If an attempt is made to send a log when all security servers are not working correctly, the log is stored in a temporary file on the agent.
如果在所有安全服务器都未正常运行时尝试发送日志,那么日志就被存储到代理的临时文件中。
This event should also be logged in the system, either by sending an email to the administrator, writing the event to a security log, or both.
这一事件也应该被记录在系统中,还要给管理员发送邮件,将事件写入安全日志。
There, you'll see an option to reset your security token and have it sent to your E-mail address. After you have your security token, use it in combination with your password to log in.
这里,可以看到一个重置安全令牌并将其发送到您的电子邮件地址的选项,有了安全令牌后,将它与您的密码一起用于登录。
If the log in is unsuccessful, you can edit the security realm and retest until it is successful.
如果登录成功,您可以编辑安全领域并重新测试,直到安全领域连接成功为止。
Very roughly, the idea is that the user will log in to the client, and then the client will make various security assertions to the server.
概括地讲,该思想就是用户登录到客户机,然后客户机向服务器做出各种安全断言。
Putting the user's identity in the log messages can be a great help for a security-aware application.
将用户的标识放到日志消息中,这对于对安全性敏感的应用程序是非常大的一个帮助。
Most of the events below are in the Security log; many are only logged on the domain controller.
以下是安全日志中的绝大部分事件,部分仅仅是域控制器的记录。
The file my-realm.xml defines three GBeans that coordinate authentication type, login usage, and the security realm users log in to.
文件my - realm . xml定义了三个GBeans用来协调身份验证类型、登录用法以及用户登录到的安全领域。
You create a simple login system where users can visit and log in using form-based authentication and J2EE declarative security using Geronimo's SQLLoginModule.
将使用Geronimo的SQLLoginModule创建一个简单的登录系统,用户可以用基于表单的认证和J2EE声明式安全性访问和登录系统。
In network system there is a large amount of log audit data which contain much information related to security.
网络系统中存在大量的日志审计数据,在这些日志审计数据中含有许多与安全有关的信息。
For audit to understand how to print each object as a record to the audit log, it needs a corresponding entry in the /etc/security/events file.
为了让审计系统了解如何将每个对象作为一条记录输出到审计日志中,需要使用 /etc/security/events文件中的相应条目。
For total security, set it to require the master password at every automatic log-in.
如果要达到百分百安全,就把它设为每次自动登录时都要键入主人密码吧。
This my-realm GBean specifies the domain that users log in to and defines the System and Security modules.
这个my - realmGBean指定用户登录到的域并且定义System和Security模块。
Depending if you have configured SSO, it's either the user provided as BindCredentials (SSO) or the actual user who tries to log in (no SSO) who's getting blocked by the LDAP security.
根据是否配置了SSO,LDAP安全设置阻止了作为BindCredentials提供的用户(SSO)或尝试登录的实际用户(非sso)。
Log in, expand the security entry and select Global security.
登录,展开security项,并选择global security。
You use the credential element under the subject to configure the log-in information for the security-realm.
在subject下使用credential元素配置security - realm的登录信息。
For security reasons, all visitors must be accompanied by hostel resident when entering the hostel, and register in the visitors log clearly.
为加强宿舍保安,所有访客须由本宿舍宿生陪同,始可进入宿舍内,并须清楚填写访客登记册。
Log analysis regard as component part of network security defending system, it plays a very important role in the network security.
日志分析作为网络安全防御系统的组成部分,在网络安全中起着重要的作用。
Security professionals are drowning in log files, vulnerability scan reports, alerts, reports, and more, but the data is not actionable.
目前,安全专业人士正被淹没在日志文件、漏洞扫描、各种提醒、各类报 告等数据的海洋中,但这些数据并非不可操控的。
The system's capabilities of log and filtering can enhance the system security and allow the system to be in a better management and control.
系统的日志和过滤功能则可以加强系统的安全性,使系统得到更好的管理和控制。
Through micro-shield APP, you can view the exception log in, set up landing protected, change passwords, view account security level, ready to lock the account.
通过微盾APP,你可以查看异常登录,设置登陆保护地,修改密码,查看帐号安全等级,随时锁定帐号。
The importance of designing and realizing a FTP log analysis system is stated clearly in this article from the Angle of network security protection.
本文从网络安全防范的角度讲述了设计和实现一个FTP日志分析系统的重要性。
Security audit system can record the user's actions and block the user's illegal operations in a timely manner. The log information can provide evidence for the computer forensics.
安全审计系统能够及时地将用户操作以日志的形式记录下来,并且对违规操作进行阻断,日志信息可以为事后取证提供证据。
Considered from the data security Angle, this system establishes log-in boundary plane for each sale to realize the identification.
从数据安全角度考虑,本系统对各个销售点都设置了登录界面以实现身份验证。
Moreover username-based log-in and download shall be preferred in order to guarantee the security of file download.
另外,为了保证文件下载的安全性,最好使用非匿名方式登陆下载。
The running management system of mobile official portal is an import security system. Log management takes on import function in the whole portal, it logs visiting behaviors.
移动办公门户运行管理系统是一个安全性因素很重要的系统,日志管理在整个系统中担任着重要功能,用于记录访问行为。
In order to solve security issues of the system log, the usual solution is: to make real-time backup for the system log in a machine outside of the protected system.
为了解决系统日志的安全问题,通常的解决方法是:在被保护系统之外的机器上对系统日志进行实时备份。
As an important data source reflecting the network security situation, logs affect the implementation of NSSA significantly, in the sense that it is important to make use of log-related data.
日志作为反映网络安全状况的重要数据源之一,对网络安全态势感知的实现有着关键的影响,如何做到对日志类数据的充分利用是非常关键的。
It has the functions including identity identification, security authentication and alarm on illegal log in. It could act as a powerful assistant o...
具有身份鉴别、安全审定、非法登录报警等功能,是传统网络安全产品强有力的助手、是网络安全的重要工具。
It has the functions including identity identification, security authentication and alarm on illegal log in. It could act as a powerful assistant o...
具有身份鉴别、安全审定、非法登录报警等功能,是传统网络安全产品强有力的助手、是网络安全的重要工具。
应用推荐