将端口类型元素拖放到目标WSDL面板的另一个元素上。
Drop a port type element over another one in the target WSDL panel.
将被拖放的端口类型结点复制到目标树中,连同其中包含的所有操作。
The dragged port type node is copied to the target tree along with all the operations it contains.
从最新创建的启动配置中为目标应用程序指定IP和端口。
From the newly created launch configuration, specify the IP and port for target application.
您需要为目标服务器指定访问信息,包括服务器url、端口号、用户名和密码。
You need to specify access information for the target servers, including server URL, port number, username, and password.
同样,管理控制台将选择缺省名称,它们是WSDL目标名称空间、服务名称和端口名称的组合。
Again, the administration console picks default names, which are a combination of the WSDL target namespace, the service name and the port name.
实际的解决方案将以一种更通用的方式构建新SOAP消息,以便从上下文属性中读取诸如目标名称空间、操作、端口名称等的值。
A real life solution would build the new SOAP message in a more generic fashion, reading the values for things like target namespace, operation, port name, and so on, from context properties.
知道主机上哪些端口是打开的,对于攻击者推断目标主机上可能存在的弱点是重要的第一步。
Knowing which ports are open on a host is an important first step for an attacker to deduce possible vulnerabilities to the target host.
这种攻击的想法是找出特定目标主机上打开的端口,但完成的方式非常狡猾,因此被攻击的主机或质量低劣的入侵检测工具不会发现。
The idea is to find out which ports are open on a specific target host, but it is done in such a tricky way that the attacked host or a poor-quality intrusion detection tool may not notice.
将源端口类型的所有元素复制到该目标中。
All the elements from the source port type are copied to the target.
在步骤3中,配置参数为:操作的名称、端口号、目标服务端点的地址、返回类型。
In step 3, configuration parameters are: name of the operation, port type, address of the target service endpoint, return type.
将完整的端口类型元素从源wsdl面板复制到目标WSDL面板上。
Copy the whole port type element from the source WSDLs panel to the target WSDL panel.
使用目标WSDL面板中已有的端口类型。
提示:主机名和端口号必须匹配目标流程服务器。
Tip: The host name and port number must match the target process server.
在目标WSDL中建立新的端口类型。
选择WSDL面板上的一个操作结点,然后拖放目标WSDL面板上的任一现有的端口类型。
Select an operation node in the source WSDLs panel and then drag and drop over any existing port type on the target WSDL panel.
大部分(78%)网络攻击都以445端口为目标。
在元素下面的元素描述了在目标WSDL中元素指定的端口类型下建立的操作。
The elements under the element describe the operations that are created in the target WSDL under the port type specified in the element.
在源wsdl面板上选择端口类型结点,然后将其拖放到根目标WSDL结点上。
Select a port type node in the source WSDLs panel and then drag and drop over the root target WSDL node.
光谱工具支持SCA应用,可以用端口将多个目标平台连接起来,这些平台可以再多种核心框架和实施作战系统中起到重要作用。
Spectra Tools support SCA application porting to multiple target platforms, which can feature a variety of core frameworks and real-time operating systems.
是目标WSDL中新的或现有的端口类型。
具体来说,需要指定运行攻击所针对的目标IP地址和端口。
Specifically, you must specify the destination IP address and port against which to run the exploit.
从源端口类型到目标WSDL结点的端口类型。
Port types from the source to port types on the target WSDL node.
在目标WSDL面板上,任何新的端口类型都是使用系统生成的名称创建的,(在红色背景上显示它的图标)。
On the target WSDL panel, any new port type is created with a system-generated name, (with its icon displayed over a red background).
端口类型和目标服务终端地址。
从源wsdl面板到目标WSDL面板中新的或现有的端口类型的操作。
Operations from the source WSDLs panel to new or existing port types on the target WSDL panel.
是在目标服务WSDL中定义的服务端口的名称。
Is the name of the service port defined in the target service WSDL.
从源wsdl面板到根目标wsdl结点的端口类型。
Port types from the source WSDLs panel to the root target WSDL node.
WptaEngine将获得端口类型名称并验证它是否存在于目标WSDL中。
WptaEngine will get the port type name and verify if it already exists in the target WSDL.
更改目标服务端口地址并生成stub之后,您将看到它们之间的stub的差别,如清单5和清单6所示。
After you change the location of target service port address and then generate the stub classes, you will see the stub differences between them, as shown in Listing 5 and Listing 6.
在新的WebSphereMQclient端点中,可以根据目标主机和端口信息定义动态出站端点ssl配置。
Within the new WebSphere MQ Client endpoint, it is possible to define dynamic outbound endpoint SSL configurations based upon the target host and port information.
应用推荐