您甚至可以使用它来识别在某个未经标识的端口上所交换的数据的类型。
You can even use it to identify the type of exchanged traffic on an otherwise unidentified port.
欲简化分区的管理,可以为每个WWPN分配别名来识别附在此端口的设备。
To simplify the management of zoning, assign aliases to each WWPN to identify the device attached to the port.
识别出序列之后端口打开,必须在30秒内登录。
The port opens after recognition, and you have 30 seconds to log in.
如果你是通过路由器连接到互联网的,那么对于互联网来说一般识别打开的端口。
If you connect to the Internet using a router, an open port typically is not visible to the Internet.
设备也可识别和拦截到达非标准或非指定的端口。
The appliance also can identify and block threats that arrive on non-standard and non-assigned ports.
检查Optim PerformanceManager信息库服务器日志db2pesrv . log,寻找以下消息,然后识别正确的端口。
Check the Optim Performance Manager repository server log db2pesrv.log for the following message to identify the right port.
对于系统上V6.0以前的WebSphereApplicationServer版本,V6.1安装程序不会自动识别端口,除非正在活动地使用它们。
For versions of WebSphere Application Server prior to V6.0 on your system, the V6.1 installer will not automatically recognize the ports unless they are actively being used.
如果你通过调制解调器连接到互联网的,那么互联网可以识别打开的端口,黑客也会试图连接到FinchSync。
If you connect with the Internet using any kind of modem, the open port will be visible to the Internet and hackers may try to connect with FinchSync.
当识别出预定义的尝试序列(称为敲门序列)时,可以执行打开端口等操作,让外部的用户能够进来。
Whenever a predefined and specific sequence of attempts is recognized (called a knock sequence), you can execute actions like opening a port so the outsider can get in.
它还可以识别哪些主机是可以访问的、它们的IP和mac地址,并扫描和检查已打开的端口、所使用的协议和主机操作系统。
It also identifies which hosts are accessible, their IP and MAC addresses, and scans and checks the open ports, protocols used, and the host operating system.
从参与者的服务和请求端口来看,可以很清楚地看到实际上提供了什么以及使用了什么,使得进一步识别参与者变得不太必要。
It is clear from the service and request ports of a participant what is actually provided and consumed, making it unnecessary to also further characterize the participant itself.
最初,处于阻塞状态的端口被识别。
传统的P2P识别方法对当前P2P动态端口以及内容加密无能为力。
The traditional P2P identification methods are not suitable to widely applied dynamic port and the content encryption.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
带有标识条,方便编号管理和维护使用,便于识别数据和语音端口;
Provides marking strip so as to facilitate numbering management and maintenance and easily identify data and voice ports;
DDR2内存不能直接识别主端口的请求命令,必须经由内存控制器处理后才能执行。
The controller is used to translate requests coming from host port because DDR2 SDRAM could not execute these com- mands directly.
这个工具可以快速地对施工中的多芯电缆两端相对应的端口进行测试,并进行识别,同时也能够发现电缆中芯线的短路,断路情况。
It can test the corresponding ports rapidly, identifying each conductor in the cable. At the same time, it can find the faults of cable, such as short-circuit, broken-circuit and so on.
传统的P 2 P流量识别方法主要有基于端口的识别方法、深层数据包检测技术、基于流特征的识别技术等。
Traditional P2P traffic identification methods are based on port identification, or deep packet inspection technology, or based on identifying technology of flow characteristics.
专用输入端口的虚路径被交换到公共输出端口目的地所识别的网络交换机的输出端口目的地。
The virtual paths at the dedicated input port are switched to outport port destinations of the network switch identified by the common output port destinations.
专用输入端口的虚路径被交换到公共输出端口目的地所识别的网络交换机的输出端口目的地。
The virtual paths at the dedicated input port are switched to outport port destinations of the network switch identified by the common output port destinations.
应用推荐