有了目标主机后,向它发出命令。
Once you have the target host, give the command to it. In this case, it's.
能够将SSL配置与特定的目标主机和端口关联。
The ability to associate an SSL configuration with specific target hosts and ports.
在您的主机和目标主机之间有双向路由。
如果不是0%,就意味着目标主机或网络有问题。
Anything else means that there could be a problem with the target host or the network.
目标网络或目标主机。
因此,要检查是否有针对目标主机的条目(见清单11)。
So, check to see whether there's an entry for the target host (see Listing 11).
用户名和密码必须与目标主机系统上的Windows用户帐户匹配。
The user name and password must match to a Windows user account on the target host system.
响应时间长很可能意味着与目标主机交换数据的应用程序的性能会比较差。
Long response times are likely to mean poor performance for any applications that exchange data with the target host.
目标主机正在运行,而且在您使用的IP地址上配置了活跃的网络适配器。
The target host is running and has an active network adapter configured with the IP address that you used.
本地主机,利用地址解析协议定位目标主机端及要传送数据包。
In the case of a local host, the ARP is used to locate the MAC of the target host and the datagram that is transmitted.
在目标主机,数据包被传递至udp协议程序并送到目的地端口。
At the destination host, the packet is passed up to UDP and delivered to the destination port.
对于本文,所有样例命令和输出中使用的目标主机系统都称为testhost。
For the purposes of this article, the target host system used in all sample commands and output is called testhost.
然后,使用tcpdump显示发送到目标主机的数据包,见清单16中的示例。
Then, use tcpdump to display packets sent to the host using the example shown in Listing 16.
Nagios以前只是从目标主机收集信息,但最近开发了可以在主机上运行代理的插件。
Nagios previously only polled information from its target hosts, but has recently developed plug-ins that allow it to run agents on those hosts.
在计算机网络安全领域,针对目标主机的安全性能分析评估是当前的研究热点。
In the field of network security, the secure performance analysis assessment based host is becoming highlighting.
知道主机上哪些端口是打开的,对于攻击者推断目标主机上可能存在的弱点是重要的第一步。
Knowing which ports are open on a host is an important first step for an attacker to deduce possible vulnerabilities to the target host.
当给定架构执行请求时,数据类型表示可能不同于满足需求的目标主机上的数据类型。
When a given architecture performs a request, the data type representation may differ from the target host that satisfies the request.
使用traceroute(见清单9)跟踪到目标主机和来自目标主机的完整路由。
Use traceroute (see Listing 9) to trace the full route to and from the target host.
Ganglia没有内置的通知机制,但是它可以在目标主机上支持可扩展的内置代理。
Ganglia doesn't have a built-in notification system, but it was designed to support scalable built-in agents on target hosts.
例如syn_sent状态表示您的主机已经发起了三阶段握手,但是还没有从目标主机收到确认。
For example, a status of SYN_SENT indicates that a three-way handshake has been initiated by your host, but as yet no acknowledgement has been received from the target host.
可以使用这个命令检查应该发送到目标主机的通信流是否离开了您的主机,以及是否有返回的通信流。
You can use the command to establish whether traffic is leaving your host destined for the target host and whether traffic is making its way back.
如果路由是正确的,可以使用traceroute查明数据包通过网络发送到目标主机的准确路由。
If the route is correct, then you can use traceroute to determine the exact route that packets will take across the network to the target host.
在这个示例中,您可以看到原始以太网、IP和TCP数据包,包括源、目标主机的信息以及数据包选项。
In this case, you can see the raw Ethernet, IP, and TCP packet data, including the source and destination host information and packet options.
Nagios 过去也是仅用于从目标主机中轮询信息,但是现在提供了在目标主机上运行代理的插件。
Nagios also used to only poll information from its target hosts, but now has plug-ins that run agents on target hosts.
要实现这一点,攻击者向目标主机发送设置了SYN标志的tcp包,就象打开常规tCP连接时一样。
To accomplish this, the attacker sends a TCP packet with the SYN flag set to the target host, just like when opening a regular TCP connection.
如果没有出现入站通信流,可能是主机没有响应,或者在您的主机和目标主机之间没有有效的路由。
If no inbound traffic appears, it may be that the host isn't responding or there's no valid route from your host to the target or vice versa.
即使它们穿越了多个路径中的多个路由器,三个小数据包也只有在全部到达目标主机时才重新装配。
Even if they travel through multiple routers packets are only reassembled when they reach the destination host.
如果只显示您主机发送的数据包,这也表明从目标主机发送回的通信流有问题,因此反向路由有问题。
If only packets sent by your host are shown, this is another indication that the problem is with traffic sent back by the target and therefore the route back.
该协议通知目标主机的IP协议程序,究竟是把这个数据包传递给TCP协议还是传递给UDP协议。
The protocol informsIP at the destination host whether to pass the packet up to TCP or UDP.
该协议通知目标主机的IP协议程序,究竟是把这个数据包传递给TCP协议还是传递给UDP协议。
The protocol informsIP at the destination host whether to pass the packet up to TCP or UDP.
应用推荐