• ARP欺骗ICM P重定向攻击以太网中常用攻击手段两者都达到监听网络对目标主机进行拒绝服务攻击的效果。

    ARP spoofing and ICMP redirection attack are used frequently, both of them can sniff the Ethernet or attack the target by means of denial of service.

    youdao

  • 关键在于循环网络套接字需要大量管理代码,这样才能监听更新控制不同的连接接口

    The key is that the loop and network sockets need a lot of management code to ensure that you are listening, updating, and controlling the different connections and interfaces.

    youdao

  • 创建所需网络监听套接字注册执行期间调用事件然后启动事件循环,让libev处理过程其余部分。

    You create the necessary network listening sockets, register the events to be called during execution, and then start the main event loop with the libev handling the rest of the process.

    youdao

  • F sh定义监听一个特定IP地址网络端口配置为处理WebSphereDataPower支持众多协议之一

    The FSH is defined to listen on a specific IP address and network port. It is configured to handle one of the many protocols that WebSphere DataPower supports.

    youdao

  • localhost:1527/"C:\Temp\Demo\Data;create=true;user=Mary;password=contrary"本地主机建立Cloudscape网络服务器远程连接监听端口 1527。

    will establish a remote connection to a Cloudscape network server on the local host, listening on port 1527.

    youdao

  • 然而对于匿名网络通讯监听除外究竟该如何进行设定的问题,理论界存在着诸多不同意见实践有不同的具体法律解决方式

    However, there exist different opinions and concrete legislation solutions, both in theory and in practice, about how to design the anonymous Internet communication monitoring exception.

    youdao

  • 匿名网络通讯作为一种新兴通讯方式现代社会广泛使用,具有广阔发展前景,同时它在监听活动中也愈发显得重要

    As a new communicative method, anonymous Internet communication has a bright prospect in the modern society, and also takes an important role in the monitoring actions.

    youdao

  • 最后放置后门程序擦除入侵痕迹清理日志新建账号获取修改信息网络监听(sniffer)、攻击其他主机或者进行其他非法活动

    Finally, placed backdoor, erasing invasion, cleaning log, new traces, acquiring or modify account information, network monitor (sniffer), against other host or other illegal activities.

    youdao

  • 系统中间关键技术包括网络数据监听技术,协议解析技术,PKICA进行了研究分析

    Then, this paper researched and analyzed the middle key of system technology, including the network data monitor technology, analytical technology of agreement, PKI and CA.

    youdao

  • 另外随着现代网络环境中交换机大量使用传统的网络探器不能监听其它主机之间来回传递的数据包。

    Besides, with the rapid use of switches in modern network circumstances, the previously used network sniffer programs can not detect the data traffic between other hosts.

    youdao

  • MODBUS基础提出种多主站技术技术将网络上的多个主站分成个责任主站若干监听主站。

    Introduces a multi-master technology based on MODBUS, which divides all the masters in one network into one master-in-charge and several master-in-listening.

    youdao

  • 方法通信线路上监听方式协议实现进行测试在实际网络运行环境下进行而不干扰网络运行,具有其他有益特性

    This method tests the protocol implementation through online observation, can be performed in production field without interfering the network, and possesses quite a lot other beneficial features.

    youdao

  • 不是不必PXE侦听器(每个都自己的应用程序逻辑)网络可以使用两个或多个应用程序逻辑网络一个pxe监听器。

    Rather than having two PXE listeners on the network (each with its own application logic), you can have one PXE listener on the network with two or more sets of application logic.

    youdao

  • 介绍适应不同网络协议、操作系统网卡网络协议技术阐述网络监听原理提出利用网络协议栈技术进行网络监听种方法,给出这两种方法的具体实现过程。

    This paper introduces the technology of network protocol stack which can suit different network protocol, operation system and network card, expounds the theory of network monitor, puts forward two m.

    youdao

  • 该文通过分析思科提出基于IP网络合法监听架构结合SIP呼叫建立流程特点,将该架构扩展下一代网络中。

    After thorough analysis of the Cisco's IP-based Lawful Interception architecture and combined with SIP call setup flow, it is introduced into the NGN.

    youdao

  • 该方案由于增加优先 级机制、信息加密虚拟载波监听VCS)等技术,使网络实际应用中,在可靠性安全性和满足不同控制 信息对时间要求等方面,有所改善

    And then PRI, information encryption and VCS are add to this PLC scheme, and these effective measures improve the home control network characteristics on reliability, security and response time.

    youdao

  • 因此目前研究使用网络监听技术相关工具对于防护网络安全打击网络犯罪具有重要现实意义(略)。

    Therefore, studying and using network-monitoring technology and the correlate tool in present, it is important and practical significance for protecting network security and attacking network crime.

    youdao

  • 此外探讨了结合网络监听工具网络编程调试方法

    In addition, a debugging method of network programming combined with network monitoring tools is discussed.

    youdao

  • 网络监听技术双刃剑,在提供网络管理员管理网络方便提供给黑客盗取网络信息的工具

    Network sniffing is like one double-edged sword. It makes the network administrator convenience, but it also offers the hacker a tool to steal network information.

    youdao

  • 各国应该携手努力,共同遏制信息技术滥用反对网络监听网络攻击,反对网络空间军备竞赛。

    All countries should work together to contain the abuse of information technology, oppose cyber surveillance and cyber attacks and reject arms race in cyberspace.

    youdao

  • 所谓网络录音通过网络远程计算机提供录音盒所在位置监听录音功能网络设备。

    The so-called network recording box refers to the network to provide remote computer recording box location monitoring and recording functions of the network established Preparation.

    youdao

  • 所谓网络录音一种可以通过网络远程计算机提供录音盒所在位置监听以及录音功能网络设备

    The so-called network recording box refers to a network through a remote computer to the provision of recording the location of the box and recording wiretapping functional network equipment.

    youdao

  • 所谓网络录音一种可以通过网络远程计算机提供录音盒所在位置监听以及录音功能网络设备

    The so-called network recording box refers to a network through a remote computer to the provision of recording the location of the box and recording wiretapping functional network equipment.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定