• To start the IP security on AIX, run the following command.

    运行以下命令AIX启动IP安全性

    youdao

  • To help protect your IP, the companies should pay great attention to the workplace IP security, where most of information leakage occurs.

    公司应当极大关注工作场所知识产权安全,工作场所是信息泄露主要渠道。

    youdao

  • These areas included rules for enabling remote services, IP security filtering, and more granular control for startup files, which included inittab, rc.tcpip, and inetd.

    这些领域包括启用远程服务规则IP安全性过滤启动文件,包括inittabrc.tcpip 和inetd细粒度控制

    youdao

  • Especially when we use IP security protocol in the internal host password credentials to sign, on the basis of these marks strategy is undoubtedly more credibility for the host.

    特别在当我们使用IP安全协议中的密码凭证标志内部主机时,基于这些标志策略主机来说无疑更具可信性

    youdao

  • Some form of network-level encryption, such as a Virtual Private Network (VPN), perhaps using IP Security Protocol (IPSEC), is the most obvious solution, although there are other reasonable choices.

    某种可能使用IP安全性协议 (IPSEC)网络加密形式例如虚拟专用网 (VPN))可取解决方案虽然其他合理选择

    youdao

  • Next share the disaster recovery IP address with any other employees, divisions, vendors, partners: any entity that currently has your primary IP address in its security Settings.

    接下来灾难恢复IP地址通知其他职员分部厂商合作伙伴当前安全设置包含ip地址的所有实体

    youdao

  • In the next section we set up user security over IP connectivity with SSL.

    我们使用经ssl加密的IP连接建立用户安全性

    youdao

  • While it would have been possible for me to set up this service from a site with an assigned domain on a static IP address, I felt that a dynamic DNS would offer several security advantages.

    虽然可以一个静态IP地址拥有分配站点建立这种服务,但是觉得动态dns应该可以提供一些安全上的好处。

    youdao

  • In this article I have presented the AIX IP filtering capabilities, a useful built-in feature that will allow system administrators to implement an extra layer of security in their servers.

    本文中,演示AIXIP过滤功能,这是一项内置而且很有用功能系统管理员在服务器中实现额外安全

    youdao

  • Any competent hackers can spoof their IP address every time they visit the form, so they can easily subvert that simple security check.

    任何有能力黑客都可以每次访问表单伪装IP地址因此能够非常容易地简单安全检查失效

    youdao

  • In the next section we set up link security with SSL over IP connectivity.

    我们使用经ssl加密的IP连接建立链接安全性

    youdao

  • This article should help solution architects and software architects set up security over IP connectivity with SSL in an enterprise environment.

    本文有助于解决方案架构软件架构师使用通过ssl加密IP连接企业环境构建安全性

    youdao

  • In tunnel mode, the inner IP header carries the intended source and original destination addresses, while an outer IP header contains IP addresses for hop points such as security gateways.

    隧道模式内部ip报头承载预设最初目的地址外部ip报头包含用于IP地址,比如安全网关

    youdao

  • IP address forgery is a fairly easy thing to do, and so relying on IP addresses for security is unwise.

    伪造ip地址相当容易的,所以依靠IP地址保证安全性是不明智的。

    youdao

  • When you configure this IP connectivity with SSL, you can make the link security more stringent by adding few more checks through SSL configuration.

    使用SSL配置IP连接可以通过SSL配置添加更多检查来加强链接安全性

    youdao

  • The architecture in Figure 1 provides an example of the security setup for CICS TS and TXSeries integration using IPIC (IP Connectivity) with SSL.

    1中的架构提供了一个面向CICSTSTXSeries集成安全设置示例使用了经ssl加密IPIC (ip连接)。

    youdao

  • The tunnel endpoint is the tunneling computer closest to the IP traffic destination, as specified by the security rule's IP filter list.

    隧道终结点接近IP通讯目标隧道操作计算机正如安全规则IP筛选器列表所指定的。

    youdao

  • It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.

    具有实时数据流量分析日志ip网络数据包能力,能够进行协议分析,是网络安全领域一个新兴热点

    youdao

  • In order to run IP on an ATM-based network, new protocols are developed. However, these protocols have not yet been subjected to a thorough security analysis.

    为了AT M网上实现IP传输,人们提出了一些新的协议这些协议本身的安全性没有进行深入地了解和验证。

    youdao

  • The IKE concept can not be used for securing group communication based on IP multicast services since it is only addressed to pairwise security.

    IKE概念不能用于基于IP服务安全通信因为只能用于主机对之间的安全

    youdao

  • Implementing and assessing the Guizhou telecom IP network security project.

    贵州电信IP网网络安全项目实施评估

    youdao

  • The design of the data network was analyzed and illuminated in the aspects of network topology, IP layout, MPLS VPN, network security, and network management.

    华北电力调度数据网网络设计网络拓扑IP规划MPLSVPN、网络安全、网络管理等方面进行了分析阐述

    youdao

  • Use any USB or IP camera is to keep an eye on your home, office, parking area or anywhere you need security.

    留意办公室停车场面积使用任何usbIP摄像头任何需要安全

    youdao

  • However, due to IP network's open system, the security of network becomes increasingly serious and complicated.

    由于IP网络开放性网络安全问题也日益严重,复杂化。

    youdao

  • This article described a security way that binding IP address and MAC address combine with using access-list.

    介绍绑定IP地址MAC地址与访问列表相结合的安全管理办法

    youdao

  • Because the devices which use lightweight IP protocol has limited resource, import the correlation security method will inevitably bring the influence to resource consumption.

    由于轻量级IP设备资源有限引入相关安全措施不可避免地增加资源消耗

    youdao

  • Because the devices which use lightweight IP protocol has limited resource, import the correlation security method will inevitably bring the influence to resource consumption.

    由于轻量级IP设备资源有限引入相关安全措施不可避免地增加资源消耗

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定