网站首页  词典首页

请输入您要查询的英文单词:

 

单词 ssh
释义

ssh

美 
英 [?]
  • 网络抑制消减杂交(suppression subtractive hybridization);抑制性消减杂交;抑制性消减杂交技术
int.
1.
used for telling someone to stop talking or making a noise

例句

释义:
1.
Completely hiding the fact that you even allow SSH access and requiring a special "knock" sequence to be recognized as a possible user.
完全隐藏允许SSH访问的事实,要求根据特殊的“敲门”序列识别有效用户。
www.ibm.com
2.
The brilliant return of SSH with his outstanding performance in EOE gave viewers a false impression, as if he has never left the TV screen.
而这次宋承宪的华丽回归,以及他在《伊甸之东》当中的出色表演,甚至让观众有些错觉,仿佛他从未离开过电视机屏幕一般。
www.trulyseungheon.com
3.
Beside allowing you to upload files, OpenSSH allows you to login to your server from anywhere as long as you know it's IP.
除了允许你上传文件外,只要你知道你的IP,OpenSSH允许你从任何地方登陆到你的服务器。对于Windows,你需要一个SSH客户端。
www.bing.com
4.
SSH also revealed the expression of heartache as he looked at her with sorrowful eyes.
宋承宪也露出了心痛的表情,以哀切的眼神望着她。
www.trulyseungheon.com
5.
For those running Linux, a more seamless solution is possible given the strong desktop environment support for SSH.
对于运行Linux的用户,由于桌面环境提供很强的SSH支持,有可能实现更无缝的解决方案。
www.ibm.com
6.
The SSH tool ssh-keyscan, shown in Listing 4, allows you to gather the public SSH host keys from multiple remote SSH hosts.
清单4中所示的SSH工具ssh-keyscan允许您从多个远程SSH主机收集公共SSH主机密钥。
www.ibm.com
7.
The seasonal variability of the wind stress is dominant in the formation of the SSH seasonal variability.
风的季节变化是南海SSH季节变化的主要原因。
d.wanfangdata.com.cn
8.
Let's assume that the setup is the same as in Trick 5, but you want tech to be able to get VNC access instead of SSH.
假设设置与技巧5中的一样,但希望tech能访问VNC而不是SSH。
www.ibm.com
9.
She pretends as a princess and gets into a psychological war with SSH over a note (money).
她假扮公主,为了一张纸币与宋承宪展开心理战。
www.trulyseungheon.com
10.
host-based authentication is not complete, however, until the ssh client has been configured to use host-based authentication, as well.
但是,在将ssh客户机也配置成使用基于主机的认证之前,基于主机的认证还没有完成。
www.ibm.com
1.
KTH said: He (SSH) has a very moderate and interesting personality. He is someone who I can play around with and teases.
金泰熙:他(宋承宪)是性格很平和又有趣的类型,可以让我随便淘气耍赖的那种人。
xz.zhuimengyizu.com
2.
My ssh login sessions on bxaix85 remained active, meaning I did not suffer any connectivity issues as a result of the live migration.
我在bxaix85上的ssh登录会话仍然是有效的,这意味着动态转移没有造成任何连接问题。
www.ibm.com
3.
Via SSHFS, you can mount any remote directory as a local file system as long your server supports SSH, which most do.
只要服务器支持SSH(大多数服务器都符合这个条件),就可以通过SSHFS把任何远程目录挂装为本地文件系统。
www.ibm.com
4.
If you have no SSH key used for a secure instance, generate a key pair before you continue.
如果没有为实例使用SSH密钥,请先生成一个密钥对,然后再继续。
www.ibm.com
5.
Some sites firewall off most ports, or at least enough to include ssh's standard port 22.
某些地方防火墙关闭了大多数端口,或者至少关闭了包括ssh的标准端口22在内的许多端口。
www.ibm.com
6.
AIX audit does not know about su's done prior to the SSH connection.
AIX审计系统并不知道建立SSH连接之前用户su的所作所为。
www.ibm.com
7.
Secure Shell (SSH) tools provide a secure method for logging in and exchanging information with a remote host.
安全Shell(SSH)工具为远程主机的登录和交换信息提供了一种安全的方法。
www.ibm.com
8.
Pageant prompts you, after you login, for your SSH passphrase; then it saves the unlocked key for you.
登录之后,Pageant提示输入SSH密码;然后它替您保存解锁后的密钥。
www.ibm.com
9.
The $SSH_AUTH_SOCK (short for SSH Authentication Socket) is the location of a local socket which applications can use to speak to ssh-agent.
$SSH_AUTH_SOCK(即SSHAuthenticationSocket的缩写)是一个本地套接字的位置,应用程序使用它与ssh-agent通信。
www.ibm.com
10.
SSH, apart from being a mode of communication to remote computers, also provides other features that most users do not use very often.
SSH除了可以作为与远程计算机之间的一种通信模式之外,还提供大多数用户不常用的其它特性。
www.ibm.com
1.
SSH said he knew KTH likes eating meat. He personally prepared 200 pieces of meat.
宋承宪知道泰熙爱吃肉,就自费为剧组准备200份肉。
blog.sina.com.cn
2.
Now we're ready to share our passphrase with ssh-agent.
现在,我们可以将密码短语与ssh-agent共享了。
www.ibm.com
3.
The Host Access tab allows you to provide configuration information for accessing IDS on the remote host using Telnet or SSH.
HostAccess选项卡允许您提供使用Telnet或SSH访问远程主机上的IDS的配置信息。
www.ibm.com
4.
The same principle works for a non- local network , and VNC can be configured to tunnel through SSH for security purposes.
相同的的原则也适用于非本地网络,并且出于安全性目的,VNC可以配置成隧道通过SSH。
www.bing.com
5.
Secure Shell (SSH) was intended and designed to afford the greatest protection when remotely accessing another host over the network.
SecureShell(SSH)的目的在于在通过网络远程访问另一个主机时提供最大的保护。
www.ibm.com
6.
Suppression subtractive hybridization (SSH) technique was used to screen up-regulated genes in regenerating liver.
采用新发展的抑制差减杂交技术(suppressionsubtractivehybridization,SSh),在基因组水平筛选再生肝中高表达基因。
www.biochemlab.cn
7.
By the way, as mentioned in Part 3 of this series, your . ssh directory must be private to you, or your public key access won't work.
另外,正如本系列的第3部分中所提到的,您的.ssh目录必须是您私有的,否则您的公钥访问无法正常工作。
www.ibm.com
8.
