• 漏洞扫描类似其他类型扫描——例如端口扫描有助于保障端口网络系统安全

    A vulnerability scanner is similar to other types of scanners-for example, port scanners help secure the network and the systems on it.

    youdao

  • 对于防御拒绝服务攻击端口扫描我们网络传输分别采取相应措施进行防范。

    For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.

    youdao

  • 系统分为四个模块计算机在线检测模块、计算机端口扫描模块、远程安装模块、网络数据包控制模块。

    The system divides into four modules: on-line computer examination module, computer port scanned module, remote installation module and network control module.

    youdao

  • 目标系统进行端口扫描网络系统入侵者进入目标系统的一步

    Scanning a port of the target system is the first step that network intruders will do before entering the system.

    youdao

  • 本文提出了基于端口扫描插件网络漏洞扫描器模型

    The network vulnerability scanner based on port scanning and plugin is proposed in this article.

    youdao

  • 目标系统进行端口扫描,是网络系统入侵者进入目标系统一步

    The first step that network system intruders enter the target system is the port scanning of the system.

    youdao

  • 端口扫描技术网络安全扫描技术重要技术之一

    Port-Scanning Technology is one of the most important technologies of the safe scanning on internet.

    youdao

  • 为了有效地对付网络入侵行为端口扫描进行研究非常有益必要的。

    It is very useful and necessary to research the ports scan technology for cope with net inbreak effectively.

    youdao

  • 为了有效对付网络入侵行为端口扫描进行研究非常有益必要

    In order to deal with the invading behavior of the Internet effectively, it is very useful and necessary to work on the port scanning.

    youdao

  • 为了有效对付网络入侵行为端口扫描进行研究非常有益必要

    In order to deal with the invading behavior of the Internet effectively, it is very useful and necessary to work on the port scanning.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定