端口扫描攻击。
Description: TCP SYN scanning is a variant of port scanning.
描述:TCPSYN扫描是端口扫描的变体。
Port scanning is used to check whether ports on a given host are open.
端口扫描用来检查给定主机上的端口是否打开。
This paper proposes a distributed detection of port scanning system.
该文设计了分布式端口扫描检测系统。
Using the same tool, you can also do port scanning and service version discovery.
使用相同的工具,你还可以进行移植扫描和发现服务版本。
A port scanning attack is performed through the structured and systematic scanning of a host.
端口扫描攻击通过对主机进行系统的结构化扫描来实现。
The network vulnerability scanner based on port scanning and plugin is proposed in this article.
本文提出了基于端口扫描和插件的网络漏洞扫描器模型。
The first step that network system intruders enter the target system is the port scanning of the system.
对目标系统进行端口扫描,是网络系统入侵者进入目标系统的第一步。
The detecting active host is most important steps to some port scanning or determining host OS technologies.
活动主机探测是许多安全扫描的首要步骤,它的准确性对扫描技术至关重要。
Port scanning is a usual method which is used by the hacker to collect the information of the target main processor.
端口扫描是黑客搜集目标主机信息的一种常用方法。
Contents portscanner local port scanning machines procedures, which may port scanning is scanning your computer all possible port;
目录portscanner是本地机器端口扫描程序,其中扫描可能端口就是扫描计算机上所有可能的端口;
In order to deal with the invading behavior of the Internet effectively, it is very useful and necessary to work on the port scanning.
为了有效地对付网络入侵行为,对端口扫描进行研究是非常有益和必要的。
Then it studies the network vulnerability scanning technology, witch includes port scanning, vulnerability scanning and dictionary attacking.
而对目标系统漏洞信息的获取,目前主要是通过网络漏洞扫描工具实现的。
As described earlier, a single pass of either the host or port scanning information is only useful for the instant in time when the scan was executed.
如前所述,如果只进行一次扫描,那么主机或者端口扫描信息仅在执行该次扫描的时候是有用的。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
Port probing is a process that involves scanning all available ports on your server that are accessible to the Internet.
端口探测是一个扫描服务器上所有能访问互联网的可用端口的过程。
Scanning a port of the target system is the first step that network intruders will do before entering the system.
对目标系统进行端口扫描,是网络系统入侵者进入目标系统的第一步。
The improved strategy can defense both common port-scanning and the secret scanning with the symbol of SYN.
这种改进方案不仅能有效防御常规的端口扫描,也能有效防御syn隐蔽扫描。
The machine scanning system connects to PC machines by print the port LPT.
机械扫描系统通过打印端口LPT与PC机相连。
Port-Scanning Technology is one of the most important technologies of the safe scanning on internet.
端口扫描技术是网络安全扫描技术的重要技术之一。
The data transmission in confocal scanning imaging system can be realized through the serial port communication technique.
共焦扫描成像系统的数据传输可以采用串口通信技术实现。
The data transmission in confocal scanning imaging system can be realized through the serial port communication technique.
共焦扫描成像系统的数据传输可以采用串口通信技术实现。
应用推荐