Port probing is a process that involves scanning all available ports on your server that are accessible to the Internet.
端口探测是一个扫描服务器上所有能访问互联网的可用端口的过程。
As soon as Dahl saw the newsflash, he started scanning the Internet in silent panic.
达尔一看到这则短讯,就开始沉默不安地在网络上搜索。
The first type of network scanning you should use is one that finds and locates the Internet Protocol (IP) addresses in use on the network.
您应该使用的第一种类型的网络扫描是,在网络中查找并定位正在使用的Internet协议(IP)地址。
Researchers scanning the internet for vulnerable embedded devices have found nearly 21, 000 routers, webcams and VoIP products open to remote attack.
美国研究人员最近发起了一项研究,要找出互联网上易受攻击的网络设备.他们在扫描过程中发现了近21000台路由器、网络摄像头和VoIP(网络电话)产品。
And stop scanning the Internet when you get a call from a client.
并且在同客户打电话时不要扫瞄因特网。
After all, the Internet of things involves multiple levels of security, the need for continuous scanning vulnerability technology.
毕竟物联网涉及多个层次的安全,需要持续扫描漏洞的技术。
From its reliable high-quality copying and printing output to sending facsimile via the Internet and scanning to email, the machine enables you to enjoy optimized workflow in any circumstance.
从其可靠的高品质复印打印输出到通过互联网发送传真以及扫描到电子邮件,该设备使您在任何情况下都可以享受最优化的工作流程。
With popularization of Internet, readers can get a great deal of information through scanning English news headlines.
随着因特网的普及,通过扫描网上新闻英语标题就可获得大量新闻信息。
Is facing a fresh hurdle to its digital books project as a Chinese court prepares to hear a case brought against the US Internet company by a Chinese novelist for scanning her works.
的电子图书项目面临新的障碍,一家中国法院已准备受理一名中国小说家对这家美国互联网公司扫描其作品提出的诉讼。
Port-Scanning Technology is one of the most important technologies of the safe scanning on internet.
端口扫描技术是网络安全扫描技术的重要技术之一。
Application shows that most of the mapping of the Internet can GF Forum, professional photo website portals and search engines on the website for efficient scanning photos and downloading.
应用表明,GF可以对互联网上绝大部分的贴图论坛、专业图片网站、门户网站和搜索引擎网站上的图片进行高效扫描并下载。
In order to deal with the invading behavior of the Internet effectively, it is very useful and necessary to work on the port scanning.
为了有效地对付网络入侵行为,对端口扫描进行研究是非常有益和必要的。
"For people who are not C. E. O. s, the threat is people scanning the Internet for accessible webcams for a range of motives, from voyeurism to extortion," Mr. Cobb wrote in an email.
“对于不是重要人物的人来说,威胁在于,在网上寻找可操纵摄像头的人可能是出于一系列动机,从窥探他人隐私到敲诈勒索,”科布在一封电子邮件中写道。
"For people who are not C. E. O. s, the threat is people scanning the Internet for accessible webcams for a range of motives, from voyeurism to extortion," Mr. Cobb wrote in an email.
“对于不是重要人物的人来说,威胁在于,在网上寻找可操纵摄像头的人可能是出于一系列动机,从窥探他人隐私到敲诈勒索,”科布在一封电子邮件中写道。
应用推荐