SSH offers certificate based authentication, strong encryption, and other features, and is considered to be far more secure.
SSH提供基于验证的证书、强加密和其他特性,并且被认为安全多了。
www.ibm.com
9.
Even if you're working out of a public access point such as an "Internet cafe, " you probably have enough resources to make ssh work.
即使您外出办事,但在公共接入点(比如“网吧”),您还是可能有足够的资源使ssh工作。
www.ibm.com
10.
You could use SSH to do this for you by running the adduser command across multiple machines.
您可以使用SSH在多台计算机上运行adduser命令,以完成这项任务。
www.ibm.com
1.
If you do not configure secure SSH access you will be unable to directly access the VMs.
如果没有配置安全SSH访问,则无法直接访问VM。
www.ibm.com
2.
We shall SSH into the machine using other user than root whose default shell is set to be ksh (Korn shell).
我们应该使用根用户之外的其他用户,SSH到机器中(根用户的默认shell被设置为ksh(Kornshell)。
www.ibm.com
3.
The SSH daemon does not allow key-based authentication if the home directory if people other than the user can write to it.
如果除应用程序用户以外还有人能够修改home目录,那么SSH守护进程就不支持基于密钥的认证。
www.ibm.com
4.
A simple and obvious approach to running a command on a collection of machines wraps the common ssh utility in a script.
在一组计算机上运行命令的简单方法是,把共用的ssh命令包装在脚本中。
www.ibm.com
5.
Also, in SSH, the degree of security needed can be configured by choosing the appropriate method of encryption desired by the user.
在SSH中,可以通过选择用户需要的适当的加密方法,来配置所需的安全级别。
www.ibm.com
6.
When a user initiates an SSH or SCP session to a remote host or server, he or she is said to be the SSH client.
当用户发起一个SSH或SCP会话到远程主机或服务器时,他或她被认为是SSH客户端。
www.ibm.com
7.
It is, in a way, but the X server in question is the SSH daemon that ships the display to the appropriate remote computer.
在某种程度上,就是这样,正讨论的X服务器是将显示交付给适当的远程计算机的SSH守护程序。
www.ibm.com
8.
Suppression subtractive hybridization (SSH) is a method produced by the combination of suppression PCR and subtractive hybridization.
是抑制PCR与差减杂交技术相结合而产生的。
www.juyy.net
9.
Through the connection layer, you can multiplex secondary sessions into a single SSH connection (see Figure 4).
通过连接层,您可以多道传输二级会话到单个SSH连接(参见图4)。
www.ibm.com
10.
After this, you'll get a new shell prompt and the shell will work as usual, except that it is now a ssh session.
在这之后,你将得到一个新的壳的提示符并且可以像以往那样地工作。
www.phpfans.net
1.
That off-the-shelf box may have a special Windows-only configuration tool, so it won't be possible to ssh in and change your settings.
现成的设备可能有一个专用的仅适用于Windows的配置工具,因此不可能使用ssh来更改设置。
www.ibm.com
2.
An interesting feature of ssh-keygen is that it will allow you to simply press enter when prompted for a passphrase.
ssh-keygen的一个有趣特性是,当提示输入一个口令时,它让您可以只是简单地按下回车键。
www-128.ibm.com
3.
sftp, another "personality" of SSH, provides all the features of the File Transfer Protocol (FTP), yet protects file data while in transit.
sftp是SSH的另一种特征,它提供了文件传输协议(FTP)的所有特性,并且在传输的过程中对文件数据进行保护。
www.ibm.com
4.
Adrian: She may sing like a nightingale but she sounds like a bald eagle. Ssh, ssh!
阿德里恩:她可能唱得像夜莺一样动听,只是声音像白头鹰,嘘嘘!
yy.china-b.com
5.
Even ssh-keygen command will accept the empty passphrase, in which case, private-key file will not be encrypted.
尽管ssh-keygen命令可以接受空的密码,但是在这种情况下私有密钥文件不加密。
www.ibm.com
6.
The ssh client, on receiving the SSHPub from server, decrypts it with its private key and sends the accesskey(AK) back to server.
当从服务器收到SSHPub时,ssh客户机用它的私有密钥执行解密并把accesskey(AK)发送回服务器。
www.ibm.com
7.
As you might expect, running SSH to access a remote machine launches a new login shell.
正如您所预期的,运行SSH以访问远程计算机将启动一个新的登录Shell。
www.ibm.com
8.
If the server is disallowing the authentication, open up the ssh server trace (sshd. trace on machineA) to look for clues.
如果是服务器阻碍了认证,那么打开ssh服务器跟踪(machineA上的sshd.trace)寻找线索。
www.ibm.com
9.
Multiple identifications using multiple private keys can be created with an SSH Protocol 2 configuration.
通过一个SSHProtocol2配置可创建使用多个私有密钥的多重鉴定。
www.ibm.com
10.
ssh and its variants provide stronger authentication mechanisms and encrypt all traffic using your choice of several ciphers.
ssh及其变种提供了更强的身份验证机制,并使用您所选择的几个密码对所有的通信内容进行加密。
www.ibm.com
1.
SSH supports multiple encryption types, with most of its implementation supporting stronger encryption types like AES.
SSH支持多种加密类型,它的大多数实现支持诸如AES之类的更强的加密类型。
www.ibm.com
2.
The lpar2rrd user on hxnim1 was able to ssh directly to both of my HMCs without a password.
hxnim1上的lpar2rrd用户能够通过ssh直接连接两个HMC,不需要密码。
www.ibm.com
3.
The sft command is an FTP-like alternative that uses the secure communication channel provided by the SSH protocol.
sft命令是一种与FTP类似的替代方法,它使用SSH协议提供的安全通信通道。
www.ibm.com
4.
An SSH-based identity consists of two parts: a public key and a private key.
一个基于SSH的身份包括两个部分:一个公钥和一个私钥。
www.ibm.com
5.
Next, create an SSH session for your project to use for communication with the target device.
接下来,为项目创建一个用于与目标设备通信的SSH会话。
www.ibm.com
6.
For this purpose secure shell (SSH) is enabled on the server and can be accessed from any machine on the local network.
为此,在服务器上启用安全shell(SSH),然后就可以从本地网络上的任何机器访问DB2数据库。
www.ibm.com
7.
Where possible, filtering at the firewall is an extremely effective method of securing access to an ssh server.
