If your network is reliable, try increasing the buffer size from the default (8000) to 64000.
如果您的网络可靠,尝试将缓冲区大小从默认的8000提高到64000。
For example, a buffer overflow in a network server program that can be tickled by outside users may provide an attacker with a login on the machine.
例如,外部使用者可以利用的网路伺服器程序中的缓冲区溢位,可能使攻击者登入到机器。
Also keep in mind that many times, updates are the only way to fix problems such as those related to buffer overflows, network client issues, and so on.
此外,您要记住,有些问题必须通过更新才能修复,比如缓冲溢出和网络客户端等问题。
Sendfile (2) is a technique that avoids buffer copy overhead, and it directly pushes bits from the file system onto the network.
Sendfile(2)是一种避免缓冲区复制开销的技术,并且它直接将数据位从文件系统转移到网络。
Name is the pointer to the buffer that contains the network transport address.
name是指向包含网络传输地址的缓冲区的指针。
You can look for signs of buffer congestion with netstat -s, which prints a list of network counters.
可以用netstat- s寻找缓存区拥挤的迹象,这个命令输出网络计数器的列表。
The Lotus Sametime client uses what is referred to as jitter buffer management to compensate for any delays that occur in audio transmissions caused by network congestion and disruptions.
LotusSametime客户机使用所谓的抖动缓冲管理(jitter buffer management)补偿因网络拥塞和中断导致的音频传输延迟。
Memcached USES a per-connection buffer to read and write data out over the network.
memcached为每个链接使用单独的缓存进行数据的读写。
Name is a buffer (an OUT parameter), which contains the network transport address of the foreign host.
name是缓冲区(OUT参数),它包含外来主机的网络传输地址。
Buffer overrun against the Internet is the most common, also harm the largest kind of network attack means.
缓冲区溢出攻击是互联网上最普通,也是危害最大的一种网络攻击手段。
In that case maybe they share a common text buffer and just directly write to it and when the buffer is full it can be sent across the network.
在这种情况下,也许他们有一个共同的文本缓冲区直接写入和缓冲区已满时,它可以通过网络传送。
Buffer overflow attack technology is a very efficient attack technology based on network.
缓冲区溢出攻击技术是一项十分有效的网络攻击技术。
Buffer overflow attacks have been the most popular methods of attacking network.
缓冲区溢出攻击已经成为网络攻击的主要方式。
VI Architecture (VIA) reduces the communication overhead by eliminating the context switch between the user mode and the kernel mode and using the application space as the network data buffer .
通过消除数据传输过程中用户态和核心态之间上下文切换、将应用程序空间直接作为网络数据缓存来降低通信开销。
In the current network and distributed system security, buffer overflow is widely used by more than 50%.
在当前网络与分布式系统安全中,被广泛利用的50%以上都是缓冲区溢出。
The undulating green roof – designed to buffer the partial residential scheme from neighbouring industrial estates – would be crossed by a 3.8-mile network of walking trails.
起伏的绿色屋顶–作为住宅区与邻近的工业区的缓冲部分–将会贯穿3.8-英里的步行系统。
The network packets are delivered into separated buffer queues to be detected by the traffic statistics module.
流量统计模块将接收到的网络数据包分别放到不同的缓冲队列中等待检测处理。
In this paper, the cell loss ratios in ATM network are got by varied the multiplex buffer size and multiplex rate using the designed VBR video transmission experiment.
该文通过所设计的AT M网络VBR视频传输实验,获得了不同复用缓冲区大小及复用输出速率下的信元丢失率。
On the basis of the estimated packet arrival rate and the status of network congestion in router, the buffer was managed using rate-based random early detection(RED).
在路由器中根据网络拥塞状态和数据流到达速率,采用基于速率的随机早期检测机制进行缓存管理。
To meet the need of multimedia communications in network in desirable quality of service, a priority queue based on buffer management mechanism is forwarded in support of multimedia communications.
为了解决好计算机网络中的多媒体通信以及对服务质量的要求,提出了一种基于优先级队列的缓存管理机制。
As we know Serialization is the process of saving an object in a storage medium (such as a file, or a memory buffer) or to transmit it over a network connection in binary form.
我们知道序列化的过程将对象保存在一个存储介质(如一个文件或内存缓冲区)或传输二进制形式通过网络连接。
Each processing module may include a network interface, at least one buffer, a packet parser, a packet builder, and at least one processing unit.
每一个处理模块都可以包括网络接口、至少一个缓冲器、分组解析器、分组构造器和至少一个处理单元。
A formula for calculating receiving buffer length was proposed, based on the analysis and research on network parameters, such as jitter, average speed and packet loss fraction.
在分析研究延时抖动、平均速率和丢包率等网络参数的基础上,给出客户端接收缓冲区长度估算公式。根据客户端反馈网络参数在服务器端实现流量控制。
Network security has been paid more attention to and hackers often take advantage of buffer overflow to attack other systems or spread virus.
网络安全日益引起人们的重视,而利用缓冲区溢出进行攻击是黑客和病毒较为常用的手段。
A message sent on a datagram socket was larger than the internal message buffer or some other network limit, or the buffer used to receive a datagram into was smaller than the datagram itself.
一个在数据报套接字上发送的消息大于内部消息缓冲器或其他一些网络限制,或该用户用于接收数据报的缓冲器比数据报小。
The key technologies in the OPS network include optical switch, optical logic operation, wavelength conversion and optical buffer etc.
OPS网络结构中的关键技术包括光开关、光逻辑、全光波长变换以及光缓存等多项技术。
The most important and indispensable component in OPS network is the optical buffer, which is used for storing the data packet to solve the time conflict of signals.
光缓存是OPS网络必需的器件,用以实现数据包的存储功能,解决信号时间上的冲突;
This enables network code to pull a buffer out of use even when the network protocol has no idea who is currently using it.
这样可以使网络代码让一个缓存退出使用,尽管此时网络协议也许并不清楚谁正在使用这个缓存。
With existing buffer generating algorithms assessed, this paper proposes a new algorithm in aid of edge constrained triangular network to create vector buffer.
本文在分析了已有的缓冲区生成算法后,提出缓冲曲线和边约束三角网辅助的矢量缓冲区生成算法。
A dynamic jitter buffer is software-based and can be configured by the network administrator to adapt to changes in the network's delay.
而动态抖动缓冲器是基于软件的,它由网管配置以适应网络延迟的改变。
应用推荐