• Next I'll show you two ICMP attacks.

    接下来介绍两种ICMP攻击

    youdao

  • Define how ICMP packets should be handled.

    定义如何处理ICMP数据包。

    youdao

  • ICMP USES the basic support of IP as if it were a higher level protocol.

    ICMP使用IP基本支持,就好象更高级别的协议。

    youdao

  • The ICMP timestamp message type is designed to help alleviate this problem.

    ICMP时间戮记讯息类型设计帮助解决问题

    youdao

  • The remote host USES an ICMP timestamp reply message to respond to the request.

    远端主机使用一个ICMP时间戮记回复讯息反应请求

    youdao

  • ICMP message: ICMP is a protocol designed to report and diagnose network problems.

    ICMP消息ICMP用来报告诊断网络问题协议

    youdao

  • This page explains how ICMP timestamps are used to solve clock synchronization issues.

    本页解释ICMP时间戮记如何使用解决时序同步化议题。

    youdao

  • ICMP provides a service that enables hosts to communicate control information to each other.

    ICMP提供服务使主机能够彼此交流控制信息

    youdao

  • For example, ICMP will send a source quench message when traffic becomes congested at a router.

    例如路由器发生通信拥塞时,ICMP发出一个抑制信息

    youdao

  • Internet Control Message Protocol (ICMP) is an integral part of IP, but it USES some of IP's services.

    网际控制报文协议(ICMP)IP的组成部分使用某些IP服务

    youdao

  • The parts of ICMP that can be translated are also required to work across a translation solution.

    ICMP可以转换部分同样需要一个转换方案

    youdao

  • ICMP is used by IP as well as some higher level protocols, such as Transmission Control protocol (TCP).

    icmpip一些更高级别协议使用,传输控制协议(TCP)。

    youdao

  • Typically, ICMP is used to report errors in datagram processing on a host. Some functions of ICMP include.

    通常ICMP用来报告主机数据报处理中的错误

    youdao

  • Making use of Internet Control message Protocol (ICMP) message for the diagnosis carries out low efficiency.

    程序采用网际控制报文协议(ICMP)方式网络进行诊断执行效率

    youdao

  • These are not the only message types employed by ICMP, but they should give you an idea what ICMP is used for.

    以上这些不是ICMP使用的全部消息类型它们使大致了解ICMP的用途。

    youdao

  • The most common command that generates an ICMP message is ping, used to test if there is connectivity to a certain device.

    生成ICMP消息常见命令ping,它用来测试是否能连接某个设备上

    youdao

  • Function inet_init also initializes the various inet modules, such as the ARP, ICMP, the IP modules, and the TCP and UDP modules.

    函数inet _ init各个inet模块进行初始化,例如ARPICMPIP模块,以及TCPUDP模块。

    youdao

  • The IP layer, in turn, provides services used by the Internet Control Message Protocol (ICMP) and Transmission Control Protocol (TCP).

    反过来ip提供网际控制报文协议(ICMP)传输控制协议(TCP)使用服务

    youdao

  • This paper expatiate on the theory of network protocol spoofing commonly, the ICMP protocol and its leak are analyzed in details.

    阐述网络协议欺骗一般原理详细分析了ICMP协议及其存在漏洞

    youdao

  • Examples of protocols are TCP, UDP, ICMP, comma-delimited list of any combination of these three protocols and all (for all protocols).

    协议示例tcpUDPICMP用逗号分隔任何三种协议的组合列表以及ALL(用于所有协议)。

    youdao

  • In the following sections you will find more detailed information about ICMP and TCP as well as some interesting attacks using these protocols.

    以下几节中找到关于ICMPTCP详细的信息以及一些使用这些协议的有趣的攻击

    youdao

  • For example, you can route the network traffic that supports the virtual network over native IP, HTTP (including through a proxy), DNS and ICMP.

    例如可以通过本地IPHTTP(包括通过代理)、DNSicmp来路由支持虚拟网络网络流量

    youdao

  • If problems are encountered during routing, the Internet Control message Protoccol or ICMP sends messages and reports errors to the source host.

    如果安排路径过程遇到问题互联网控制信息协议(ICMP)就把信息错误报告主机发送。

    youdao

  • Once discovery discovers a node (typically through ICMP ping), it will ask the capability daemon (capsd) to determine what services that node supports.

    一旦discovery发现一个节点(通常通过ICMPping),能力守护程序(capsd)确定节点支持什么服务

    youdao

  • The ICMP echo request failed because the source address and destination address that are specified in an ICMP echo message are not in the same scope.

    由于ICM P回送消息指定地址目标地址不在同一范围内,ICM P回送请求失败

    youdao

  • ARP spoofing and ICMP redirection attack are used frequently, both of them can sniff the Ethernet or attack the target by means of denial of service.

    ARP欺骗ICM P重定向攻击以太网中常用攻击手段两者都达到监听网络目标主机进行拒绝服务攻击的效果。

    youdao

  • While I won't cover any IP-level attacks in this article, I do want to discuss IP in a little more detail as it is the underlying protocol of ICMP and TCP.

    尽管将不在本文介绍任何IP级别攻击,但我确实需要稍微详细地讨论IP,因为ICMPTCP底层协议

    youdao

  • There are three kinds of invading and attacking action in this thesis, they are the model of using HTTP, the model of using TCP, and the model of using ICMP.

    论文研究入侵攻击类型主要大类,它们分别HTTP协议相关的典型入侵攻击,与TCP协议相关典型入侵攻击以及ICMP协议相关的典型入侵攻击。

    youdao

  • There are three kinds of invading and attacking action in this thesis, they are the model of using HTTP, the model of using TCP, and the model of using ICMP.

    论文研究入侵攻击类型主要大类,它们分别HTTP协议相关的典型入侵攻击,与TCP协议相关典型入侵攻击以及ICMP协议相关的典型入侵攻击。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定