情况许可的话,利用防火墙进行过滤是一个非常有效的方法来加固ssh服务器。
hi.baidu.com
8.
I've tried a range of clever ideas for tweaking the ssh protocol or my own firewalls to keep out "black hats. "
我已经尝试过许多聪明的想法,用于调整ssh协议或自己的防火墙,以阻止“黑帽”黑客(指专门利用网络技巧入侵网络进行破坏的人,译者注)。
www.ibm.com
9.
In the case of SSH, two different processes do this, hence loading of the keystore fails.
对于SSH,两个不同的进程执行这个过程,因此无法装载密钥存储。
www.ibm.com
10.
This requires you to download a third-party dropbear package, but then you just ssh in as root, with the password rootme.
这需要下载一个第三方的dropbear包,然后以root用户的身份使用ssh登录系统,其密码为rootme。
www.ibm.com
1.
Any other ssh account, anywhere in the connected world.
任何其他ssh帐号,它们可以位于任何具有网络连接的地方。
www.ibm.com
2.
SSH allows other users to log into or run applications on your computer from another computer on your network or remotely.
SSH允许其他用户登录到你的系统并执行程序,该用户可以和你同一网络,也可以是远程用户。
blog.163.com
3.
The second sample was remote shell mode and is so named because SSH powers the underlying connection and transfers.
第二个示例是远程shell模式,它使用SSH执行底层连接和传输。
www.ibm.com
4.
Configure SSH for all your nodes to allow it to execute commands without being asked for a password.
为所有节点配置SSH,允许不询问密码就可以执行命令。
www.ibm.com
5.
Since all data is now tunneled through SSH, it is secured by the current encryption mechanism in use by SSH.
由于所有数据都经过SSH隧道,因此受到SSH使用的当前加密机制的保护。
www.ibm.com
6.
Some software prints error messages to the console that may not necessarily show up on your SSH session.
有些软件会向控制台输出错误消息,而控制台不一定会显示在SHH会话中。
www.ibm.com
7.
Linux has a good implementation of the secure shell (SSH) server, so I can manage the server from anyplace that has Internet connectivity.
Linux具有一个很好的安全shell(SSH)服务器的实现,因此我可以从任何具有Internet连接的地方来对服务器进行管理。
www.ibm.com
8.
You can ssh to test0 if you know its DHCP-assigned IP address.
如果知道为其分配的DHCPIP地址,可以通过ssh访问test0。
www.ibm.com
9.
The scp command works like the rc command, except that files are transferred using the SSH protocol.
scp命令的工作方式与rc命令相似,只不过是使用SSH协议传输文件。
www.ibm.com
10.
SSH supports numerous, diverse methods and techniques for authentication that you can enable or disable.
SSH支持可启用或禁用的多种不同的身份验证方法和技术。
www.ibm.com
1.
The ssh-agent program acts like a gatekeeper, securely providing access to security keys as needed.
ssh-agent程序如同一个看门人,它根据需要安全地提供对安全密钥的访问。
www.ibm.com
2.
Now you are ready to test the setup and use DB2 9 client and server over tunneled SSH.
现在可以测试设置,并在隧道化了的SSH上使用DB29客户机和服务器。
www.ibm.com
3.
Encrypted tunnels through cyberspace are possible via SSL, SSH, and other technologies -- not to mention virtual private networks.
电脑空间中的加密的通道可能是通过SSL、SSH和其他技术加密的——更不必说拟虚专用网络。
www.ibm.com
4.
Finally, I mention the trusted host environment as an alternative to setting up public-private SSH key pairs.
最后,我要提一下作为一种替代方案来设置公私SSH密钥对的可信主机环境。
www.ibm.com
5.
Without a saved host key, SSH and Capistrano prompt to verify the key, which breaks the automated deployment.
如果不保存主机密钥,SSH和Capistrano会提示验证密钥,这会中断自动化部署过程。
www.ibm.com
6.
SSH gives you the option of mapping a local open port to any port of a remote machine.
SSH允许将一个本地开放端口映射到远程计算机上的任何端口。
www.ibm.com
7.
SSH and Jisub went out through the front gate, and that gate was locked.
宋承宪和苏志燮穿过大门出去了,而且门被反锁。
tieba.baidu.com
8.
Running an ssh container lets you dramatically reduce the disk space unique to a container's filesystem.
运行ssh容器可以大大减少容器文件系统占用的磁盘空间。
www.ibm.com
9.
The best way to do this, in my opinion, is to ssh out to each host as root and then change the password once connected on that host.
按我的观点,最好的方式是作为根用户通过ssh连接每个主机,然后更改密码。
www.ibm.com
10.
SSH framework by integrating technology, the business layer and data layer to access more secure and reliable connection.
通过SSH框架整合技术,实现了业务层与数据层更安全可靠的访问连接。
www.boshuo.net
1.
When you connect to a server with SSH, the client can try to authenticate with the key.
当您使用SSH连接到服务器时,客户端会尝试使用该密匙验证。
www.ibm.com
2.
I finally got tired of my ssh sessions getting disconnected at places where I don't control the firewalls, and figured out how to stop it.
我最终疲于我的ssh连接会话被我不能控制的防火墙断开,并找出了阻止它的方案。
blog.sina.com.cn
3.
If you're determined to do things by hand, you need to run lilo, make ssh host keys, and set a root password.
如果您决定以手工方式引导系统,那么必须运行lilo,生成ssh主机密钥,然后设置root密码。
www.ibm.com
4.
Running ssh-keygen -t rsa -b 2048 from a command line allows you to generate a keypair, which gets put in your . ssh directory.
在命令行中运行ssh-keygen-trsa-b2048可以生成密钥对,将其放到你的.ssh目录中。
www.infoq.com
5.
The other widely used API for wire-level encryption is SSH (Secure Shell), well known from the tool of the same name (in lowercase: ssh).
另一个广泛应用于连接级加密的API是SSH(SecureShell,安全Shell),它因与其同名的那个工具(小写的ssh)而出名。
www.ibm.com
6.
Adding a term of electrons correlation to the SSH model, we have simulated the formation and evolution of exciton in trans-polyacetylene.
在SSH哈密顿基础上引进电子关联,对反式聚乙炔链中光致激子的产生和演化过程实施分子动力学模拟。
jamp.scu.edu.cn
7.
The talk show is hosted by members of Japan popular group SMAP. SSH competed with the five members in a Table Tennis match.
