What network ports does the system use and for what purpose?
系统使用了哪些网络端口? 都用于什么目的?
The architecture diagram includes an icon for network ports.
架构图包含了网络端口的图标。
Do you want to be able to summarize data by an operation type, or by the files or network ports?
希望能够按操作类型、文件或网络端口汇总数据吗?
The specific integrations you want to enable between the IBM Cloud VLAN and your own systems and the network ports those integrations require.
想要在IBMCloudVLAN和您自己的系统之间实现的特定集成,以及那些集成需要的网络端口。
Most of the rest of the policy merely is there to grant the container sufficient privilege to access bits of the system: network ports, devices, consoles, etc.
剩余的策略主要是授与容器充分的特权,以访问系统的各个部分:网络端口、设备和控制台等。
As for softswitch, the total number of China's softswitch network ports will reach 15 million, and softswitch network equipment market scale will reach RMB3 billion yuan in 2006.
在软交换方面,2006年,中国软交换网络端口总数将达到1500万端口,软交换网络设备市场规模将达到30亿元人民币。
A WSDL document describes a series of network endpoints called ports, then defines the XML format for the messages or data being exchanged with the server.
一个WSDL文档先是描述一系列称为端口的网络端点,然后定义与服务器交换的消息或数据的xml格式。
For example, with the Ethernet, network standard packets are echoed to all physical ports and, by scanning all the packets that go past on the network, you can examine the content.
例如,对于以太网来说,网络标准数据包将发送到所有的物理端口,并且通过扫描通过网络传输的所有数据包,您可以检查其中的内容。
Generally, an application can create event listeners with event handlers through multiple connection ports, but this is costly in terms of network resources and maintenance.
通常,应用程序可以通过多个连接端口用事件处理程序创建事件侦听程序,但是这在网络资源和维护方面花费较大。
There are also network access controls for sockets, network interfaces, hosts, and ports.
还有用于套接字、网络接口、主机和端口的网络访问控制。
Typically used to change TCP ports, host name, and so forth on network connector modules.
在网络连接器模块上,通常用来更改TCP端口、主机名等等。
In this article, you've examined methods for scanning your network to find hosts and open ports and how to record and compare that information over time.
在本文中,您研究了一些相关的方法,可用于扫描您的网络以寻找主机和打开的端口、记录相关的信息并在经过一段时间之后对信息进行比较。
In fact, in many cases, subversive network applications and some security methods will deliberately use non-standard ports.
事实上,大多数情况下一些破坏性网络应用和一些安全性方法会故意使用非标准端口。
If you are dealing with a network that blocks TCP communications on ports 8081 and 1533, though, you might consider enabling this option.
但是,如果您的网络阻塞端口8081和1533上的TCP通信,那么可以考虑启用这个选项。
Virtual I/O lowers costs and enables simplified server management by using fewer cards, cables, and switch ports, while still achieving full network I/O performance.
由于使用更少的卡、线缆和交换机端口,虚拟I/O可以降低成本并简化服务器管理,同时仍然实现出色的网络 I/O 性能。
Once installed in the router's memory, the bot blocks remote communication ports and begins to scan the network for other vulnerable machines.
这种病毒是安装在目标设备的内存中的,一旦病毒在目标设备中安装完成,病毒会马上屏蔽设备的远程通信端口,并开始扫描网络中其它可攻击的目标。
Also, you can see that ports 22, 80, 443, and 1352 are the only ports accessible from the internal network (which is normally defined as the trusted network).
还可以看到从内网(通常定义为可信网络)只能访问端口22、80、443和1352。
In this case, you can see that the Network file System (NFS) protocol is in the first file but not the second, while both the mysql and VNC ports have been open during the latter scan.
在这个示例中,您可以看到,在第一个文件中出现了网络文件系统(NFS)协议,在第二个文件中则没有出现,而在后面一次扫描期间,mysql和vnc端口都处于打开状态。
Select the appropriate media, cables, ports, and connectors to connect routers to other network devices and hosts
选择适当的介质、线缆、端口和连接器将路由器连接到其他的网络设备和主机
Select the appropriate media, cables, ports, and connectors to connect switches to other network devices and hosts
选择适当的介质、线缆、端口和连接头来连接交换机跟主机或者其他网络设备
If you want to scan the raw data information that goes past on the network, you need to use a tool other than nmap, which only scans, hosts, and ports.
如果您希望扫描经过网络传输的原始数据信息,那么您需要使用一种其他工具,而不是nmap,因为它只能扫描主机和端口。
It also has 4x the network capacity, with two 1gb Ethernet management ports and eight 1gb Ethernet connectivity ports.
它还具有4x的网络容量,带有两个1gbEthernet管理端口和8个1gb Ethernet连接端口。
The tcptr command assigns a maximum limit of incoming TCP connections to a given network port or a range of ports.
tcptr命令为一个给定的网络端口或端口范围指定最大TCP连接限制。
Common examples are switches and LEDs, serial ports, and network controllers.
一般的实例是开关、LED、串口和网络控制器。
The servers are plugged into the same network switch, which has only a few remaining open ports.
服务器接入同一台交换机,而此交换机仅剩下少量可用接口了。
If you leave all ports open, you're leaving a lot of options for a cracker who wants to break into your network.
如果你离开所有的端口开启,你正在为一个想要闯入你的网络的破坏者留下许多选择项。
For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.
对于防御拒绝服务攻击与端口扫描,我们在网络层与传输层分别采取相应的措施进行防范。
In addition, London is the hub of East and West International Ports, with full-fledged transportation network.
另外,伦敦是东西方国际港口的枢纽,拥有强健的交通网络。
In addition, London is the hub of East and West International Ports, with full-fledged transportation network.
另外,伦敦是东西方国际港口的枢纽,拥有强健的交通网络。
应用推荐