連接日誌 的英文怎麼說

中文拼音 [liánjiēzhì]
連接日誌 英文
attach log
  • : Ⅰ動詞1 (連接) link; join; connect 2 (連累) involve (in trouble); implicate 3 [方言] (縫) ...
  • : Ⅰ動詞1 (靠近;接觸) come into contact with; come close to 2 (連接; 使連接) connect; join; put ...
  • : Ⅰ名詞1 (太陽) sun 2 (白天) daytime; day 3 (一晝夜; 天) day 4 (泛指某一段時間) time 5 (日...
  • 連接 : connect; fit together; link; marry; mate; joint; association trail; linkage; concatenate; concate...
  • 日誌 : daily record; journal
  1. Network - monitor module implements the function : monitoring promptly the equipment, the ports, the communication, and the connections of all the seats in a center system and leaving network log

    網路監控模塊實現了對一個控制中心內所有席位的網路設備情況和網路介面情況、各席位通信情況、各席位狀況進行實時監視,並形成網路,自動記錄並列印留底。
  2. Supporting system catalog output, sending users s authentication catalog and access to the appointed servers through standard syslog way

    支持系統標準輸出,可通過標準的syslog方式將用戶的認證和訪問連接日誌發送到指定服務器
  3. Utility provides access to all the package configuration and execution features, such as connections, properties, variables, logging, and progress indicators

    實用工具,可以訪問包的所有配置和執行功能,如屬性變量記錄和進度指示器。
  4. Further small parts are gained by the division of the three big parts. these smaller modules include route module, portal module, fee module and connection management module, etc

    對各大模塊組又進行了詳細劃分,由這些模塊分別承擔ussd網關的路由、門戶導航、計費、管理以及等工作。
  5. When you are detaching or attaching a database, the database engine tries to impersonate the windows account of the connection performing the operation to guarantee that the account has permission to access the database and log files

    分離或附加數據庫時,數據庫引擎嘗試模擬執行該操作的的windows帳戶,從而保證該帳戶具有訪問數據庫和文件的權限。
  6. On the other hand, this system does not analyze the huge daily record and network record completely, but defines the suspicious intrusion mark, and collect corresponding auditing when this kind of mark appears

    另一方面,本方案不對龐大的信息和網路記錄進行完全性分析,而是定義可疑的入侵標記,當出現這種標記時才進行相應的審計記錄收集。
  7. If the other services change, however, for example if the name service lookup algorithm changes, all existing code in the server would require modification, recompilation, and static relinking

    應用程序可以將長紀錄寫到一個本地文件當網路斷開時,也可以將記錄轉發給服務器當網路上時。
  8. A standard logging file shows dropped packets and successful inbound and outbound connections

    標準的文件顯示了丟棄的數據包和成功的入站出站
  9. Safe mode with networking also causes a boot log to be saved ( see " enable boot logging, " later in this list )

    帶有網路的安全模式也可導致保存引導(參閱本列表後面的「啟用啟動」 ) 。
  10. Utility or the windows command processor, except when information is collected from windows performance logs and event logs

    除了通過windows性能和事件收集的信息之外,所有診斷信息均通過到工具(如sql server
  11. The secondary computer in log shipping can be renamed if the primary computer is permanently lost

    如果主服務器永久丟失,則可以重命名傳送中的輔助服務器。
  12. When you install an event log, you can optionally connect it to an existing log

    當安裝事件時,可以選擇將其到現有
  13. Idms firewall - idms firewall - easy to use firewall configuration script, featuring statefull connection tracking, bandwidth limiting and bandwidth logging

    一個易於使用,通過腳本配置的防火墻,可以對進行全程跟蹤,帶寬限制和帶寬
  14. A host - side port ( link ) has been detected as down

    主機端的有問題嗎?看看交換機的吧。
  15. Thirdly, it searches the possible crosscutting concerns from the subsystems and finds out many crosscutting concerns such as logging, user permission - checking, license checking of the non - basic modules, synchronized accessing of shared memory, managing of db connection pool and managing of win32 apis ’ exceptions. finally, it implements the crosscutting concerns using aspectc + + language and verifies some of them. because of encapsulating the crosscutting concerns with aop, the coupling degree of modules and the difficulty of user ’ s maintenance are decreased, the

    著圍繞各個子系統的設計與開發,對各個子系統中可能存在的橫切關注點進行了分析和研究,指出了處理、用戶權限檢查、非基本模塊的許可證驗證、共享內存的同步訪問、數據庫池管理和win32api異常處理這些系統級的橫切關注點,並採用aop技術對這些橫切關注點進行了單獨的模塊設計。
分享友人