该节目由日本最当红的组合SMAP成员共同主持,宋承宪还与五名成员进行了乒乓球大比拼。
www.trulyseungheon.com
8.
or ssh-rsa for RSA encryption, where will be the host's public key and is typically a very long string.
对于RSA加密,文件的内容类似于ssh-rsa,其中将会是主机的公钥,它通常是一个很长的字符串。
www.ibm.com
9.
If you re like me, being able to use ssh to access the box makes you a lot more comfortable.
如果您和我一样,那么能够使用ssh来访问机器将使您更为惬意。
www-128.ibm.com
10.
Commands A through C create the private . ssh directory, and Step D adds the public key to the list of authorized keys.
命令A到C创建了私有的.ssh目录,而步骤D则将公钥添加到授权密钥列表中。
www.ibm.com
1.
Launch an instance from the existing AMI with your secure socket shell (SSH) key pair.
用自己的SSH密钥对从现有的AMI启动一个实例。
www.ibm.com
2.
To only use version 1 of the ssh protocol, and may be required if for some reason the remote system is defaulting to DSA authentication.
只应用ssh协议版本1,如果出于某种原因远程系统缺省设置的是DSA认证的话,可能会要求这么做。
www-128.ibm.com
3.
Use a ssh client to connect to the IP address assigned to your Nintendo Wii console and introduce your credentials.
使用SSH客户机连接到的IP地址分配给您的任天堂Wii游戏机和介绍您的凭据。
forum.ubuntu.org.cn
4.
Ensure that all ssh server configuration files refer to the canonical name of the client, as seen by the server.
确保所有ssh服务器配置文件引用客户机的规范名称,也就是服务器所看到的名称。
www.ibm.com
5.
I also installed an ssh server so I could use a real keyboard while testing.
我还安装了一个ssh服务器,以便在测试时可以使用实际的键盘。
www.ibm.com
6.
Using ssh and tar in this way is a good way of creating a backup of your local machine on a remote host.
按照这种方式使用ssh和tar是在远程主机上创建本地文件备份的好方法。
www.ibm.com
7.
Many known services rely on TCP: HTTP (web traffic), SMTP (mail traffic), FTP (file transfer), SSH (Secure Shell), Telnet, and many others.
有很多熟知的服务依赖于TCP:HTTP(web流量)、SMTP(邮件流量)、FTP(文件传输)、SSH(SecureShell)、Telnet及其他。
www.ibm.com
8.
Whatever your operating system, SSH touts many positive benefits for commonplace, everyday computing.
不管您的操作系统是什么,SSH都为老生常谈的日常计算操作提供许多实际效益。
www.ibm.com
9.
When all the previous configuration setting are complete, run the ssh to log onto the remote machine using the public key authentication.
完成上述所有配置设置之后,运行ssh使用公共密钥身份验证登录远程机器。
www.ibm.com
10.
Please connect to this host with the command line SSH utility and answer this question appropriately.
请以文字模式的SSH公用程式连接本主机及适当地回答此条问题。
topic.csdn.net
1.
Now, he can log in and read his mail, but he's not going to be using your servers to establish ssh connections and the like.
现在,他可以登录和阅读邮件,但不能使用您的服务器来建立ssh连接以及类似连接。
www.ibm.com
2.
work according with plant's e ssh standard and fulfill all the requirement of environment management system.
按照公司的环保标准开展各项工作,履行环境管理体系的所有要求。
job.01hr.com
3.
This file is only processed when the ssh server daemon process is first started.
(这个文件只在ssh服务器守护进程第一次启动时被处理)。
www.ibm.com
4.
That would forward the port through SSH to ginger. But we're interested in letting tech get VNC access to ginger.
这将通过SSH将端口转发给ginger,但我们希望通过tech让VNC访问ginger。
www.ibm.com
5.
SSH's every word and gesture stirred up fans response and he returned with his brilliant smile.
宋承宪的每一句话和每一个动作都让影迷狂热,宋承宪每次都以灿烂的笑容作回报。
www.trulyseungheon.com
6.
As you may have already guessed, the server has a part of the SSH key in much the same way as you have a part of the SSH key.
您可能已经猜到了,服务器按与客户端相同的方式保存SSH密钥的一部分。
www.ibm.com
7.
The configuration files and SSH daemon can be found in two places depending on what variant of SSH you have installed.
根据安装的SSH变体不同,可以在两个地方找到配置文件和SSH守护进程。
www.ibm.com
8.
Ssh! After all , it is her mother .
嘘!皇后毕竟是白雪公主的母亲!
www.bing.com
9.
It is good practice for root to only be allowed to ssh out from deployment servers.
好方法是只允许root用户从部署服务器执行ssh操作。
www.ibm.com
10.
The connection layer defines channels, global requests, and the channel requests through which SSH services are provided.
连接层定义通道、全局请求和借以提供SSH服务的通道请求。
www.ibm.com
1.
The SSH configuration file is so expansive, it too has its own man page.
SSH配置文件非常大,它也有自己的手册页。
www.ibm.com
2.
When you connect to the machine with an SSH client you can start with the installation.
当您用SSH连接到机器就可以开始安装。
debian.fr
3.
Listing 2 shows an extract of a basic trace of the command, ssh testhost, along with a short extract.
清单2是部分基本跟踪命令,以及sshtesthost的片段。
www.ibm.com
4.
OpenSSH, a free implementation of ssh, is commonly available with all distributions.
OpenSSH是ssh的一种免费实现,在所有发行版上都有。
www.ibm.com
5.
Unfortunately, SSH automation is not mentioned, and neither is the IMAP protocol.
不幸的是,没有提及SSH自动操作,也没有提及IMAP协议。
www-128.ibm.com
6.
Establish SSH keys and an rsync daemon on the remote machine, and create a backup module to permit writes.
在远程机器上生成SSH密钥和rsync守护进程,创建一个允许写的备份模块。
www.ibm.com
7.
Create an instance from a plain SuSE platform, then connect to it using ssh.
从普通的SuSE平台创建一个实例,然后使用ssh连接到它。
www.ibm.com
8.
This approach allows administrators to keep control of where user root can SSH to, thus keeping control on root remote connections.
这种方式让管理员可以控制root用户能够从哪里通过SSH连接,由此控制远程root连接。
www.ibm.com
9.
When you log in to a remote system with ssh, sftp, or scp, you still need to use your password to complete the login process.
当您使用ssh、sftp或scp登录到远程系统后,您仍需要使用密码才能完成登录过程。
www.ibm.com
10.
The multiple machines can be remotely provisioned and managed using SSH.
