The first type of network scanning you should use is one that finds and locates the Internet Protocol (IP) addresses in use on the network.
您应该使用的第一种类型的网络扫描是,在网络中查找并定位正在使用的Internet协议(IP)地址。
Network scanning is one of the methods of data acquisition in DNMAI, scanning result is some fundamental data for vulnerability analysis.
网络扫描是DNMAI中数据采集方法的一种,扫描结果也是脆弱性分析的基础数据之一。
Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.
黑客进入虚拟机之后,他可以使用黑客工具启动恶意的网络扫描攻击活动,并把这些活动伪装成善意的网络扫描。
Determining what hosts exist on your network is the most basic of network scanning tasks, and it can be the greatest way of understanding what is going on within your network.
确定网络中的主机,这是最基本的网络扫描任务,并且这是了解网络运行状况的最好方式。
Raw network scanning provides a wealth of information, such as understanding the precise nature of exchanged information over the network and the performance of the network as a whole.
原始网络扫描可以提供大量的信息,比如了解通过网络所交换的信息的确切性质,以及网络的整体性能。
For example, with the Ethernet, network standard packets are echoed to all physical ports and, by scanning all the packets that go past on the network, you can examine the content.
例如,对于以太网来说,网络标准数据包将发送到所有的物理端口,并且通过扫描通过网络传输的所有数据包,您可以检查其中的内容。
Hosts might be down, services might be temporarily unavailable and, in a very busy network, the scanning packets simply might not have gone through.
主机可能会关闭,某些服务可能暂时无法使用,并且在一个非常繁忙的网络中,扫描数据包可能根本无法通过。
The other type of scanning involves actually looking at the information contained within the raw packets that go past on your network.
其他类型的扫描还包括,实际查看在网络中传输的原始数据包所包含的信息。
In this article, you've examined methods for scanning your network to find hosts and open ports and how to record and compare that information over time.
在本文中,您研究了一些相关的方法,可用于扫描您的网络以寻找主机和打开的端口、记录相关的信息并在经过一段时间之后对信息进行比较。
Scanning your network enables you to build a quick picture of exactly what is going on, configuration options, and what is available on your network.
扫描网络可以使您迅速而准确地了解网络的运行状况、配置选项及其所能提供的服务。
When scanning for network IPs, there are a few things that you should keep in mind.
在扫描网络IP的时候,请记住下面几点。
For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.
对于防御拒绝服务攻击与端口扫描,我们在网络层与传输层分别采取相应的措施进行防范。
IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.
IaaS提供商可能不允许基于网络的漏洞扫描,因为他们无法区分善意的网络扫描和攻击活动。
Because hackers want to find loopholes must first scan the vulnerability, so each company should be on its own network vulnerability scanning as a regular, regular process.
因为黑客若想要发现漏洞就必须先进行漏洞扫描,因此每个公司都应该将对自家网络的漏洞扫描作为一个常规的、定期的流程。
Also, standard tech-niques such as network-based vulnerability scanning are usually forbidden by IaaS providers because, for example, friendly scans can't be distinguished from at-tacker activity.
此外,标准的技术,如基于网络的漏洞扫描通常被IaaS提供商所禁止,原因之一是无法把友好的扫描从攻击者的活动区别开来。
By scanning the protected network actively and gathering necessary information, this system can dynamically configure IDS to improve detection efficiency.
通过主动扫描被保护网络,获取有效信息,动态地配置入侵检测系统,提高检测效率。
Scanning a port of the target system is the first step that network intruders will do before entering the system.
对目标系统进行端口扫描,是网络系统入侵者进入目标系统的第一步。
Vulnerability scanning technology is an emerging technology, to solve it from another angle issue of network security.
漏洞扫描技术是一门新兴的技术,它从另一个角度解决网络安全问题。
Scanning electron microscopy indicated the addition of SPI and KG could make bighead surimi form firm and uniform gel network.
电镜分析则表明SPI和KG的加入都可使鳙鱼鱼糜形成致密、均匀的凝胶网络结构。
The experiment demonstrates that the completeness of the result of alias scanning relies heavily on the connectivity of the destination network and other networks.
试验发现,别名探子扫描结果的完整性与目标网络和其他网络连接关系的复杂性有很大关系。
New scanning techniques will continue to evolve and bombard your network, probing for holes and weak spots in your security.
总结新扫描技术将持续进化并不断攻击贵网络,探测安全上的漏洞和弱点。
The paper presents a scanner color management model based on BP neural network and the analysis of color rendering principle of scanning objects.
本文在分析扫描物呈色原理的基础上,提出了一种基于BP神经网络的扫描仪色彩管理模型。
It is estimated that if the semantic search engine to achieve in a very short period of time scanning the entire network, is likely to take several years.
据估计,如果语义搜索引擎要实现在很短的时间内扫描整个网络,很有可能还要花费数年的时间。
Furthermore, there are entity models created by polygon mesh in many applications such as cartoon, vision environment, network browse, physic scanning, computer games.
此外,在动画、虚拟环境、网络浏览、医学扫描、计算机游戏等领域已经可以看到许多由多边形网格构建的实体模型。
The network vulnerability scanner based on port scanning and plugin is proposed in this article.
本文提出了基于端口扫描和插件的网络漏洞扫描器模型。
The use of plug - ins technology to create a distributed network security scanning system process is presented, too.
并阐述了运用插件技术来构建分布式网络安全扫描系统的过程。
In current worm simulation, network simulators drop the scanning packets sent to invalid IP addresses, which will underestimate the traffic brought by worm.
蠕虫模拟时产生的无效ip地址扫描包会在源节点所属的路由器被直接丢弃,这与实际网络中数据包的传输情况差距较大。
The first step that network system intruders enter the target system is the port scanning of the system.
对目标系统进行端口扫描,是网络系统入侵者进入目标系统的第一步。
It USES network spider to scanning all HTML documents and find out the pages which is useful.
在该系统中利用网络蜘蛛,扫描校园网中所有HTML文档,寻找所有与检索关键字相关的页面。
It USES network spider to scanning all HTML documents and find out the pages which is useful.
在该系统中利用网络蜘蛛,扫描校园网中所有HTML文档,寻找所有与检索关键字相关的页面。
应用推荐