Sorry, no definitions found. Check out and contribute to the discussion of this word!


Sorry, no etymologies found.


  • Windows machines must allow access to the Remote Registry service in order for the scanning wizard to work, a requirement that can pose a problem in environments with overly restrictive host-based firewalls.

    Log management review: LogRhythm LR2000-XM

  • I don't think n2n would benefit from having host-based access control built into it!

    Snell-Pym » More on n2n

  • Your desktop firewalls can block specific ports, for instance, and a host-based information processing system can also help you lock down your desktops.

    The Ten Most Dangerous Online Activities

  • This enabled the use of the Windows Remote API RAPI protocol between the host and the device, which allows host-based applications to perform management updates.

    2006 March

  • Deploy passive host-based detection systems like tripwire to detect unautorized system changes.

    The Problems With Passwords « PurpleSlog – Awesomeness & Modesty Meets Sexy

  • I decided to take this step because in such a role you can become a strategic trusted advisor for the C-level of the largest customers of our country… and I had the chance to take on this role for one of the few really international customers we have here in Austria until May 2012 for a large re-engineering project from host-based legacy applications to a business-driven service oriented architecture.

    Site Home

  • You'll also run any special services throughout his port, such as host-based backups, monitoring software, etc.

    Ars Technica

  • Exchange server virtual machines, including Exchange Mailbox virtual machines that are part of a Database Availability Group DAG, can be combined with host-based failover clustering and migration technology as long as the virtual machines are configured such that they will not save and restore state on disk when moved or taken offline .

    Site Home

  • The updated Sophos endpoint software also includes host-based intrusion protection.

  • Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems.


Log in or sign up to get involved in the conversation. It's quick and easy.