可以通过SSH配置与管理多台机器。
www.infoq.com
1.
To tar across the network use ssh as the transport method.
要想通过网络使用tar,则应该使用ssh作为传输方法。
www.ibm.com
2.
Copy content of the key file (excluding the header ssh-rsa and the endnote rsa-key-20091222) and paste it to the Key contents field.
复制这个密钥文件的内容(不包括头ssh-rsa和尾rsa-key-20091222)并将其粘贴到Keycontents字段。
www.ibm.com
3.
The result of issuing this command is that you can use SSH to log into the guest from the host by typing ssh localhost -p 2222.
执行该命令的结果是可以使用SSH通过输入sshlocalhost-p2222从主机端登录客户端。
www.ibm.com
4.
By default, rsync uses Secure Shell (SSH) as its transport mechanism; you can reuse your machine aliases and public keys with rsync.
在默认情况下,rsync使用SecureShell(SSH)作为传输机制;可以在rsync中重用机器别名和公共密钥。
www.ibm.com
5.
This has simplified the configuration of the lab seats and maintenance of the dedicated ssh-LDAP host.
这简化了实验室座位的配置和对专用ssh-LDAP主机的维护。
www.ibm.com
6.
A console session can also be established via SSH so that a Linux GUI can be used for administration.
也可以通过SSH建立控制台会话,这样就可以使用LinuxGUI来进行管理。
www.ibm.com
7.
For the truly paranoid who refuse to create a password-less SSH public-private key pair, there's the ssh-agent utility.
对于拒绝创建无密码SSH公私密钥对的真正的偏执狂来说,有一个ssh-agent实用程序。
www.ibm.com
8.
The private SSH key is the user's identity for outbound SSH connections and should be kept confidential.
私有SSH密钥是用于出站SSH连接的用户身份,且应当保密。
www.ibm.com
9.
Select the key that you want to use in SSH connections to your instance.
选择想要用在连接实例的SSH连接内的那个密钥。
www.ibm.com
10.
This last line (EnableSSHKeysign) notifies the ssh client that it should use a separate ssh-keysign utility to read the host's private key.
最后一行(EnableSSHKeysign)通知ssh客户机它应该使用一个单独的ssh-keysign实用程序来读取主机的私钥。
www.ibm.com
1.
An alternative approach is to ssh to the remote environment and run any commands locally.
另一种方法是ssh到远程环境,并在本地运行命令。
www.ibm.com
2.
When you've made these ports available, use SSH once to connect to the AMI and accept all of the required license agreements.
当您使这些端口可用后,使用SSH连接到AMI,并且接受所有需要的许可协议。
www.ibm.com
3.
In this case, a simple ssh connection may suffice (see " Running an ssh container" above).
在此情况下,一个简单的ssh连接就足够了(参见上面的“运行一个ssh容器”)。
www.ibm.com
4.
Apply the technique of SSH in positive and negative directions to acquire the differential expressed genes.
运用抑制性消减杂交技术获取正、反两方向的中枢差异表达基因片段;
www.fabiao.net
5.
The output shows three running processes: an ssh login, which spawned a bash shell, which launched the ps command itself.
输出结果中显示了3个进程,分别是:一个ssh登录进程,它产生了一个bashShell,而后者启动了ps命令。
www.ibm.com
6.
Timeout connecting to server. Please ensure that your SSH key has been added to a running SSH daemon.
连接到服务器超时。请保证您的SSH钥匙已经被添加到正在运行的SSH守护进程。
translations.launchpad.net
7.
The wget and curl tools transfer files; using ssh, you can securely log in to remote systems and transfer files quickly and easily.
wget和curl工具可以用来传输文件,而使用ssh,您可以安全地登录到远程系统中,快速地和轻松地传输文件。
www.ibm.com
8.
You can resolve this by forcing SSH to allocate a pseudo-tty device so that you can interact directly with the remote application.
通过强制SSH分配一个伪tty设备(以便您可以直接与远程应用程序进行交互),就可以解决这个问题。
www.ibm.com
9.
Select Tunnels from the Connection: SSH category on the left of the configuration dialog.
选择从隧道连接:SSH的配置对话框类左侧的。
blog.163.com
10.
A standard mechanism is ssh, which guarantees strong authentication in contrast to rsh, rlogin, or Telnet.
标准的远程管理机制是ssh,与rsh、rlogin或Telnet不同,ssh保证可靠的身份验证。
www.ibm.com
1.
If you allow remote login, you can use SSH (Secure Shell) to log in to your computer from another location.
如果允许远程登录,您可以从另一个位置使用SSH(安全Shell)登录到您的电脑。
docs.info.apple.com
2.
You can run a single remote command by adding the command you want to run to SSH after the login or host information.
通过将您希望SSH运行的命令添加在登录或者主机信息的后面,您可以运行单个远程命令。
www.ibm.com
3.
The tar utility creates the archive, and ssh facilitates secure transfer of the archive.
tar实用程序创建存档,而ssh则实现该存档的安全传输。
www.ibm.com
4.
To confirm, please try to login to that machine using ssh.
为了确定这些,请使用ssh登录那台机器。
www.oulan.com
5.
TCP Wrappers can also be used to block SSH connections from known or unknown hosts.
还可以使用TCPWrappers阻止来自已知或未知主机的SSH连接。
www.ibm.com
6.
You are able to rsh or ssh from the current node to the remote node.
您能够通过rsh或ssh命令从当前节点访问远程节点。
www.ibm.com
7.
Ensure that SSH (without a password) is set up at the root level within all the physical machines participating in a DB2 pureScale cluster.
确保在参与DB2pureScale集群的所有物理机内在根级别设置了SSH(无密码)。
www.ibm.com
8.
There was a scene, that SSH attacks KSW's night club.
有一个场景,是宋承宪袭击权相宇的夜总会。
tieba.baidu.com
9.
Net: : SSH had way too many problems to be used as an actual SSH client.
要想把Net::SSH作为一个实际的SSH客户端来使用,问题太多了。
www.infoq.com
10.
You should ensure that the private keys are readable only by root and the SSH processes -- this should be configured automatically.
您应确保私钥仅由根和SSH流程读取——这应自动配置。
www.ibm.com
1.
" SSH responded: " The meat is not ready but you already devoured everything.
宋承宪回答:呀,还没熟呢都被你吃完了!
blog.sina.com.cn
2.
At this time, the DB2 installation program will do one additional validation of the passwordless SSH configuration.
