This includes values for the host name (IP address or logical name of the z/OS system), port number, and location name of the DB2 subsystem, user id, and password to be used for the connection.
这包括主机名(z/OS系统的IP地址或逻辑名称)、端口号、DB2子系统的位置以及用于连接的用户id和密码。
To leverage VLAN tagging the operating system adds a VLAN ID tag to each TCP/IP packet.
为了利用VLAN标签技术,操作系统会给每一个TCP/IP数据包添加一个 VLANID。
Even if a visitor to NHS Choices is not logged into Facebook, the social networking site will still receive the person's IP address and operating system version, but not their user ID.
如果访问NHS精选网站的用户并没有同时登录Facebook,那么,Facebook这一社交网站也能够获得用户的IP地址和操作系统信息,但是,这其中并不包含用户的ID号信息。
The add_device.php script is run with this IP address, with the output filtered to only the line containing the ID using the grep command.
add_device . php脚本就在此IP地址运行,其结果只被那些包含使用grep命令id的行所过滤。
The weakness in Internet Protocol is that the source host itself fills in the IP source host id, and there is no provision in TCP/IP to discover the true origin of a packet.
IP协议中最脆弱的策略就是让源主机自己填写源IP地址,并且在TCP/IP协议中也没有提供一种机制来验证源IP地址的真实性。
The weakness in Internet Protocol is that the source host itself fills in the IP source host id, and there is no provision in TCP/IP to discover the true origin of a packet.
IP协议中最脆弱的策略就是让源主机自己填写源IP地址,并且在TCP/IP协议中也没有提供一种机制来验证源IP地址的真实性。
应用推荐