• 必须包含固定ip服务器真实(而不是虚拟)地址

    The "fixed IP" addresses that have to be included are the real (not virtual) addresses of the servers.

    youdao

  • 攻击使用IP欺骗隐藏自己真实地址,因此人们开始研究IP源回溯技术

    As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.

    youdao

  • 使用方案可以众多访问(资料中心)隐藏伺服器真实IP

    The use of the program, you can visit the many points (data center) to hide your real IP address of the server.

    youdao

  • IP协议脆弱策略就是主机自己填写IP地址,并且在TCP/IP协议中没有提供种机制来验证源IP地址真实性。

    The weakness in Internet Protocol is that the source host itself fills in the IP source host id, and there is no provision in TCP/IP to discover the true origin of a packet.

    youdao

  • 输入访问网址点击开始浏览即可匿名访问这个网站并且对方不会发现真实IP

    Enter the URL you want to access, click start browsing anonymous access to the site, and the other party will not find your real IP.

    youdao

  • 模型通过被动IP地址伪装、被动操作系统伪装被动网络拓扑结构伪装,建立一个由虚拟网真实交错的复杂仿真网;

    The model establish the complex simulation network through the passive IP address camouflage, the passive operating system camouflage and the passive network topology camouflage base on camouflage.

    youdao

  • 模型通过被动IP地址伪装、被动操作系统伪装被动网络拓扑结构伪装,建立一个由虚拟网真实交错的复杂仿真网;

    The model establish the complex simulation network through the passive IP address camouflage, the passive operating system camouflage and the passive network topology camouflage base on camouflage.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定