system log

[ˈsɪstəm lɔɡ][ˈsistəm lɔɡ]

系统记录

  • Through system requirements and model design make sure the functions . The system implements news management user management access management system log management IP management reporting information and so on .

    通过对系统的需求分析、功能模块设计,确定了系统所要实现的功能,并编程实现了新闻管理、用户信息管理、角色管理、权限管理、 系统 日志管理、IP管理以及信息发布等功能。

  • While enhancing system Log security it can save a lot of system overhead and hardware resources be more convenient in the follow-up log analysis and also encrypt and store system files that can guarantee the integrity of backup data .

    利用这个 系统我们在获取到 备份 日志的同时,节约了大量的系统开销和硬件资源开销,在后续日志分析方面也更加方便,同时对系统文件进行加密存储,可以保证备份数据的完整性。

  • Are system log records prohibited from alterations ?

    有否禁止更改 系统 监察记录?

  • Run the following command to initialize the system log

    运行下面的命令初始化 系统 日志

  • If you encounter problems check you system log .

    如果遇到问题,请检查 系统 日志

  • Research on Data Mining to System Log Audit Information in IDS

    入侵检测中对 系统 日志审计信息进行数据挖掘的研究

  • In this paper on the basis of analyzing the characteristics of the Android system log we propose a new testing programs which combines static with dynamic .

    本文在分析Android 系统 日志的特性的基础上,提出了一种动静态相结合的新的检测方案。

  • The non-technical reconstruction consists of the setting for system log classification design of Blog classification and Blogger classification .

    非技术性的重构是指 系统 日志分类设置、Blog分类以及Blogger分类的设计。

  • Office management primarily on the work plan work week and work arrangements system log management ;

    办公管理主要是对工作计划、工作 日志和周工作安排进行 系统的管理;

  • Currently there are many methods of system log backup all which have some shortcomings : a large performance overhead or need or need to reduce the safety of the logs backup after network transmission .

    当前,存在很多备份 系统 日志的方法,但是都有一些不足之处:或是需要大的性能开销,或是需要经过网络传输降低了日志备份的安全性。

  • This decentralized management approach there are many defects and deficiencies the centralized management of the enterprise system log will be the only way for the development of enterprise information .

    这种分散的管理方式存在很多缺陷和不足,因此企业 系统 日志的集中管理将是企业信息化发展的必由之路。

  • This paper studies how to make data mining to system log audit information in IDS provides the whole steps and stresses using axis attribute to make character extraction to log audit information .

    研究了如何在入侵检测中对 系统 日志审计信息进行数据挖掘,提出了全套的步骤,并重点论述了采用轴属性对日志审计信息进行特征提取。

  • The caching system generated log files are analyzed and the timing automatic processing analysis and real-time monitoring functions for the system log files are implemented .

    对缓存系统产生的日志文件进行了深入的研究,实现了 系统 日志的定时自动处理分析和实时监控功能。

  • First the most commonly used system is the most important class of database operations to achieve and secondly to achieve a system log entry then to achieve a system administrator-related functions .

    首先对系统中最常用也是最重要的数据库操作类进行了实现,其次实现了 系统 登录入口,接着实现了系统管理员的相关功能。

  • Retrieval and Analysis of Network and System Log

    网络和 系统 日志采集及分析

  • By extracting information from workflow traces such as system log data workflow mining aims to discover the actual behavior of a workflow process .

    工作流挖掘抽取 系统 日志信息,挖掘流程的真实运作模型。

  • Var / log maintains the suite of system log files or those files that record system activity .

    var/log保存了一套 系统 日志文件,或者记录系统活动的文件。

  • A framework of tunnel proxy system is presented and several components in this system are defined such as access policy database access control server system log tunnel information database and tunnel proxy server .

    设计了隧道代理系统结构图,并对各组成部分,即访问策略库、访问控制服务器、 系统 日志、隧道信息数据库、隧道代理服务器的功能进行了划分。

  • In a nutshell syslog allows applications to write tagged messages to a common set of system log files that can reside where it 's convenient for the programmers and network administrators to access .

    简要地说,syslog允许应用程序将带有标记的消息写入一组公共 系统 日志文件中,这些 日志文件可以驻留在程序员和网络管理员能够轻松访问的位置。

  • Log messages to the system log or sound the PC speaker for instant user feedback about getting physical .

    将消息记录到 系统 日志中,或让PC扬声器发出声响以便对获得的物理输入发出即时用户反馈。

  • At the same time added to the system log mechanism the network makes a mistake in the circumstances it can correct the consistency of data protection .

    同时在 系统中加入了 日志机制,使得在网络出错的情况下,也能正确的保障数据的一致性。

  • Server-side exceptions go to the system log file .

    服务器端异常将转到 系统 log文件。

  • The messages log is the core system log file .

    messages日志是核心 系统 日志文件。

  • For user management the experiment management equipment management time management test report management experimental reservation record management system log management business work platform and also for the development of the laboratory information management of scientific research provides a comprehensive platform .

    为用户管理、实验管理、实验台管理、时间管理、实验报告管理、实验预约记录管理、 系统 日志管理业务工作系统,也为开展实验室信息管理的科学研究提供一个综合性系统。

  • Start the broker and check the system log to ensure that it reports the Service Federation listener has successfully started .

    启动代理并检查 系统 日志以确保它报告了服务联合侦听器已成功启动。

  • The system deployment is more easier and provides hacker more space to interact with information gather ways include system log firewall and IDS .

    该系统部署方便,提供给黑客更多的交互空间,从多个方面进行信息的收集,包括 系统 日志、防火墙和入侵检测。

  • Finally the intrusion detection system log files use the data to the new PPM prediction model using simulations to verify its validity .

    最后,将入侵检测 系统 日志的数据文件运用到PPM预测模型中,利用模拟实验验证了其有效性。

  • The model uses the role-based access control strategy to realize the system log a unified authentication function .

    这种模型选用了基于角色的访问控制策略,来达到各 系统间的一次 登录、统一认证的功能。

  • System log can be used to record system events of each day .

    系统 日志可用于记录设备的每天发生的各种事件。