system log

英 [ˈsɪstəm lɒɡ] 美 [ˈsɪstəm lɔːɡ]

网络  系统记录; 系统纪录; 系统日志

电力



双语例句

  1. Log messages to the system log or sound the PC speaker for instant user feedback about getting physical.
    将消息记录到系统日志中,或让PC扬声器发出声响以便对获得的物理输入发出即时用户反馈。
  2. In a nutshell, syslog allows applications to write tagged messages to a common set of system log files that can reside where it's convenient for the programmers and network administrators to access.
    简要地说,syslog允许应用程序将带有标记的消息写入一组公共系统日志文件中,这些日志文件可以驻留在程序员和网络管理员能够轻松访问的位置。
  3. Run the following command to initialize the system log
    运行下面的命令初始化系统日志
  4. Start the broker and check the system log to ensure that it reports the Service Federation listener has successfully started.
    启动代理并检查系统日志以确保它报告了服务联合侦听器已成功启动。
  5. If you encounter problems, check you system log.
    如果遇到问题,请检查系统日志。
  6. Server-side exceptions go to the system log file.
    服务器端异常将转到系统log文件。
  7. Var/ log maintains the suite of system log files, or those files that record system activity.
    var/log保存了一套系统日志文件,或者记录系统活动的文件。
  8. The messages log is the core system log file.
    messages日志是核心系统日志文件。
  9. The option SYSLOG sends the output to syslog, the central system log.
    SYSLOG选项把输出发送到syslog(中心系统日志)。
  10. By extracting information from workflow traces, such as system log data, workflow mining aims to discover the actual behavior of a workflow process.
    工作流挖掘抽取系统日志信息,挖掘流程的真实运作模型。
  11. Research on Data Mining to System Log Audit Information in IDS
    入侵检测中对系统日志审计信息进行数据挖掘的研究
  12. Are system log records prohibited from alterations?
    有否禁止更改系统监察记录?
  13. Office management primarily on the work plan, work week and work arrangements system log management;
    办公管理主要是对工作计划、工作日志和周工作安排进行系统的管理;
  14. At the same time added to the system log mechanism, the network makes a mistake in the circumstances, it can correct the consistency of data protection.
    同时在系统中加入了日志机制,使得在网络出错的情况下,也能正确的保障数据的一致性。
  15. This paper studies how to make data mining to system log audit information in IDS, provides the whole steps, and stresses using axis attribute to make character extraction to log audit information.
    研究了如何在入侵检测中对系统日志审计信息进行数据挖掘,提出了全套的步骤,并重点论述了采用轴属性对日志审计信息进行特征提取。
  16. The non-technical reconstruction consists of the setting for system log classification, design of Blog classification and Blogger classification.
    非技术性的重构是指系统日志分类设置、Blog分类以及Blogger分类的设计。
  17. Retrieval and Analysis of Network and System Log
    网络和系统的日志采集及分析
  18. The system deployment is more easier, and provides hacker more space to interact with, information gather ways include system log, firewall and IDS.
    该系统部署方便,提供给黑客更多的交互空间,从多个方面进行信息的收集,包括系统日志、防火墙和入侵检测。
  19. A framework of tunnel proxy system is presented and several components in this system are defined, such as access policy database, access control server, system log, tunnel information database and tunnel proxy server.
    设计了隧道代理系统结构图,并对各组成部分,即访问策略库、访问控制服务器、系统日志、隧道信息数据库、隧道代理服务器的功能进行了划分。
  20. The caching system generated log files are analyzed, and the timing automatic processing analysis and real-time monitoring functions for the system log files are implemented.
    对缓存系统产生的日志文件进行了深入的研究,实现了系统日志的定时自动处理分析和实时监控功能。
  21. First, the most commonly used system is the most important class of database operations to achieve, and secondly to achieve a system log entry, then to achieve a system administrator-related functions.
    首先对系统中最常用也是最重要的数据库操作类进行了实现,其次实现了系统登录入口,接着实现了系统管理员的相关功能。
  22. Currently, there are many methods of system log backup, all which have some shortcomings: a large performance overhead or need, or need to reduce the safety of the logs backup after network transmission.
    当前,存在很多备份系统日志的方法,但是都有一些不足之处:或是需要大的性能开销,或是需要经过网络传输降低了日志备份的安全性。
  23. Finally, the intrusion detection system log files use the data to the new PPM prediction model, using simulations to verify its validity.
    最后,将入侵检测系统日志的数据文件运用到PPM预测模型中,利用模拟实验验证了其有效性。
  24. In this paper, on the basis of analyzing the characteristics of the Android system log, we propose a new testing programs which combines static with dynamic.
    本文在分析Android系统日志的特性的基础上,提出了一种动静态相结合的新的检测方案。
  25. For user management, the experiment management, equipment management, time management, test report management, experimental reservation record management, system log management business work platform, and also for the development of the laboratory information management of scientific research provides a comprehensive platform.
    为用户管理、实验管理、实验台管理、时间管理、实验报告管理、实验预约记录管理、系统日志管理业务工作系统,也为开展实验室信息管理的科学研究提供一个综合性系统。
  26. System log can be used to record system events of each day.
    系统日志可用于记录设备的每天发生的各种事件。
  27. Through system requirements and model design, make sure the functions. The system implements news management, user management, access management, system log management, IP management, reporting information and so on.
    通过对系统的需求分析、功能模块设计,确定了系统所要实现的功能,并编程实现了新闻管理、用户信息管理、角色管理、权限管理、系统日志管理、IP管理以及信息发布等功能。
  28. This decentralized management approach, there are many defects and deficiencies, the centralized management of the enterprise system log will be the only way for the development of enterprise information.
    这种分散的管理方式存在很多缺陷和不足,因此企业系统日志的集中管理将是企业信息化发展的必由之路。
  29. While enhancing system Log security, it can save a lot of system overhead and hardware resources, be more convenient in the follow-up log analysis, and also encrypt and store system files that can guarantee the integrity of backup data.
    利用这个系统我们在获取到备份日志的同时,节约了大量的系统开销和硬件资源开销,在后续日志分析方面也更加方便,同时对系统文件进行加密存储,可以保证备份数据的完整性。
  30. The model uses the role-based access control strategy, to realize the system log, a unified authentication function.
    这种模型选用了基于角色的访问控制策略,来达到各系统间的一次登录、统一认证的功能。