - based authentication portions of the host - based authentication setup require root access
而且,不需要root授权就可以设置基于公钥的认证(部分基于主机的认证需要root访问) 。 - Tian x g . anomaly detection methods for host - based intrusion detection systems [ d ] . changsha : graduate school of national university of defense technology , 2005 ( in chinese )
田新广.基于主机的入侵检测方法研究[ d ] .长沙:国防科技大学研究生院, 2005 - For your db2 udb dpf instance to use host - based authentication , each host in the instance must have the ssh client and ssh server configured properly
为了让db2 udb dpf实例使用基于主机的认证,实例中的每个主机必须正确地配置ssh客户机和ssh服务器。 - The term legacy applications is used in this article to refer to existing host - based applications , including what are known as green - screen applications
本文中出现的术语遗留应用程序,是指现有的基于主机的应用程序,包括所谓的绿屏( green - screen )应用程序。