首页 / 词典 / good

chroot

  • 网络改变根目录;根目录;目录
chrootchroot
  1. And chroot doesn 't change the network access .

    而且chroot不会改变网络访问。

  2. The system call chroot () has a number of problems , as noted above .

    chroot()系统调用有很多问题,如前所述。

  3. One useful tool that unfortunately is a little hard to use is the chroot () system call .

    chroot()系统调用是一个实用的工具&不幸的是有一些难用。

  4. The chroot () function changes the root directory of the current process to the specified directory .

    函数的作用是:改变当前指定目录的根目录。

  5. The big new feature is chroot support for sshd ( 8 ) .

    一个较重大的新特性是对sshd(8)的chroot支持。

  6. The permission for the / chroot directory should be as follows

    chroot目录的权限应该是

  7. The techniques used to generate such lightweight containers are primarily those used to generate chroot environments .

    用于生成那些轻量级容器的方法与用于生成chroot环境的方法基本一样。

  8. For the paranoid , xinetd also supports an option called chroot .

    xinetd还支持chroot选项。

  9. The fourth line turns off chroot .

    第四行关闭chroot。

  10. Chroot is an ideal technique to segregate the resources your service has access to from the rest of the system .

    chroot可以把服务能够访问的资源与系统的其余部分分隔开。

  11. This call is similar to chroot (), but strives to be both easier to use and more effective .

    这个调用类似于chroot(),不过尽力更易用且更用效。

  12. Confine SFTP users to their own home directories by using Chroot SSHD

    使用ChrootSSHD将SFTP用户局限于其自己的主目录

  13. After a chroot , all other files and directories seem to vanish .

    执行chroot之后,其他所有文件和目录就看不到了。

  14. Linux-VServer also uses a form of chroot to isolate the root directory for each VPS .

    Linux-VServer还使用了一种chroot格式来为每个VPS隔离root目录。

  15. Running as root , rsync restricts itself to the module 's directory hierarchy ( its path ) using chroot .

    在作为根用户运行时,rsync通过使用chroot只访问模块的目录层次结构(路径)。

  16. One shortcoming of this approach is that an ordinary chroot () can be escaped , although some privilege is needed .

    这种方法的一个缺点是,可以回避普通的chroot()机制(虽然这需要某些特权)。

  17. Starting with OpenSSH-5.0p1 , there has been a modification in setting up the chroot environment .

    从OpenSSH-5.0p1开始,在chroot环境设置方面有一个修改。

  18. A process could chroot () itself as though the root of the filesystem tree was a subdirectory of the system 's filesystem root .

    进程可以对本身执行chroot(),使其文件系统树的根成为系统文件系统根的一个子目录。

  19. Once you change to a new root ( hence , chroot ), files outside the root and its subdirectories are effectively nonexistent .

    通过chroot设置新的根目录之后,根目录及其子目录之外的文件就相当于不存在了。

  20. For SFTP to run in the chroot environment , set the Subsystem config option in the sshd_config file as follows

    为了在chroot环境中运行SFTP,要在sshdconfig文件中设置Subsystem配置选项,如下所示

  21. The home directory of the user " / home / jyoti " has to be created manually inside / chroot .

    必须在/chroot中手工创建用户的主目录“/home/jyoti”。

  22. For example , you might run an FTP service under chroot so that no one can gain access to any file save those in the new root .

    例如,可以在chroot下运行FTP服务,这样任何人都无法访问新的根目录之外的文件。

  23. Since the mount tree has no parent for the new root , the system cannot be tricked into entering it like it can with chroot () .

    因为在挂载树中新的根目录没有父目录,所以无法像使用chroot()时那样欺骗系统,从而访问真正的文件系统根。

  24. Because xCAT expects the named service not to use chroot , remove the package bind-chroot , as shown in the listing .

    由于xCAT期望此命名服务不使用chroot,所以需要删除包bind-chroot,如如下的清单所示。

  25. Cliuser is a special user who can execute only SONAS CLI commands and works in a chroot jail .

    cliuser是一个特殊用户,只能执行SONASCLI命令,并且只能在chroot范围内使用。

  26. For example , take / chroot as the chroot directory , then the sshd_config fille will be as follows

    例如,假设以/chroot作为chroot目录,sshdconfig文件中的设置应该是

  27. A new config option , ChrootDirectory , is included in the sshd_config file that specifies the path to chroot after authentication .

    sshdconfig文件中增加了一个新的配置选项ChrootDirectory,它指定身份验证之后chroot的路径。

  28. You need to create the home directory of the user in the chroot environment and the chrooted directory should be a root-owned directory .

    需要在chroot环境中创建用户的主目录,chroot目录的所有者应该是根用户。

  29. The difference lies in the read-only bind mounts and the use of namespaces to enhance the isolation of the chroot environment to the point that it becomes an effective container .

    不同之处在于只读绑定挂载和使用名称空间增强chroot环境的隔离性,使之成为有效的容器。

  30. In other words , if you use chroot to change / tmp / fake_root , all file system resources outside of / tmp / fake_root are inaccessible to the process .

    换句话说,如果使用chroot把根目录改为/tmp/fakeroot,那么进程就无法访问/tmp/fakeroot之外的所有文件系统资源。