必须包含的“固定ip”是服务器的真实(而不是虚拟)地址。
The "fixed IP" addresses that have to be included are the real (not virtual) addresses of the servers.
攻击者使用IP欺骗来隐藏自己的真实地址,因此人们开始研究IP源回溯技术。
As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.
使用该方案,您可以对众多访问点(资料中心)隐藏您伺服器的真实IP位址。
The use of the program, you can visit the many points (data center) to hide your real IP address of the server.
IP协议中最脆弱的策略就是让源主机自己填写源IP地址,并且在TCP/IP协议中也没有提供一种机制来验证源IP地址的真实性。
The weakness in Internet Protocol is that the source host itself fills in the IP source host id, and there is no provision in TCP/IP to discover the true origin of a packet.
输入您要访问的网址,点击开始浏览即可匿名访问这个网站,并且对方不会发现你的真实IP。
Enter the URL you want to access, click start browsing anonymous access to the site, and the other party will not find your real IP.
该模型通过被动IP地址伪装、被动操作系统伪装和被动网络拓扑结构伪装,建立一个由虚拟网和真实网交错的复杂仿真网;
The model establish the complex simulation network through the passive IP address camouflage, the passive operating system camouflage and the passive network topology camouflage base on camouflage.
该模型通过被动IP地址伪装、被动操作系统伪装和被动网络拓扑结构伪装,建立一个由虚拟网和真实网交错的复杂仿真网;
The model establish the complex simulation network through the passive IP address camouflage, the passive operating system camouflage and the passive network topology camouflage base on camouflage.
应用推荐