漏洞扫描器类似于其他类型的扫描器——例如,端口扫描器有助于保障端口上的网络和系统的安全。
A vulnerability scanner is similar to other types of scanners-for example, port scanners help secure the network and the systems on it.
对于防御拒绝服务攻击与端口扫描,我们在网络层与传输层分别采取相应的措施进行防范。
For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.
系统分为四个模块:计算机在线检测模块、计算机端口扫描模块、远程安装模块、网络数据包控制模块。
The system divides into four modules: on-line computer examination module, computer port scanned module, remote installation module and network control module.
对目标系统进行端口扫描,是网络系统入侵者进入目标系统的第一步。
Scanning a port of the target system is the first step that network intruders will do before entering the system.
本文提出了基于端口扫描和插件的网络漏洞扫描器模型。
The network vulnerability scanner based on port scanning and plugin is proposed in this article.
对目标系统进行端口扫描,是网络系统入侵者进入目标系统的第一步。
The first step that network system intruders enter the target system is the port scanning of the system.
端口扫描技术是网络安全扫描技术的重要技术之一。
Port-Scanning Technology is one of the most important technologies of the safe scanning on internet.
为了有效地对付网络入侵行为,对端口扫描进行研究是非常有益和必要的。
It is very useful and necessary to research the ports scan technology for cope with net inbreak effectively.
为了有效地对付网络入侵行为,对端口扫描进行研究是非常有益和必要的。
In order to deal with the invading behavior of the Internet effectively, it is very useful and necessary to work on the port scanning.
为了有效地对付网络入侵行为,对端口扫描进行研究是非常有益和必要的。
In order to deal with the invading behavior of the Internet effectively, it is very useful and necessary to work on the port scanning.
应用推荐