用户主机

  • 网络User host;client
用户主机用户主机
  1. 在主机接口设计方面,设计的LCD控制器能够匹配各种常用接口,增加了用户主机选择的灵活性和便捷性。

    In the host interface , the design of the LCD controller can match the variety of commonly used interface , increased user flexibility in host choice .

  2. 此套通信软件只需经过适当的改动就可以用于其它基于SPI通信的用户主机,大大缩短了针对其它主机的EPA设备研发周期,加快推广了EPA工业以太网的应用。

    Just after this set of communications software appropriate changes , it can be used for other users host based the SPI communication , Greatly reducing the EPA device development cycle for other host , Accelerate the dissemination of the EPA Industrial Ethernet applications .

  3. 通过JNI接口调用本地应用程序读取用户主机的硬盘序列号作为用户唯一性依据,利用RSA加密算法实现用户信息和注册信息的加密保护和验证。

    Transfer the sequence number of hard disk that the local application program reads user 's host computer as user 's uniqueness basis through JNI interface , then use RSA encrypt algorithms to realize the user information and encryption which register information are protected and proved .

  4. 一台或多台与用户主机通信的调度服务器。

    One or more scheduling servers that communicates with participant hosts .

  5. 物理隔离器由一个物理隔离控制器和八个安装在用户主机内部的终端组成。

    The system is made up with one physical isolating controller and eight Ethernet terminals which be fitted .

  6. 开关电源作为对用户主机或控制系统的直接供电装置,它的性能好坏将直接影响到设备工作的稳定性。

    The property of switch power , which plays the role the direct power supply unit of the users ' host and control system , is closely related the stability of the equipment .

  7. 说它慢,是因为做任何事情都必须把大批信息通过网络送到服务器,然后再返回给台式机。一台或多台与用户主机通信的调度服务器。

    It 's slow because to get any work done you have to send a batch information across the network to the server and then back to your desktop . One or more scheduling servers that communicates with participant hosts .

  8. 本文阐述了常见的口令攻击技术:从用户主机中获取口令,在通信线路上截获口令,从远端系统中破解口令,并介绍了相关的防范措施。

    This article elaborated the common password attack technology : Gains the password from the main station , intercepts the password on the communication link , explains the password from the far-end system , and introduced the related guard measure .

  9. 此方法不但可以灵活管理IP地址,而且可以实现人机结合认证,加强用户与主机的安全。

    The solution can not only ease the IP address management , but also realize the user-computer integration authentication , thus strengthen the security of user and mainframe .

  10. 首先,根据认证模型的功能要求,对标准RADIUS协议的报文类型与属性进行了扩展设计,以实现在线用户与主机的管理与控制。

    First , it extends the type and property of datagram to standard RADIUS protocol according to the functional requirement of authentication model , and implements the management and control to online user and host .

  11. 但是,对于任何关注安全性的系统来说,很可能需要限制某些用户或主机通过SSH连接指定的系统。

    However , as with any system regarding security awareness , there maybe a requirement to restrict certain users or hosts from connecting to a designated system via SSH .

  12. 通常,如果需要的话,您可以通过用户、主机或者tty对信息进行筛选。

    You can often filter the information by user , host , or tty if you need to .

  13. 强制用户输入主机对象(desc)会给代码增加不必要的干扰。

    Forcing the user to type the host object ( desc ) adds needless noise to the code .

  14. KDC还拥有一个密匙数据库;每个实体(用户、主机或应用服务器)与KDC共享一个密匙。

    KDC also has a database of secret keys ; each entity ( user , host , or an application server ) shares a secret key with the KDC .

  15. 为了通过sshdconf文件控制用户和主机的访问,可以使用以下格式:root@或root@

    To control access by user and host via the sshd_conf file , you can use the following formats : root @ or root @

  16. 通过本文的研究工作,对从接入层加强Intranet安全的方法作了有益的探索。本文的工作表明这种认证与管理策略使得Intranet从接入层提高了接入用户和主机的可信性。

    The research in this article makes instructive exploration on strengthening the intranet security through access layer , and it demonstrates that such authentication and management policy truly improve the credibility of connected user and host of intranet on access layer .

  17. 以上问题的存在,是由于Intranet在接入层未依据用户、主机及接入交换机端口的可固定对应关系,对接入的用户及其访问时间、所使用的主机进行联合认证与控制。

    These problems hereinbefore are due to the lacking of combined authentication and control to connected user , its access time and the running host according to the fixed corresponding relationship among user , host and connected switch port on the access layer of Intranet .

  18. 为了确认mailertable和别名会把邮件发送到正确的用户、主机和端口,我运行带-bv标志的sendmail命令

    To verify that the mailertable and aliases would direct mail to the correct user , host , and port , I ran the sendmail command with the-bv flag

  19. 在交换机的实现方案中,结合交换机的端口安全技术及802.1x协议,体现了端口这个认证要素,使得整个实现方案体现了用户+主机+接入端口+访问时间的接入控制策略。

    In the implementation solution , we combine the switch 's port security technology and 802.1x protocol , and thus express the authentication factor of " port ", and embody the whole implementation solution 's connection control policy on user , host , port and access time .

  20. 该认证模型体现了粒度为用户+主机+访问时间的接入控制策略。

    This model implements the connection control policy on user , host , port and access time granularity .

  21. 本文主要研究了:第一,远程用户代理主机及针对虚拟代理主机的管理服务程序。

    This thesis mainly focuses : First , we talk about distant user agent machine and virtual agent machine management program .

  22. 在使用这个脚本时,您必须将用户或者主机组合和命令放到双引号中,以确保能够将其识别为单个参数。

    When using the script , you must put the user or host combinations and the command into double quotes to ensure they are identified as a single argument .

  23. 可以使用以下命令作为匿名用户连接远程主机tardis

    To connect to the remote host tardis as an anonymous user , you can use

  24. 一般来说,Intranet是相对封闭的,但是Intranet还是面临着诸多安全与管理问题,比如:接入用户身份及主机的可信性、IP地址管理混乱及网上行为查实举证难等问题。

    Intranet is relatively close as a whole , but it is still faced with many security and management problems : credibility of connected user identity and host , management confusion of IP address , checking and justify of online behavior .

  25. 这些连接只是限于连接用户和虚拟主机。

    These connections are always bound to combination of user and virtual host .

  26. 该组件预先配置了用户注册表的主机名称,因为这个名称在整个企业中是相同的。

    The component is preconfigured with the host name of the user registry , because that is consistent across the enterprise .

  27. 如果用户没有在主机上获得合法授权,那么其将无法接入基础网络。

    If the user does not have lawful authority to obtain the host , then it will be unable to access the underlying network .

  28. 这是主机名,root用户只能从这个主机连接。

    That is , the name of the host , that user root can only connect from .

  29. 最终用户可从该主机中访问文件,而这些文件实际存储在IBMSONAS中。

    The end users access their files from this machine which are actually stored on IBM SONAS .

  30. AmazonEC2在这些层中作为IaaS,向用户提供虚拟的主机。

    Amazon EC2 is playing a role as the IaaS in these layers and provides users virtualized hosts .