• 这些情况下,无论是SquirrelShell还是无法脱离平台,Squirrel Shell提供了一个方便函数探测操作系统这样代码可以适当执行

    In those cases where neither Squirrel Shell nor you can abstract the platform away, Squirrel Shell provides a handy function to probe the operating system so code can follow an appropriate branch.

    youdao

  • 另外,在使用Solaris时,需要探测接口——其他UNIX操作系统需要这么做

    Furthermore, with Solaris you need to plumb the interfaceother UNIX operating systems do not require this.

    youdao

  • 这包括代码不同函数边界操作系统实现那些探测

    Those exposed by the operating system on the boundary of different functions within the code are covered.

    youdao

  • 探测操作系统内核级上监视所有数据库事务包括特权用户事务,而不依赖于数据库审计日志

    The probes monitor all database transactions, including those of privileged users, at the operating system kernel level without relying on database audit logs.

    youdao

  • 应用程序编译器固件操作系统任何部分可能问题根源硬件诊断探测不出这些问题。

    Applications, libraries, compilers, firmware, and any part of the operating system can be the source many problems undetected by hardware diagnostics.

    youdao

  • 探测MicrosoftWindows服务器作为Windows服务,在UNIX服务器上作为守护进程,如果杀死此进程,操作系统重新启动它。

    The probes are installed on Microsoft Windows servers as a Windows service, and on UNIX servers as a daemon that, if killed, is restarted by the operating system.

    youdao

  • 为了满足需求,用系统账户()安装InfoSphereGuardium软件探测,它作为单一进程操作系统运行

    To meet this requirement, InfoSphere Guardium software probes are installed as a system account (root) and run as a single process on the operating system.

    youdao

  • 恶意软件能够计算机操作系统嵌入式设备进行隐蔽探测记录网络内部结构口令密码信息

    This kind of malicious software can hide the computer operating system and embedded devices, recording the internal structure of the network, password password and other information.

    youdao

  • 而用分布式操作系统,该站点将不会冲垮因为操作系统探测资源需求增加开始其它计算机上缓存数据

    With a distributed OS, the site won't get swamped because the OS has detected the increased demand on resources and started caching data onto other computers.

    youdao

  • 本文主要讨论如何通过网络伪装防御操作系统真正类型及其版本探测,进而避免遭受针对具体操作系统类型漏洞的攻击

    How to defend detecting of the type and version number of operating system by network masquerade and avoid the attack of operating system hole is researched in this dissertation.

    youdao

  • 基于主动被动探测攻击目标分析数据网络特征可以得出攻击目标的操作系统类型重要信息,进而得出与之相关的系统漏洞,为入侵和攻击提供重要依据。

    By analyzing the networking character values actively and passively, attacker can get a lot of information about target host, such as the type of operating system.

    youdao

  • 文中还给出采用ARM嵌入式处理器结合嵌入式实时操作系统构建激光探测信号采集系统

    A signal acquisition system for laser-based sonar detection system is constructed based on ARM embedded processor and real-time operating system.

    youdao

  • 文中还给出采用ARM嵌入式处理器结合嵌入式实时操作系统构建激光探测信号采集系统

    A signal acquisition system for laser-based sonar detection system is constructed based on ARM embedded processor and real-time operating system.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定