ssh
- 网络安全外壳;抑制性消减杂交;抑制消减杂交;抑制性消减杂交技术
-
CONCLUSION : Ten novel gene fragments were isolated by the SSH technology , and it provided the basis for further cloning their full length genes and studying their functions .
结论:应用抑制性消减杂交技术筛选到10个新基因片段,为进一步克隆其全长基因、研究其功能打下基础。
-
Results Twenty-six differentially expressed gene fragments were obtained by means of SSH . Among them , 24 were known genes , 1 was a new expressed sequence tags ( EST ), and 1 was a hypothetical gene .
结果应用抑制性消减杂交筛选出26个胃癌差异表达基因片段,其中24个为已知基因,1个为新的表达序列标签,1个为推测基因。
-
Study and Implementation Framework Technology in Web System Based on SSH
基于SSH的Web应用框架技术研究应用
-
Construction of Computer Cluster Based on SSH and its Performance Evaluation
基于SSH协议的集群构建与性能测试
-
The Design and Implementation of Mobile Web Site Based on SSH
基于SSH的手机网站的设计与实现
-
You can also use SSH as an underlying transport protocol .
您还可以将SSH用作基础传输协议。
-
SSH is a popular java based application framework currently .
SSH是目前比较流行的基于Java实现的应用程序框架,具有良好的实践性。
-
To tar across the network use ssh as the transport method .
要想通过网络使用tar,则应该使用ssh作为传输方法。
-
Use those details to connect to the new server via SSH .
使用这些详细信息,通过SSH连接到新的服务器。
-
Using SSH Framework and WEB 2.0 technology .
使用SSH框架以及WEB2.0技术。
-
Other operating systems usually have SSH support built in .
其他操作系统常常有内置的SSH支持。
-
The Applied Research of E-HR System Based on SSH
基于SSH整合框架的E-HR系统应用研究
-
Operating system agents can be deployed using SSH .
可以使用SSH部署操作系统代理。
-
Setting up the secure tunnel to utilize the key of SSH
利用SSH的密钥对建立安全通道
-
Verify that the SSH server has been started properly using the following command
使用下面的命令来确认已正确地启动了SSH服务器
-
SSH is a good example of this .
SSH就是个好例子。
-
Using the debug method , however , should be first when diagnosing SSH related issues .
但是,在诊断与SSH相关的问题时,应该首先使用调试方法。
-
SSH server port : The port of the remote SSH server
SSHserverport:远程SSH服务的端口
-
Research and Construction of Web-Based OA System Beased on SSH integrated Framework
基于SSH整合框架的网络办公自动化系统的研究与构建
-
This is how you set up an SSH tunnel .
这就设置了SSH通道。
-
Select the key that you want to use in SSH connections to your instance .
选择想要用在连接实例的SSH连接内的那个密钥。
-
The server must accept the client 's Secure Shell ( SSH ) public key .
服务器必须接受客户端SecureShell(SSH)的公共密钥。
-
Using SSH allows for secure encrypted connections to remote hosts .
SSH可以提供到远程主机的安全加密连接。
-
Using SSH for basic terminal access
将SSH用于基本终端访问
-
Accessing DB2 for advanced configuration and management through SSH
通过SSH访问DB2执行高级配置和管理
-
Now , he could install an ssh client on his home PC.
现在,他可以在自己家的个人计算机上安装ssh客户机。
-
Configure firewalls to accept SSH connections only from know network segments
配置防火墙以接受仅来自已知网段的SSH连接
-
SSH provides two mechanisms to restrict user access : Deny and Allow attributes .
SSH提供两种限制用户访问的机制:Deny和Allow属性。
-
Luckily , ssh supports public or private key authentication and system aliases .
幸运的是,ssh支持公钥或私钥身份验证和系统别名。
-
The Secure Shell ( SSH ) protocol was developed to get around these limitations .
开发的安全Shell(SSH)协议可以排除这些限制。