此时,DB2安装程序会对无密码的SSH配置再执行一次验证。
www.ibm.com
3.
If user alpha tries to SSH in then that user will be denied access, as the user name is not present in the AllowUsers list.
如果用户alpha尝试通过SSH访问,那么该访问会遭到拒绝,因为这个用户名没有出现在AllowUsers列表中。
www.ibm.com
4.
if you get disconnected, try to connect to your ssh session again.
如果你断开,尝试连接到您的SSH会话了。
hi.baidu.com
5.
A single SSH connection can host multiple channels concurrently, each transferring data in both directions.
单个SSH连接可以并行承载多个通道,每个都可双方向传输数据。
www.ibm.com
6.
There is really no loss in doing this, and SSH even (optionally) adds its own compression layer to enhance performance.
做到这一点真的没有任何损失,而且SSH甚至(可选地)添加其自己的压缩层来增强性能。
www.ibm.com
7.
Like tar, you can combine rsync with ssh to connect to remote systems and synchronize a local and remote collection of files.
与tar一样,您可以将rsync与ssh组合使用,以连接到远程系统并对本地和远程的文件集合进行同步。
www.ibm.com
8.
If you're past those organizational issues, though, the answer to the connection question is "use ssh. "
但是,如果您过去有这些组织问题,那么连接问题的答案便是“使用ssh”。
www.ibm.com
9.
Now, let's go over some examples of how TCP Wrappers can control access via SSH to a host.
现在,我们通过一些示例了解TCPWrappers如何控制对主机的SSH访问。
www.ibm.com
10.
Another technique is to use the innate abilities of the SSH to transfer files from one machine to another.
另一种方法是使用SSH固有的能力将文件从一台计算机传输到另一台计算机。
www.ibm.com
1.
I hope all current developerWorks readers have abandoned these protocols for ssh, which passmasss does not fully support.
我希望当前所有的developerWorks读者都不再使用这些协议,而是使用ssh,passmasss并没有对ssh提供全面的支持。
www.ibm.com
2.
You typically use SSH to allow users to log in to a remote host and execute commands.
您通常使用SSH来允许用户登录到一个远程主机并执行命令。
www.ibm.com
3.
The pts lines refer to pseudo-terminals created automatically to handle the remote SSH connections.
pts行指的是自动创建的、用以处理远程SSH连接的伪终端。
www.ibm.com
4.
First, we change the access rights for the . ssh directory so that only the owner has read, write, and execute privileges.
首先我们更改.ssh目录的访问权,只允许所有者拥有读取、写入和执行的权限。
www.ibm.com
5.
Remote system access is the purview of ssh and its derivatives, scp and sftp.
提供远程系统访问正是ssh及其派生工具(scp和sftp)的任务。
www.ibm.com
6.
When configured with public key authentication, your key proves your identity to remote SSH hosts.
当配置为公钥身份验证时,您的密钥证明您在远程SSH主机上的身份。
www.ibm.com
7.
Whenever you connect to a cloud instance, the ssvnc package requests the SSH secret key from Pageant.
当连接云实例时,ssvnc包向Pageant请求SSH秘密密钥。
www.ibm.com
8.
SSH is a powerful and secure network utility that countless users worldwide use for numerous tasks.
SSH是一个强大而安全的网络实用程序,全球有无数用户使用它来完成各种任务。
www.ibm.com
9.
On Windows, the SSH agent is called Pageant, a part of the PuTTY SSH tool set that is included with ssvnc.
在Windows上,SSH代理称为Pageant,它是ssvnc中的PuTTYSSH工具集的一部分。
www.ibm.com
10.
There are a few free SSH clients available for non-Unix-like platforms.
下面是其它一些非类Unix平台的免费SSH客户端。
qref.sourceforge.net
1.
Finally, if the SSH failed on a certain node, then you may see some error messages.
最后,如果某个节点上的SSH出现故障,则会看到一些错误消息。
www.ibm.com
2.
Note that you can enter multiple private keys and pre-authenticate them with the ssh-add command.
注意,您可以输入多个私有密钥并使用ssh-add命令预先验证它们。
www.ibm.com
3.
Object To build up SSH cDNA libraries of down-regulated genes during odontogenic differentiation of EMCs from the first branchial arch.
目的建立第一鳃弓外胚间充质细胞牙向分化下调基因抑制消减文库。
www.dictall.com
4.
This is because SSH expects the passphrase from the current terminal associated with that shell session.
这是因为SSH期待来自与该shell会话相关的当前终端的口令。
www.ibm.com
5.
SSH made his first visit to Japan on 12th, and his popularity (stardom) is reflected through enthusiastic fans.
宋承宪在过去12日出道后通过首次访问日本,透过影迷们的热烈反映证明了自己的明星性。
www.trulyseungheon.com
6.
We ll start with the ssh server configuration and then proceed to the ssh client configuration.
我们先来看ssh服务器配置,然后再看ssh客户机配置。
www-128.ibm.com
7.
With Linux operating system images, you normally connect over SSH to the virtual machine.
有了Linux操作系统映像,您通常通过SSH连接到虚拟机。
www.ibm.com
8.
Create containers with segregated file systems providing Web and ssh services.
使用提供Web和ssh服务的隔离的文件系统创建容器。
www.ibm.com
9.
Luckily, ssh supports public or private key authentication and system aliases.
幸运的是,ssh支持公钥或私钥身份验证和系统别名。
www.ibm.com
10.
Want to view a desktop remotely, with more convenience than proprietary solutions and security advantages over ssh tunnelling?
您希望使用比专有解决方案更方便并且具有比ssh更具安全性的方式来访问远程桌面吗?
www.ibm.com
1.
Ensure password-less ssh is setup within all the physical computers participating in a DB2 pureScale cluster.
保证一个DB2pureScale集群上的所有物理计算机中都安装了无密码ssh。
www.ibm.com
2.
By using the IP address of the instance, both of them try to the access the instance using the ssh command.
通过使用实例的IP地址,两个用户试图使用ssh命令访问实例。
www.ibm.com
3.
SSH, or Secure SHell, is a network protocol for remote administration of UNIX computers.
SSH或SecureSHell是用于远程管理UNIX计算机的一个网络协议。
www.ibm.com
4.
This typically includes the private-key file name and location, the SSH port number, and hostname.
这通常包括私有密钥文件名和位置、SSH端口号和主机名。
www.ibm.com
5.
ssh-keygen generates two files: id_dsa (the private key) and id_dsa. pub (the public key).
ssh-keygen生成两个文件:id_dsa(私钥)和id_dsa.pub(公钥)。
www.ibm.com
6.
