ARP欺骗及ICM P重定向攻击是以太网中常用的攻击手段,两者都可达到监听网络或对目标主机进行拒绝服务攻击的效果。
ARP spoofing and ICMP redirection attack are used frequently, both of them can sniff the Ethernet or attack the target by means of denial of service.
关键在于循环和网络套接字需要大量管理代码,这样才能监听、更新和控制不同的连接和接口。
The key is that the loop and network sockets need a lot of management code to ensure that you are listening, updating, and controlling the different connections and interfaces.
创建所需的网络监听套接字,注册在执行期间要调用的事件,然后启动主事件循环,让libev处理过程的其余部分。
You create the necessary network listening sockets, register the events to be called during execution, and then start the main event loop with the libev handling the rest of the process.
F sh定义为监听一个特定IP地址和网络端口,配置为处理WebSphereDataPower支持的众多协议之一。
The FSH is defined to listen on a specific IP address and network port. It is configured to handle one of the many protocols that WebSphere DataPower supports.
localhost:1527/"C:\Temp\Demo\Data;create=true;user=Mary;password=contrary"将在本地主机上建立到Cloudscape网络服务器的远程连接,监听端口 1527。
will establish a remote connection to a Cloudscape network server on the local host, listening on port 1527.
然而,对于匿名网络通讯监听除外究竟该如何进行设定的问题,理论界存在着诸多不同意见,实践中也有不同的具体法律解决方式。
However, there exist different opinions and concrete legislation solutions, both in theory and in practice, about how to design the anonymous Internet communication monitoring exception.
匿名网络通讯作为一种新兴通讯方式在现代社会广泛使用,具有广阔发展前景,同时它在监听活动中也愈发显得重要。
As a new communicative method, anonymous Internet communication has a bright prospect in the modern society, and also takes an important role in the monitoring actions.
最后,放置后门程序,擦除入侵痕迹,清理日志,新建账号,获取或修改信息、网络监听(sniffer)、攻击其他主机或者进行其他非法活动。
Finally, placed backdoor, erasing invasion, cleaning log, new traces, acquiring or modify account information, network monitor (sniffer), against other host or other illegal activities.
对系统中间的关键技术包括网络数据监听技术,协议解析技术,PKI与CA进行了研究和分析。
Then, this paper researched and analyzed the middle key of system technology, including the network data monitor technology, analytical technology of agreement, PKI and CA.
另外,随着现代网络环境中交换机的大量使用,传统的网络嗅探器不能再监听到在其它主机之间来回传递的数据包。
Besides, with the rapid use of switches in modern network circumstances, the previously used network sniffer programs can not detect the data traffic between other hosts.
在MODBUS的基础上提出了一种多主站技术,该技术将网络上的多个主站分成一个责任主站和若干个监听主站。
Introduces a multi-master technology based on MODBUS, which divides all the masters in one network into one master-in-charge and several master-in-listening.
该方法在通信线路上以监听方式对协议实现进行测试,可在实际网络运行环境下进行而不干扰网络运行,并具有其他有益特性。
This method tests the protocol implementation through online observation, can be performed in production field without interfering the network, and possesses quite a lot other beneficial features.
而不是不必两个PXE侦听器(每个都有其自己的应用程序逻辑)在网络上可以使用两个或多个应用程序逻辑的网络上有一个pxe监听器。
Rather than having two PXE listeners on the network (each with its own application logic), you can have one PXE listener on the network with two or more sets of application logic.
介绍适应于不同网络协议、操作系统和网卡的网络协议栈技术,阐述网络监听的原理,提出利用网络协议栈技术进行网络监听的两种方法,给出这两种方法的具体实现过程。
This paper introduces the technology of network protocol stack which can suit different network protocol, operation system and network card, expounds the theory of network monitor, puts forward two m.
该文通过分析思科提出的基于IP网络的合法监听架构并结合SIP呼叫建立流程的特点,将该架构扩展到下一代网络中。
After thorough analysis of the Cisco's IP-based Lawful Interception architecture and combined with SIP call setup flow, it is introduced into the NGN.
该方案由于增加了优先 级机制、信息加密和虚拟载波监听(VCS)等技术,使网络在实际应用中,在可靠性、安全性和满足不同控制 信息对时间的要求等方面,有所改善。
And then PRI, information encryption and VCS are add to this PLC scheme, and these effective measures improve the home control network characteristics on reliability, security and response time.
因此,在目前研究和使用网络监听技术及相关工具,对于防护网络安全、打击网络犯罪具有重要的现实意义(略)。
Therefore, studying and using network-monitoring technology and the correlate tool in present, it is important and practical significance for protecting network security and attacking network crime.
此外,探讨了结合网络监听工具的网络编程调试方法。
In addition, a debugging method of network programming combined with network monitoring tools is discussed.
网络监听技术就像一把双刃剑,在提供给网络管理员管理网络的方便时也提供给黑客一个盗取网络信息的工具。
Network sniffing is like one double-edged sword. It makes the network administrator convenience, but it also offers the hacker a tool to steal network information.
各国应该携手努力,共同遏制信息技术滥用,反对网络监听和网络攻击,反对网络空间军备竞赛。
All countries should work together to contain the abuse of information technology, oppose cyber surveillance and cyber attacks and reject arms race in cyberspace.
所谓网络录音盒是指通过网络向远程计算机提供录音盒所在位置的监听和录音功能的网络设备。
The so-called network recording box refers to the network to provide remote computer recording box location monitoring and recording functions of the network established Preparation.
所谓网络录音盒是指一种可以通过网络向远程的计算机提供录音盒所在位置的监听以及录音功能的网络设备。
The so-called network recording box refers to a network through a remote computer to the provision of recording the location of the box and recording wiretapping functional network equipment.
所谓网络录音盒是指一种可以通过网络向远程的计算机提供录音盒所在位置的监听以及录音功能的网络设备。
The so-called network recording box refers to a network through a remote computer to the provision of recording the location of the box and recording wiretapping functional network equipment.
应用推荐