host key 中文意思是什麼

host key 解釋
主機密鑰
  • host : n 〈常 H 〉【宗教】聖餅,聖餐用麵包。n 1 主人 (opp guest)。2 (廣播、電視的)節目主持人。3 旅館...
  • key : n 1 鑰匙。2 要害,關口,要沖。3 關鍵,線索,秘訣;解法。4 (外國書的)直譯本,圖例,題解,圖解,...
  1. This article describes how to configure openssh for host - based and public key - based authentication for the aix, linux, solaris, and hp - ux operating systems

    本文描述如何為aix 、 linux 、 solaris和hp - ux操作系統上基於主機和基於公鑰的認證配置openssh 。
  2. Researchers from the european molecular biology laboratory [ embl ] in grenoble and heidelberg, the institut de biologie structurale [ ibs ] and the unit of irus host cell interactions [ uhci ] *, both in grenoble, hae now produced the first 3 - dimensional image of part of this key protein

    現在,格勒諾布爾和海德堡的歐洲分子細胞學實驗室和格勒諾布爾的生物結構研究所及病毒宿主細胞相互作用部門的研究者們展示了部分這種關鍵蛋白質的首個三維影象
  3. It is a key principle that the operation must not interfere in internal affairs of the host countries and must not in any way favour one party against another

    有一條重要原則是,維和行動一定不準干涉所在國的內政,一定不準以任何方式袒護一方。
  4. The voltage of lithium - intercalation reaction, impedance and structural stability of intercalation - type cathode material were analysed and calculated. theoritical results show that the reaction voltage depends on the content of lithium and the bond energy, and that the key ways to lower the electrode impedance are to increase the electronic conductivity of the electrode and the diffusion coefficient of lithium ion in the host and to decrease the size of powder. in addition, the thermal stability of lithium - insertion structure can be improved by using crystallographic co - lattice theory and doping treatment

    本文從嵌入式陰極材料的嵌鋰反應的電壓、阻抗及結構穩定性的分析和理論計算著手,得到了電壓取決于基體中各種離子間的鍵能及鋰含量、降低電極阻抗的關鍵是提高電子型導電性和li ~ +在基體中的擴散系數及減小粉末粒度的理論依據及其利用晶體的共格原理和摻雜改性的方式來提高材料嵌鋰結構的熱穩定性的設計思路。
  5. The technical manuals relate closely to other key ioc documents, such as the host city contract and the olympic charter

    技術手冊與《主辦城市合同》 、 《奧林匹克憲章》這類奧運會核心文件有著緊密的關聯。
  6. It doesn ' t matter. since they ' re using laser discs here, it is very easy to change the key. you can just ask the host to lower the key

    沒關系,他們這兒用的是激光唱盤,很容易改調的,告訴主持人降一下調就行了。
  7. A host designates an issuer as a trusted root authority by putting the self - signed certificate of the issuer, which contains the public key of the issuer, into the trusted root certification authority certificate store of the host computer

    主機可以通過將頒發者自簽名的證書(其中包含頒發者的公鑰)放入主機的受信任根證書頒發機構證書存儲區,將此頒發者指定為受信任的根頒發機構。
  8. The theory of fdi holds that the developing host country can draw advanced technology and capital which its country lacks. utilizing international circulating resources can help our industry to stride across the bottleneck of the supply of the key element, to establish rapidly the industry which cannot be developed at the present, promote " the upgrading of the old industries of the host country, enhance the quality of the related industries " capital, transfer the comparatively inferior industry to the comparatively superior industry, to accelerate the u pgrading of the industrial structure. however, the effect of fdi on promoting the upgrading of the host country ' s industrial structure is decided by the height of the industrial development of the emigrating country, the industrial accepting ability of the host country and the industrial leading " ability formed by fdi ' s related effect

