| 1. | Provides extra protection from bad sites using host file 可以提供额外的保护免受不良网站利用东道国的档案。 |
| 2. | The configuration for tp1 and tp2 in the etc hosts file is shown in listing 1 清单1中给出了在/ etc / hosts文件中对tp1和tp2的配置。 |
| 3. | This should also be an entry in all etc host files for all nodes on your lan 这也应该是您的lan上所有节点的全部/ etc / host文件中的项。 |
| 4. | One method to set an alternative network name is to add it to the local hosts file 一种设置备用网络名称的方法是将其添加到本地主机文件中。 |
| 5. | The host files convert urls into the number strings that the computer uses to access web sites 该主文件将url转换成计算机访问网站的数码串。 |
| 6. | Intrusive viruses are hard to write and very difficult to remove without damaging the host file 入侵型病毒难以编写,在去除它们时常常会破坏主文件。 |
| 7. | The known hosts file is generated after you connect for the first time to an openssh server 我们通过应用一个被称为凭证交换的过程来实现pki和kerberos之间的联合。 |
| 8. | If not , you ll need to configure your etc hosts file or dns so that name resolution is working properly 如果不行,就需要配置/ etc / hosts文件或dns使名称解析能正确发挥作用。 |
| 9. | Maintaining hosts files is tedious , error - prone and generally unworkable in large network environments 维护主机文件是单调乏味、容易出错的,并且一般来说,很难在大型网络环境下运转。 |
| 10. | For optimal performance , you should verify that all the participating servers are defined in the etc hosts file 为了得到最佳性能,应确保所有参与的服务器在/ etc / hosts文件中都有定义。 |