You can also use SSH to run a command directly on a remote host without having to use the shell.
您还可以使用SSH直接在远程主机上运行命令,而无需使用Shell。
www.ibm.com
7.
The ssh client, on receiving this data packet, checks if the same option is enabled on the client side.
当收到这个数据包时,ssh客户机检查在客户端是否启用了这个选项。
www.ibm.com
8.
Although current rsync versions default to using ssh, the --rsh (or -e) option lets you force its usage.
尽管当前的rsync版本默认使用ssh,但是可以使用--rsh(或-e)选项强制使用ssh。
www.ibm.com
9.
Doing this generally requires access to the server itself via a Remote Desktop or SSH session.
执行这些操作通常需要通过RemoteDesktop或SSH会话访问服务器本身。
www.ibm.com
10.
To re-process the sshd_config file, send the SIGHUP command to the sshd (ssh server daemon) process.
为了重新处理sshd_config文件,发送SIGHUP命令到sshd(ssh服务器守护)进程。
www.ibm.com
1.
The backup_remote_servers. sh shell script uses the ssh command to execute a script on the remote servers.
shell脚本backup_remote_servers.sh使用ssh命令执行远程服务器上的脚本。
www.ibm.com
2.
Answer "yes. " It will ask for the root password of the SSH server, and then you're home free.
回答“yes”,它将向你询问SSH服务器的root口令,然后您就可以任意操作了。
www.ibm.com
3.
Putty can be set to forward SSH ports by looking in the options in the sidebar.
Putty可以设置为通过查找侧栏中的选项来转发SSH端口。
www.ibm.com
4.
Changing SSH's standard port to an unusual value and reinforcing SSH configuration so that simple-minded attacks just bounce back.
把SSH的标准端口改为不常用的值并增强SSH配置,从而挡住最简单的攻击。
www.ibm.com
5.
Start the ssh server on a specified port with extra debugging diagnostics enabled as follows.
在启用额外调试诊断的情况下,在指定端口启动ssh服务器,如下所示。
www-128.ibm.com
6.
They watched movie together, it seemed SSH came and said hello to them.
他们在一起是为了来观看电影的,似乎是宋承宪要来临并与他们见面。
tieba.baidu.com
7.
End all of the loops we've opened, closing our SFTP connection and our SSH session on the remote server.
所有我们开启的循环的结束,关闭和远程服务器的SFTP连接和SSH会话。
www.infoq.com
8.
I've consistently found it easier to locate a megabyte of free mass storage and install an ssh client there.
我一直觉得,找到一个兆字节的空闲大容量存储器并在上面安装ssh客户机会更加方便。
www.ibm.com
9.
Once executed, the eval `ssh-agent` statement will return the agent's process identifier.
执行eval`ssh-agent`语句之后,它会返回代理的过程标识符。
www.ibm.com
10.
However, it is assumed that the SSH server is running in the remote machine with the repository and it is allowing incoming connections.
然而,它要假设SSH服务器已经运行,并且允许进来的访问。
www.oulan.com
1.
To create the public or private key, you need to use ssh-keygen, specifying the type of key encryption.
要创建公钥或私钥,您需要使用ssh-keygen来指定密钥加密的类型。
www.ibm.com
2.
The target machines host the public SSH key file to complete the SSH handshake.
目标计算机包含公共SSH密钥文件,从而完成SSH握手。
www.ibm.com
3.
It is expected that SSH's first pictorial book after his military discharge will become the topic of discussion again.
预计宋承宪乘势推出的退伍后的首次写真集也会再次成为话题。
www.trulyseungheon.com
4.
This is a limitation of SSH as it spawns two processes, one for authentication and another for session creation.
这是因为SSH会产生两个进程,一个用于身份验证,另一个用于创建会话。
www.ibm.com
5.
Via SSH default: In this case, the installer will configure the network via DHCP and start an SSH server.
通过SSH默认:这种情况下,安装程序将通过DHCP配置网络并启动SSH服务器。
debian.fr
6.
The host on the ssh server system must have access to the ssh client host's public key.
ssh服务器系统上的主机必须能够访问ssh客户机主机的公钥。
www.ibm.com
7.
SSH provides two mechanisms to restrict user access: Deny and Allow attributes.
SSH提供两种限制用户访问的机制:Deny和Allow属性。
www.ibm.com
8.
configure -rsh=ssh -- this tells MPICH to use ssh as its communication mechanism.
configure-rsh=ssh——这告诉MPICH使用ssh作为通信机制。
www.ibm.com
9.
Firstly, SSH was on the list of Korean stars attending the event.
起先,宋承宪是在出席该活动的明星名单上。
www.seungheonhome.com.cn
10.
This directory must be mode 700, or ssh won't use public or private key authentication.
这个目录的模式必须为700,否则ssh无法使用公钥或私钥身份验证。
www.ibm.com
1.
The photography crew also said that although all 15 models are handsome and beautiful, but are all full of praise for SSH's perfect built.
摄制组还证明,尽管15名模特都是青一色的俊男靓女,但对宋承宪标准身材还是赞不绝口。
www.trulyseungheon.com
2.
SSH who plays a diplomat wore a neat white shirt and appeared extremely capable and handsome.
扮演外交官海英的宋承宪穿著整洁的白色衬衫,显得十分干练帅气。
www.trulyseungheon.com
3.
To do so, we must use a program called ssh-add, which adds (sends) our passphrase to the running ssh-agent program.
为此,必须使用程序ssh-add将密码短语添加(发送)至运行中的ssh-agent程序。
www.ibm.com
4.
This section will not go into extensive detail on how to troubleshoot all ssh configuration problems but will get you started.
本节不详细讨论如何分析和排除所有ssh配置问题,但是让您对此有一个初步的了解。
www.ibm.com
5.
It is a simple matter to create other SSH clients that achieve other purposes.
如果是出于其他的目的而创建另外的SSH客户机,也是一件很简单的事情。
www.ibm.com
6.
ssh (and scp and sftp) tests your private key against the remote public key.
ssh(以及scp和sftp)可以使用您的私钥对远程公钥进行测试。
www.ibm.com
7.
Because we ve set up passwordless access, the ssh command is able to execute commands on servers 1 and 2 remotely from the offsite server.
由于我们已经设置的无密码的访问,ssh命令可以通过离线的服务器在服务器1和2上远程地执行命令。
www-128.ibm.com
8.