    外商直接投資理論認為通過引入外商直接投資,發展中東道國可以引入本國缺乏的先進技術和資本,利用國際流動資源幫助本國產業跨越原要素供給的瓶頸,迅速建立起現階段自身沒有能力發展的產業,推動東道國原產業的升級換代,提高東道國關聯產業存量資本和新形成資本的質量,使相對比較劣勢的產業向比較優勢的產業轉化,加速本國產業結構升級。但是外商直接投資促進東道國產業結構升級效應的高低則決定於產業轉移國的產業發展高度,東道國的產業接受能力和通過外商直接投資關聯效應形成產業帶動的能力。
  9. While inserting the semi - fragile mark, the key is also robustly embedded into the host

    在水印數據半脆弱地嵌入載體信息的同時,密鑰也被穩健地隱藏在載體信息中。
  10. My paper, firstly builds up a logic framework in the research, that is element mechanism, concept foundation ( avs ) and theory foundation. on elements mechanism layer, the paper not only extracts three key elements, that is host, information and environment, combined with other elements, but also builds up a model of element agreement and constructs appraisal process systematical structure as well as control flow chart. on concept foundation layers, the paper

    按照這一邏輯層次,本文在要素機理層面,提取評估主體、信息、環境三大關鍵要素,結合其他要素構築要素耦合圖,並依此構造資產評估的過程系統結構圖與控制流程圖;在概念層面,確立資產評估價值標準( avs )這一核心概念的內涵( fmv ) ;在理論基礎層面,首先澄清了資產評估的會計理論基礎,然後依次(第三章與第四章)介紹了基於新古典經濟學與博弈論的資產評估機理的特點。
  11. Foreign funds have had a important role on the economy of chinese, who has been the largest country in the world, and the second largest one in the developing countries, but, there has been some unavoidable questions in chinese economic security, especially come to lash of industry ? so we 11 do our best to take the paper is organized into these major parts : ( 1 ) the development of tncso ( 2 ) tncs ' s fdi o this section will analysis the key factors and the causes when tncs launchs the action in fdi ; ( 3 ) the effectso they include ones produced in the world economy, home country economy and host country economy ; ( 4 ) the functions of the foreign funds when china has taken in these fdi ; the part emphatically points out the impacts by the model of econommetric

    目前,作為發展中國家的最大、全球的第二大引資國,外資在中國的經濟發展中起到了一定的積極作用,但也不可避免地對中國的經濟產生安全問題,特別是產業的沖擊。本文主要從以下幾個方面加論述: 1 、跨國公司的發展情況,主要是說明跨國公司的發展狀況和分析其在新的環境下的發展趨勢; 2 、跨國公司的對外直接投資,主要闡述其在對外投資活動中的可行性研究,在選擇投資環境中應考慮的關鍵因素和跨國公司對外直接投資活動的動因; 3 、跨國公司對外直接投資活動的影響,著重分析對世界、母國和東道國的經濟影響,以及在全球經濟結構變化中的作用; 4 、跨國公司對華直接投資和中國的對外直接投資的現狀:著重分析跨國公司對華直接投資的影響,並用計量經濟模型來分析其影響。
  12. The other key link in russia ' s aam chain is the agat moscow research institute. agat supplies radar seekers for a host of russian missile systems

    俄國空空導彈鏈條上另外一個關鍵環節就是阿加特設計局莫斯科研究院。阿加特設計局為許多俄制導彈系統提供雷達導引頭。
  13. Three key abilities for " effective capital type fdi " include : the ability of reassembling essential " factors, the ability of forming value - added chain in transnational industry and the ability of appropriately reacting to the market condition of host countries

    要素的整合能力、跨國產業增殖鏈的建構能力以及對東道國市場條件適應性反應能力,是有效資本型fdi的三大核心能力。
  14. After studying many relative books and combining with my own understanding, i write this thesis. this thesis includes : the meaning & characteristics of network security ; threatening & attacking that the computer network faces ; general measures to protect network security ; brief introduction, classification and relationships to network security technology ; general description and key technology of fire proofing ( package filtrate technology, delegating technology, nat technology ) ; the constructive type of fire proofing ( filter route ware, multi - port host computer, host computer screen, subnet screen etc. ) ; the examples of the constructive application of fire proofing ; the future developing trend of fire proofing technology and products, etc. so, net security and fireproof technology are the title of this paper

