在研究这样做的一些方法之前,让我们首先了解攻击者的想法并研究他们为什么想访问您的网络和系统。
Before exploring the methods for doing this, let's first peer into the mind of the attacker and learn why they might want access to your network and systems.
这一范例为通过网络访问信息的新方法铺平了道路,包括全新的软件和设备。
This paradigm has also paved the way for new methods of accessing information over networks, including entirely new classes of software and devices.
要提高效率,这种方法要求请求方及提供方之间的网络连接是安全的,并且没有为订阅者提供对他们的证书的第三方访问。
To be effective, this approach requires that the network link between the requestor and provider be secure and that the subscriber not provide third party access to their certificate.
为了测试TeamRoom的通知功能,而不必访问外部网络,也不使用电子邮件检验系统,我们可以编写mock测试方法。
In order to test our Team Room notification function without accessing the external network or having an email validation system in place, we can write mock test methods.
它简单地为用户空间的应用程序提供了一种访问内核网络子系统的方法。
This simply provides a way for user-space applications to gain access to the kernel's networking subsystem.
这种方法不但能够降低网络开销,而且在EJB内部通过为整个业务功能创建一个事务环境也可以大大地减少对数据库的访问次数。
Not only will this reduce network overhead, but within EJBs, it also critically reduces the number of database calls by creating a single transaction context for the entire business function.
Twitter的rest式接口和清晰的API文档为访问社会网络属性提供很好的方法。
Twitter's RESTful interface and clear API documentation provide excellent methods for you to access social-networking attributes.
不过不同地方,网络类型不同,访问的方法也不同。
But in different places, network type, different access methods are also different.
研究用户在网络环境下访问目录和其他搜索工具的需求和方法以开发用户化的用户工具。
Research user needs and approaches in accessing the catalog and other discovery tools in a networked environment to develop user tools for customization.
对于第二种方法,您使用HATSIntegrationObjects,来访问主机程序,并创建可定制的网络页面以提供从移动设备端进行的访问。
With the second approach, you use HATS Integration Objects to access the host applications and create customized web pages to provide access from mobile devices.
阻止FM访问的最有效方法是防止对内部DispatcherURI 进行未经批准的网络访问(见 2.1.3节)。
The most effective efficient approach to block FM access is to prevent unapproved network access to the internal Dispatcher URI which was described in Section 2.1.3.
方法:根据您访问icb - nfs所用的IP地址,确保您使用Web浏览器的系统可以访问相应的网络。
How to do this: According to the IP address you use to access icb-nfs, be sure the system from which you use the web browser can access the corresponding network.
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
技术是一种新的软件开发方法,它提供了跨越编程语言、操作系统甚至网络来访问组件对象的通用途径。
Com (component object Model) technology as a new software developing method can provide general approach span programming language, operating system even network to visit component object.
比如说,你若不想让网络上所有人登录路由器管理界面以访问US B存储器,说明书中只提到了唯一方法。
For example, you wouldn't want everyone on the network to sign in to the router's administration screen just to access the USB storage, yet that's the only method it mentions.
从光纤互连的角度分析了车载数据网络中访问方法的使用。
This paper examines the use of access methods from the point of view of fiber-optic interconnection of data networks for vetronics.
分析过量规则对网络访问控制设备性能的影响,讨论针对这一问题的解决方法。
After analyzing the excessive filtering rules, a solution to increase the performance of network access control equipment is proposed.
高速缓存引擎还为网络管理员提供了一种简单方法,通过URL滤波增强了工作站范围内的访问手段。
The cache engine also provides network administrators with a simple method to enforce a site-wide access policy through URL filtering. See also Cache.
当前一些大型网络数据库管理系统(DBMS)的安全性方法主要包括:身份认证、访问控制、审计跟踪和数据备份,但对一些更为敏感和重要的数据,还需要进行数据加密或者容灾系统的设计。
The major Security methods in DBMS are as follows: identification, visiting control, trace of audit and copy of database, but as to the sensitive and important database, it needs to be coded.
总体上,这已经被证明是一个极其简单、无需外加硬件支持的提高网络访问速度的方法。
Overall, this has proven to be an extremely simple way to improve my Internet access without resorting to additional hardware.
特别是实现公交信息查询系统过程中,原创性的提出了一种新的实现方法:基于蓝牙的网络访问结构。
In particular, originality of the implementation of a new method was proposed: Based on Bluetooth network access structure.
介绍用asp和ado技术实现网络数据库访问的方法熏并给出了网络数据库交换程序实例。
The paper introduces the method of using ASP and ADO to realize accessing network database, and gives out the example of network database exchange program.
方法从利用文献数据库、访问专业网站、使用搜索引擎等三个方面具体说明了网络妇产科学资源的检索与利用。
Methods Through full-text database, Obstetrics and Gynecology websites and search engines, this paper illustrates how to explore and utilize information resources on Internet.
这种分散化的解决方法将会降低网络带宽需求,提供更快的访问,同时保护学术研究资料免遭意外损失。
This decentralized solution will reduce network bandwidth needs and provide faster access, all the while protecting the scholarly record against accidental loss.
通过访问量分析介绍了扩大专家、科室的网络展示率,从而提高网络影响力和社会影响力的方法。
By analysis on access amount, it provides the methods to expand the exposure of experts & departments on network and enhance influence on network and society.
奥尔布莱特表示,他的研究方法首先是考察某些最大的假新闻传播站点的网络访问量。
Albright says his research started with a look at the traffic generated by some of the top fake-news distribution sites.
因为地方法规和网络供应商的限制,可能会有部分网站您无法正常访问。
Because of local regulations and ISPs' limitation, it is probably that you can't access some sites.
MGI能够通过各种方法访问,包括基于网络的搜索方式,一个基因组序列浏览器和可下载的数据库报告。
MGI can be accessed by a variety of methods including web-based search forms, a genome sequence browser and downloadable database reports.
轮流询问是一种主网络设备以有序的方式询问子网络是否有数据要传输的访问方法。
Polling is an access method in which a primary network device inquires, in an orderly fashion, whether secondaries have data to transmit.
网络侧的所述方法为:获知终端获得了关于一作品的信息并确定需要向所述终端发送所述作品的正版作品的访问地址;
The method on the network side includes: learn that a terminal acquires the information about a work and determine the visit address that delivers the legal-copy work of the work to the terminal;
应用推荐