最著名的是难以在目标环境中运行测试程序以及类似程序,而且如果它与主机环境不同,配置起来相当麻烦。
Most noticeably, it's hard to run test programs and the like in the target environment, and if it differs from the host environment, this makes configuration a dodgy experience.
知道主机上哪些端口是打开的,对于攻击者推断目标主机上可能存在的弱点是重要的第一步。
Knowing which ports are open on a host is an important first step for an attacker to deduce possible vulnerabilities to the target host.
这种攻击的想法是找出特定目标主机上打开的端口,但完成的方式非常狡猾,因此被攻击的主机或质量低劣的入侵检测工具不会发现。
The idea is to find out which ports are open on a specific target host, but it is done in such a tricky way that the attacked host or a poor-quality intrusion detection tool may not notice.
如果没有出现入站通信流,可能是主机没有响应,或者在您的主机和目标主机之间没有有效的路由。
If no inbound traffic appears, it may be that the host isn't responding or there's no valid route from your host to the target or vice versa.
例如,如果您在CouchOne主机上注册子域mysubdomain,并创建名为mydatabase的数据库,则您将使用的目标url是。
For example, if you register at the CouchOne Hosting with a subdomain, mysubdomain, and create a database called mydatabase, the target URL you'll use is.
Internet的原本设计的首要目标是让信息从一台主机服务器沿着有线网络传递到另一台主机上。
The Internet's original design accounts primarily for information to be passed from one host server to another along a wired network.
我们的目标是面向日本、美国和欧洲的发达市场推出成熟的游戏主机。
“We have targeted people in developed countries such as Japan, the US and Europe with sophisticated machines, ” Nintendo president Satoru Iwata said back in 2003.
通常,主机是IP通信量的源和目标。
A host is typically the source and the destination of IP traffic.
ARP协议欺骗是网络欺骗行为之一,它使得攻击者可以重定向一个以太网段上的IP数据报以取得目标主机的信任。
The ARP spoofing is one of the spoofing on the network, which allows an attacker to redirect the IP packets on a network segment of Ethernet so that he can get the trust of the target host.
在传递报文分组时,它们是从一个主机传送到另一个主机,直到达到它们的最终目标。
As packets travel, they are routed from host to host until they reach their ultimate destination.
如果端口是关闭的,目标将发送一个RS T包到公共主机表明端口是关闭的。
If the port is closed, the target will send an RST packet to the public host indicating that the port is closed.
扫描预探测是通过发送不同的数据包获得目标主机各方面一些简单信息,再根据这些信息来制定扫描策略。
It will receive some simple information about the target computer by sending some different data packets. Then a police of scan will be selected through the information.
端口扫描是黑客搜集目标主机信息的一种常用方法。
Port scanning is a usual method which is used by the hacker to collect the information of the target main processor.
在计算机网络安全领域,针对目标主机的安全性能分析评估是当前的研究热点。
In the field of network security, the secure performance analysis assessment based host is becoming highlighting.
在计算机网络安全领域,针对目标主机的安全性能分析评估是当前的研究热点。
In the field of network security, the secure performance analysis assessment based host is becoming highlighting.
应用推荐