    綜上原因,本文將「網路安全」和「防火墻技術」組在一起形成本論文題目。本論文是筆者在研讀許多相關文獻並結合自己理解基礎上寫成的,主要內容為:網路安全含義及特徵、計算機網路所面臨的威脅和攻擊、保障網路安全的一般措施;網路安全技術的簡介、分類及關系;防火墻概論、防火墻關鍵技術(包過濾技術、代理技術、 nat技術等) ;防火墻的構建類型(過濾路由器、多埠主機、主機屏蔽、子網屏蔽等) ;防火墻的構建應用舉例;防火墻技術的未來發展趨勢及產品等。
  15. Combining the hotspots, key points and difficulties in the development of it industry and informationalization, we will leverage our advantages, organize a host of brand conferences and activities, and build a high - quality communication platform and service bridge for both sides in the it industry in the fields of technology discussion, it application in the industries, it channels and digital entertainment

    結合信息產業和信息化發展的熱點、重點、難點, 2005年,我們將發揮自身強項,有針對性地組織系列化的品牌會議活動,在技術研討、行業信息化、 it渠道、數字娛樂等領域為信息產業雙方搭建高質量的溝通平臺和服務橋梁。
  16. The monitor strategy of high availability system is studied and the solution of monitoring all key resources of a high availability system is discussed based on the prototype of 3 - host model. hardware, operating system, network resources, dbms, the running mode of applications are wholly covered in the thesis

    本文首先介紹了通用高可用系統的策略,通過對系統硬體、操作系統、網路、數據庫軟體、應用軟體運行方式的研究,提出了三主機模式高可用系統,實現監控業務系統中所有關鍵資源的解決方案。
  17. Then it constructs three layers frame in dnc workstation according as this model and deeply discusses the key technique. in designing for facility network, the paper study method, frame and communication soft in connecting, network between numerical control equipment and host computer of dnc. based on com component, the paper brings forward designing method for the system of reamer management system, file management system, equipment management system in dnc system and gives an example for the realization of data copy component and data query component in reamer administration

    在車間局域網的dnc系統設計中,採用了b s網路通信模式,然後依據此模式構建了dnc工作站的三層體系結構,並對其中的關鍵技術進行了深入的探討;在基於設備網的dnc系統中,對數控設備與dnc主機之間的網路連接方法、結構以及通信系統軟體的設計進行了研究;在com組件技術的基礎上了提出了dnc系統中的刀具管理系統、文件管理系統、設備管理系統的設計方法,並針對刀具管理系統中的數據錄入、數據查詢組件的實現舉例說明。
  18. The hemaglutinin ( ha ) of aiv plays the key role in determing the pathogenicity, cell receptor binding property and host range of the virus. the homology of the ha sequences reported and registered in genbank of different strains of h _ ( 5 ). h _ ( 9 ) subtype was respectively analyzed and compared with each other. the conservative domin of ha seqence of h _ ( 5 ), h _ ( 9 ) subtype was selected for pcr amplification. two sets of specific primers were designed

    本研究根據genbank中查出的禽流感病毒h _ 5亞型,禽流感病毒h _ 9亞型的ha片段基因組序列,利用dnasis軟體分別對aiv的h _ 5 、 h _ 9亞型ha基因區域進行同源性比較,設計篩選出兩對聯合pcr反應的特異性引物,其中一對是h _ 9亞型通用引物,擴增出ha片段695bp ,另一對引物為h _ 5亞型的通用引物,擴增出的ha區域部分目的片段約為448bp 。
  19. Utility to gather the public host key for each host in the db2 dpf instance

    實用程序收集db2 dpf實例中每個主機的公共主機密鑰。
  20. Now, open the ssh server host s ssh known hosts file, and add the client machine s hostname all applicable versions - unqualified, fully qualified, and ip address, all separated by commas, followed by the contents of the ssh client host s public host key

    現在,打開ssh服務器主機的ssh _ known _ hosts文件,添加客戶機的主機名(所有適用的版本- -未限定主機名、全限定主機名或者ip地址,全部以逗號隔開) ,後面跟上ssh客戶機主機的公共主機密鑰的內容。
分享友人