若在适当端口施加正弦电压源,则网络的稳定性取决于进入端口基波电流的实功与虚功成份的符号值。
When exciting Sin voltage source is applied to proper port, the stability of network depends on the sign of active and reactive components for fundamental-wave current entering port of networks.
它确保请求只能通过特定的端口进入系统,并且在一些情况下,确保所有的访问只能来自某些物理机器。
It ensures that requests can only enter the system from specified ports, and in some cases, ensures that all accesses are only from certain physical machines.
为指定IP地址和端口上的任何URI接受所有进入请求。
Which accepts all incoming requests for any URI on the specified IP address and port.
在主机上,服务器进程在请求进入时会侦听端口,并将那些消息发送到对象。
On the host machine, the server process listens at the port for requests and, when they come in, sends those messages to the object.
进入购物者系统最常用的方法是使用工具,比如SATAN,在计算机上执行端口检查,找到进入系统的入口点。
A popular technique for gaining entry into the shopper's system is to use a tool, such as SATAN, to perform port scans on a computer that detect entry points into the machine.
它的双重饲料,有两个接收器上的安全带从顶部进入,并与底部弹出端口。
It had the dual feed, with two belts entering from the top of the receiver, and with bottom ejection port.
安装完成后,可以在本地或者远程浏览器通过一个特定的端口,通常是10000,来进入Webmin。
Once installed, Webmin is accessed through a special port, typically 10000, either locally or from a remote browser.
输入DeviceAddress和将接收进入的客户端请求的端口。
Enter the Device Address and port that will receive incoming client requests.
一旦把这个任务部署好了后,你可以通过8080端口进入MVC客户端,如下图所示。
Once all the roles are deployed you can enter the MVC client on port 8080 as the following image shows.
可扩展和自托管——Bespin的端口和容纳能力要求它具有很高的可扩展能力,并且可以使用户很容易的通过命令或者API插件进入。
Extensible and Self-Hosted — the interface and capabilities of Bespin should be highly extensible and easily accessible to users through Ubiquity-like commands or via the plug-in API.
对目标系统进行端口扫描,是网络系统入侵者进入目标系统的第一步。
Scanning a port of the target system is the first step that network intruders will do before entering the system.
该端口设计防止任何大于60角度的液体滴漏和固体颗粒进入电机。
The ports are designed to prevent liquid drops or airborne solid particles from entering the housing when introduced at any angle greater than 60 degrees downward from vertical.
这可用于防止试图破坏DHCP绑定数据库的攻击,并对进入交换机端口的DHCP流量限速。
This can be used to prevent attacks that attempt to poison the DHCP binding database, and to rate-limit the amount of DHCP traffic that enters a switch port.
对目标系统进行端口扫描,是网络系统入侵者进入目标系统的第一步。
The first step that network system intruders enter the target system is the port scanning of the system.
警告:不要让紫色底漆或液状粘固剂进入接触到端口连接件的密封表面。
Caution: Do not allow purple primer or solvent cement to come in contact with the sealing face of the end connectors.
进入配置具体端口的模式。
进入配置具体端口的模式。
应用推荐