• At last, this paper does a comprehensive evaluation of the above three secure tunneling techniques.

    最后本文三种隧道实现技术进行了评估

    youdao

  • Whenever you send sensitive data over an XmlHTTPRequest, use proper authentication and secure tunneling.

    如果通过XmlHTTPRequest发送敏感数据,需要使用适当的身份验证安全通道

    youdao

  • The inclusion of support for IPv6-to-IPv6 tunneling allows secure seamless communication to occur between two endpoints, such as transmissions over Virtual Private Networks, or VPNs.

    包含IPv6 IPv6隧道支持两个端点之间可以进行安全无缝通信比如虚拟专用网络 (VirtualPrivate Networks, VPN) 之上的传输

    youdao

  • In this article, you learned how you can utilize the tunneling capability of OpenSSH to set up a secure tunnel between your DB2 9 client and servers.

    本文中,学习了如何利用OpenSSH隧道功能设置DB 29客户机服务器之间安全隧道

    youdao

  • VPN network building is the tunneling technology based processs of building the exclusive and secure virtual private network.

    VPN具有组网安全两大功能,VPN组网基于隧道技术为用户构建安全、独占虚拟专用网络过程

    youdao

  • This might be useful when tunneling K4000RC over a secure protocol such as SSH, for example, to remove one redundant level of authentication.

    越过仪器的保护协议ssh可能有用例如移动一个验证多余标准

    youdao

  • This might be useful when tunneling K4000RC over a secure protocol such as SSH, for example, to remove one redundant level of authentication.

    越过仪器的保护协议ssh可能有用例如移动一个验证多余标准

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定