在这里,以字面值形式提供文档,但是也可以通过参数标志或主机变量把文档传递给数据库。
Here the document is provided as a literal value, but it could also be passed to the database through a parameter marker or host variable.
要实现这一点,攻击者向目标主机发送设置了SYN标志的tcp包,就象打开常规tCP连接时一样。
To accomplish this, the attacker sends a TCP packet with the SYN flag set to the target host, just like when opening a regular TCP connection.
G标志可以为主机中的内存使用情况提供全局视图(见清单6)。
The -g flag gives you a global view for memory utilization on your host (see Listing 6).
如果端口未打开,则被扫描主机发送设置了rst和ack标志的包。
If the port is not open, the scanned host sends a packet with the RST and ack flags set.
G标志可以为主机中的内存使用情况提供全局的视图(请参见清单5)。
The -g flag gives you a global view for memory utilization on your host (see Listing 5).
如果该端口是打开的,则被扫描主机返回设置了syn和ack标志的包进行响应。
In response, the scanned host returns a packet with the SYN and ack flags set if the port is open.
如上所述,当主机A想建立到目的地主机d的TCP连接时,它首先发送设置了SYN标志的tcp段。
As discussed above, when Host a wants to establish a TCP connection to destination Host d, it sends a TCP segment with the SYN flag set first.
特别在当我们使用IP安全协议中的密码凭证来标志内部主机时,基于这些标志的策略对主机来说无疑更具可信性。
Especially when we use IP security protocol in the internal host password credentials to sign, on the basis of these marks strategy is undoubtedly more credibility for the host.
这将是一个标志和见证上帝的主机,在埃及的土地上。
It will be a sign and a witness to the LORD of hosts in the land of Egypt.
这将是一个标志和见证上帝的主机,在埃及的土地上。
It will be a sign and a witness to the LORD of hosts in the land of Egypt.
应用推荐