文本日誌 的英文怎麼說

中文拼音 [wénběnzhì]
文本日誌 英文
text memo
  • : Ⅰ名詞1 (字) character; script; writing 2 (文字) language 3 (文章) literary composition; wri...
  • : i 名詞1 (草木的莖或根)stem or root of plants 2 (事物的根源)foundation; origin; basis 3 (本錢...
  • : Ⅰ名詞1 (太陽) sun 2 (白天) daytime; day 3 (一晝夜; 天) day 4 (泛指某一段時間) time 5 (日...
  • 文本 : text; version
  • 日誌 : daily record; journal
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論陳述了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和審計等) 。論然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  2. Before leaving the ship, the master shall direct the crew members to do their utmost to rescue the deck log book, the engine log book, the oil record book, the radio log book, the charts, documents and papers used in the current voyage, as well as valuables, postal matters and cash money

    在離船前,船長應當指揮船員盡力搶救航海、機艙、油類記錄簿、無線電臺航次使用過的海圖和件,以及貴重物品、郵件和現金。
  3. The complete text of the workbench error log

    工作臺錯誤的完整
  4. The author interviewed self - employed married women in the flower production industry to examine differences in estimates of unpaid labor time between time diaries and direct questions

    以已婚花農婦女為例,分別比較時間與兩種直接詢問法,在估計無酬勞力時間的差異。
  5. The base file name for the default trace log file is

    默認跟蹤件的基件名是
  6. While the server version of os x supports an enhanced version of hfs with journaling and optional filename case - sensitivity, it cannot match linux s range of filesystem options

    盡管os x的服務器版支持一種增強hfs +件系統,這種件系統具有功能,以及可選的字母大小字敏感的件名功能,但它還是比不上linux眾多的件系統選項。
  7. Another highlight of the architecture is introduction of data mining technique. ids makes use of data mining algorithms to abstract key features of system runtime status from security audit data such as system log and network data stream, and then constructs classify engine of audit data

    提出的體系結構中還引入了數據挖掘思想,利用數據挖掘技術中的關聯分析、分類等演算法從系統、系統調用序列、網路流等海量的安全審計數據中提取關鍵的系統特徵屬性,根據這些屬性生成安全審計數據的分類模型用於入侵檢測。
  8. For one, ext3 s journal is stored in an inode - a file, basically

    其中之一是, ext3的存儲在一個索引節點中基上是個件。
  9. Upon abandoning the ship, the master must take all measures first to evacuate the passengers safely from the ship in an orderly way, then make arrangements for crew members to evacuate, while the master shall be the last to evacuate

    在離船前,船長應當指揮船員盡力搶救航海、機艙、油類記錄簿、無線電臺航次使用過的海圖和件,以及貴重物品、郵件和現金。
  10. This article describes how the audit log is set up, and what data is written to the audit log table

    描述了如何建立審核,以及什麼樣的數據要寫入審核表中。
  11. You can use any text editor to view a log

    可以使用任何編輯器查看
  12. During this collaborative action research, we communicated, inspired and improved each other by the ways of classroom observations, discussions, interviews and writing research diaries. in practice, we gradually had groped for a method of improving the level of the common spoken chinese in ganzanggou by the research of the composition teaching, and inquired a way of composition teaching which was suitable to local areas and local nationality, and tried to change the current conditions of composition teaching and advance the students " development, and improve the level of writing and language expression of students

    研究是與西北貧困地區農村小學一位語教師合作展開的作教學行動研究,通過課堂觀察、討論、寫研究、訪談等方式,與教師相互交流、反思等,在實踐中嘗試探索通過作教學的改革來提高學生普通話水平的有效途徑,並在此基礎上探索出適合當地的作教學方式,從而改變現有的作教學效果不佳的狀況,進一步提高學生的寫作水平和語言表達能力。
  13. This thesis discusses the research and development on some critical parts in airspace management and evaluation system, including mainly the following contents : design the architecture of airspace management and evaluation system. design and realize the event log middleware and event log module based on middleware technology. design and realize the core and nodus of airspace management and evaluation system - airspace data access based on object oriented technology and nested table technology

    對空域管理與評估系統的一些關鍵問題進行了研究和開發,主要包括以下幾個方面的內容:設計空域管理與評估系統的體系結構提出並實現了基於中間件技術的中間件及維護模塊採用面向對象技術和嵌套表技術設計和實現了空域管理與評估系統中的核心和難點? ?空域數據訪問
  14. Determining the name of a plain - text crawl log file

    >確定純爬網件的名稱
  15. Sparks of this paper are as follows : 1 ) a much improved security audit log is presented, which supports log file in main systems and ensures orginal log files before system intruding happens are protected from being tampered or deleted so that they can be saved completely to be used as investigation clues and evidence souces of great importance ; 2 ) a log file base including different kinds of log files is established to support log file collecting and analyzing ; 3 ) correlation analysis is applied to effectively identify latent clues

    的創新點在於: 1 )提出了一種較為完善的支持計算機取證的安全審計方法,它可以支持目前常見系統的件,確保系統被入侵攻擊前的件記錄不被篡改、刪除,使得入侵者在入侵攻擊系統前留下的「痕跡」能被完整的記錄下來,作為取證人員重要的調查線索和證據來源; 2 )對各類系統不同件組成件庫,為獲取和分析件的記錄提供支持; 3 )對各類件的記錄採用關聯分析,更有效的提取潛在的計算機犯罪線索。
  16. For example, for purposes of this article i created an xml representation of an approximately 1 megabyte apache access logfile

    例如,出於目的我創建了一個大約一兆位元組的apache訪問件的xml表示。
  17. The jffs2 filesystem is log - structured, meaning that it is basically a long list of nodes

    Jffs2件系統是結構化的,這意味著它基上是一長列節點。
  18. Ssis log provider for text files

    的新提供程序。
  19. The text file log provider, which writes log entries to ascii text files in a comma - separated value format

    提供程序,將項以逗號分隔值( csv )格式寫到ascii件。
  20. When enabled, text log files are generated whenever an application accesses the cli driver

    啟用時,無論應用程序何時訪問cli驅動程序,都將生成文本日誌件。
分享友人