Additionally, the workflows use SSH on the host platform to store the virtual images.
此外,工作流使用SSH在主机平台上存储虚拟映像。
www.ibm.com
9.
PuTTY is a free, open source teminal emulation application that acts as a client for SSH.
PuTTY是一个免费的开源终端模拟应用,充当SSH的客户端。
www.ibm.com
10.
His participation plays a big significance as it is the first time that SSH appeared in a Korean-Japan TV program after his army discharge.
此次是宋承宪退伍后在韩日两国首次参加的电视节目,因此意义重大。
www.trulyseungheon.com
1.
In our SSH Weblog server, we configure a password and username for an authorized user.
在我们的SSHWeblog服务器中,我们为一名经过授权的用户配置了密码和用户名。
www.ibm.com
2.
With user remote connections, like SSH, the login-id used on the connection is reported.
对于通过SSH等远程连接的用户,则报告连接时使用的登录ID。
www.ibm.com
3.
In addition to -L and -R for local and remote forwards, respectively, SSH offers -D to create an HTTP proxy on a remote machine.
除了分别用于本地和远程转发的-L和-R之外,SSH还提供-D参数来在远程机器上创建一个HTTP代理。
www.ibm.com
4.
We now have a private key (id_dsa) and a public key (id_dsa. pub) in the hidden . ssh directory.
现在,我们在隐藏的.ssh目录内有一个私钥(id_dsa)和一个公钥(id_dsa.pub)。
www.ibm.com
5.
SSH stands for Secure SHell, which is a set of services similar to the RSH command.
SSH代表SecureSHell,是一组类似于RSH命令的服务。
www.ibm.com
6.
Some common candidates that are used under wrappers for access control are telnet, ssh, sendmail, ftp packages, pop3, and stunnel.
可以在wrappers下进行访问控制的通常有telnet、ssh、sendmail、ftp包、pop3和stunnel。
www.ibm.com
7.
scp uses ssh for encrypted file transfer and lets you move files without setting up NFS or Samba.
scp使用ssh来传输加密的文件,让您可以不用设置NFS或Samba就可以移动文件。
www.ibm.com
8.
This update to sshd_config will allow the ssh server to accept host-based authentication requests from the ssh clients.
对sshd_config的上述更新将允许ssh服务器接受来自ssh客户机的基于主机的认证请求。
www.ibm.com
9.
Then you substitute the num variable to create the host you're going to SSH to.
然后替换num变量,创建通过SSH连接的主机。
www.ibm.com
10.
If ssh returns a version number greater than 2. x, the machine is in relatively good shape.
如果ssh返回的版本号高于2.x,那么该机器的软件配置相对较好。
www.ibm.com
1.
Create a new session, choosing SSH as the mode of communication.
创建一个新会话,选择SSH作为通信模式。
www.ibm.com
2.
But before using it for even routine remote administration tasks, you should study ssh in more depth.
但是在使用它进行远程管理任务之前,您应该先更深入地学习ssh。
www.ibm.com
3.
The thai SSH fan (or the reporter ; D) gave him someone Thai gifts and some message from Thai fans.
这位泰国承宪的影迷(或者说是记者)送给他一些泰国影迷给他的礼物和赠言。
www.seungheonhome.com.cn
4.
If you don't supply a passphrase, then ssh-keygen will generate keys which are not encrypted!
如果您不提供密码短语,那么ssh-keygen会生成一个未加密的密钥。
www.ibm.com
5.
Also, while not truly an enhancement, the Net: : SSH library does support the use of public key authentication.
同时,算不得是改进的是,Net::SSH库支持公钥认证。
www.infoq.com
6.
Using the debug method, however, should be first when diagnosing SSH related issues.
但是,在诊断与SSH相关的问题时,应该首先使用调试方法。
www.ibm.com
7.
We used SSH because it provides secure encrypted access to a remote Linux server, which provides access to a single application database.
我们使用SSH是因为它支持安全加密地访问远程Linux服务器,以及支持访问单一应用程序数据库。
www.ibm.com
8.
Read up on ssh, and install OpenSSH (a free version of ssh) for secure communications.
研究ssh,安装OpenSSH(ssh的免费版本)来实现安全的通信。
www.ibm.com
9.
For secure communications, you will want to have Secure Shell (ssh) installed.
为了进行安全的通信,需要安装SecureShell(ssh)。
www.ibm.com
10.
For ssh server configurations to take effect, the sshd process will need to re-process the sshd_config file.
为了使ssh服务器配置生效,sshd进程需要重新处理sshd_config文件。
www.ibm.com
1.
If advanced configuration of DB2 is necessary, then the Add-on can be remotely accessed via either secure shell (SSH) or telnet.
如果需要执行DB2的高级配置,可以通过安全shell(SSH)或telnet远程访问它。
www.ibm.com
2.
Using SSH allows for secure encrypted connections to remote hosts.
SSH可以提供到远程主机的安全加密连接。
www.ibm.com
3.
The port to use when connecting to the synchronization server via SSH.
透过SSH连接到同步化伺服器时使用的连接埠。
translations.launchpad.net
4.
A "headless system" run without even a monitor can be controlled by the command line via a protocol such as SSH or telnet.
一个“无头系统”的运行,甚至一台监视器可控制在命令行通过协议,如SSH或的Telnet。
blog.sina.com.cn
5.
Running a command remotely using SSH spawns a non-login interactive shell.
使用SSH远程地运行一个命令将产生非登录的交互Shell。
www.ibm.com
6.
The ssh client has now been configured to allow host-based authentication.
ssh客户机现在已经被配置为允许基于主机的认证。
www.ibm.com
7.
Public-private key pairs can be generated using the ssh-keygen command.
可以使用ssh-keygen命令生成公共-私有密钥对。
www.ibm.com
8.
Similarly, the remote login daemon searches for "ssh" in the file and listens for incoming TCP connections on port 22.
类似地,远程登录守护进程在文件中搜索“ssh”,在端口22上监听到达的TCP连接。
www.ibm.com
9.
'Ssh - don't be so for'ard! ' said a shyer girl.
“嘘——别厚脸皮吧!”一个害羞的姑娘说。
ielts.hjenglish.com
10.
The dialog box in Figure 12 also provides an Advanced option to configure secure SSH access to the deployed VMs.
图12中的对话框还提供了一个Advanced选项,以配置对已部署好的VM的安全SSH访问。
www.ibm.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/8/4 5:57:06