We add a rule to allow them to write _ so as to allow sending network packets.
我们添加一个规则使它们可以写_,从而允许发送网络包。
Debugging can involve the use of tools such as network packet sniffers to capture network packets.
调试可能需要使用网络包嗅探器这样的工具来捕获网络包。
The development of the system was to provide the users with a useful tool that analysis the network packets.
本系统的开发就是为了给网络使用者提供一个有用的网络数据包分析工具。
The network packets are delivered into separated buffer queues to be detected by the traffic statistics module.
流量统计模块将接收到的网络数据包分别放到不同的缓冲队列中等待检测处理。
To reduce network delay, server announces the latest competitive price to active network node by active network packets.
服务器以主动信包的形式向主动节点发布最新竞价,减少网络延迟。
RSA_TLS encryption protects the confidentiality and integrity of network packets as they pass between the client and the server.
当网络数据包在客户端和服务器之间进行传输时,使用RSA_TLS加密可保护它们的保密性和完整性。
The primary complexity behind decoding network transmission is the levels of information that are provided within the network packets.
解码网络传输最复杂的是网络数据包中信息的级别。
The tcpdump tool is an older tool that "sniffs" network packets from a network and either prints them to stdout or logs them to a file.
tcpdump工具是一个比较老的工具,它从网上“嗅探”网络数据包,打印到stdout或记录在一个文件中。
As an embedded product, Broad band router has some specifications, such as real time, busy handling network packets, simple structure, etc.
宽带路由器作为一个嵌入式产品,具有一定的实时性,网络处理频繁,结构比较简单等特点。
True network emulation also provides flexibility in filtering network packets based on IP addresses or protocols such as TCP, UDP, and ICMP.
实际网路模拟在根据IP位址或TCP、UDP和ICMP之类通讯协定来筛选网路封包上,也提供了相当的弹性。
As an embedded product, Broad band router has some specifications, such as real time, be busy in handling network packets, simple structure, etc.
宽带路由器作为一个嵌入式产品,具有一定的实时性,网络处理频繁,结构比较简单等特点。
True network emulation also provides flexibility to filter network packets that are based on IP addresses or protocols such as TCP, UDP, and ICMP.
实际网路模拟在根据IP位址或TCP、UDP和ICMP之类通讯协定筛选网路封包方面,也提供了相当的弹性。
The system has four main functions: capture the network packets, analysis the packet, analysis the information of packet and display packet information.
本系统有四个主要功能:数据包的捕获、数据包解析、数据包信息分析和数据包信息的显示。
The experiments prove that the system can capture and monitor all network packets effectively, and achieve the validity and security of information transmission.
经过实验证明,本系统能够有效拦截、监控及处理所有网络数据包,保证信息传输的合法性及安全性。
Otherwise, a malicious eavesdropper on any router between your server and the end user can very easily sniff the sensitive information out of the network packets.
否则,恶意的监听者就可以在你的应用程序与最终用户之间的任何路由器上通过数据包探嗅到那些敏感的信息。
Related to the ping tool, the traceroute tool will normally provide you with the ping times for each router that the network packets travel through to reach their destination.
traceroute工具与ping工具相关,它通常提供网络数据包传输所经过的每个路由器的ping时间。
Network-based attacks: these attacks rely on low-level access to network packets and attempt to harm the system by altering this traffic or discovering information from these packets.
基于网络的攻击:这些攻击依赖于对网络数据包的低层访问,试图通过修改通信流或者发现这些数据包中的信息来危害系统。
However, if you decrease the default, more packets will need to be sent, which could increase overall network utilization.
然而,如果您减少这个缺省值,那么将需要发送更多的包,这可能会增加整体网络的使用率。
The network over which the packets travel routes them independently of one another, allocating the path that each is to take according to the resources available at that instant.
根据当时的资源可用情况,网络为每个分组分配一个路径,从而为其上传输的这些分组设定了与众不同的传输路线。
To minimize delay and jitter, the network devices must be able to service voice packets as soon as they arrive, or in other words, in strict priority fashion.
为了使延迟和抖动减到最小,网络设备必须能够在语音数据包一到达时就进行处理,换句话说,就是严格的优先级方式。
For example, with the Ethernet, network standard packets are echoed to all physical ports and, by scanning all the packets that go past on the network, you can examine the content.
例如,对于以太网来说,网络标准数据包将发送到所有的物理端口,并且通过扫描通过网络传输的所有数据包,您可以检查其中的内容。
What we really want, for an access point, is a simple bridge; packets from one network show up on the other network, nothing special.
对于接入点,我们真正需要的是一个简单的网桥;来自一个网络的数据包出现在另一个网络上,没有什么特别用途。
If it does not do this, there are periods where the network is not moving any packets, and therefore its bandwidth is not fully utilized.
如果不这样做,则网络在某段时间内不会传输任何包,因此它的带宽未得到充分利用。
The other type of scanning involves actually looking at the information contained within the raw packets that go past on your network.
其他类型的扫描还包括,实际查看在网络中传输的原始数据包所包含的信息。
Sometimes, network conditions can cause audio packets to arrive out of order, to be lost in transmission, or to take longer to get to their intended destination than expected.
有时候,网络状况可能导致音频包不能按序到达,或者在传输中丢失,或者比预期花更多的时间到达目的地。
Network traffic is made up of IP packets or simply packets — small chunks of data traveling in streams from a source system to a destination system.
网络流量由IP信息包(或,简称信息包)—以流的形式从源系统传输到目的地系统的一些小块数据—组成。
Also, the network cannot be completely overloaded with packets; otherwise the heartbeat will be lost.
同样,网络不能完全充满数据包;否则,将丢失心跳。
UDP programs cannot rely on the reliability of the network; packets may be lost or reordered, and it's up to the application to handle these situations.
UDP程序不能依靠网络的可靠性;分组可能丢失或重新排序,它依靠应用程序处理这些情况。
UDP programs cannot rely on the reliability of the network; packets may be lost or reordered, and it's up to the application to handle these situations.
UDP程序不能依靠网络的可靠性;分组可能丢失或重新排序,它依靠应用程序处理这些情况。
应用推荐