Second, even if packets make it to the target, responses will be routed to the forged IP address.
其次,即使信息包被传递到目标机器,响应也将被路由到伪造的IP 地址。
The target host is running and has an active network adapter configured with the IP address that you used.
目标主机正在运行,而且在您使用的IP地址上配置了活跃的网络适配器。
All you need to do is select a template to use, provide the target system name or IP address, user name, and password.
您只需选择要使用的模板,提供目标系统名称或IP地址、用户名和密码即可。
Use the add button to add the hostname or IP address to the Selected target computers list.
使用Add按钮将主机名和ip地址添加到选定的目标计算机列表中。
The Summary panel provides information on the task that will be deployed, hostname or IP address of the target machine, as well as the estimated time needed to deploy all tasks.
Summary面板中提供了有关待部署的任务、目标计算机的主机名或IP地址以及部署所有任务估计花费时间的信息。
Discover targets on the IP address of the target machine.
发现目标机器的IP地址上的目标。
You are required to provide the hostname or IP address of the target server where PBASolution and middleware components will be deployed.
您需要提供PBASolution和中间件的部署目标服务器的主机名和IP地址。
The host name or IP address of the machine hosting the target WebSphere MQ queue manager.
承载目标WebSphereMQ队列管理器的计算机的主机名称或IP地址。
You must know the IP address of your tablet and have the SSH server up and running. The other requirement is that you need to connect as user when prompted by the target site.
您必须知道tablet的IP地址而且已经设置和运行了SSH服务器。
You may also enter the target computer's IP address.
你也可以直接输入目标电脑的IP地址。
Attacker sends a TCP SYN packet to the target port from his own IP address (or one he controls) to request a connection.
攻击者从自己的的IP地址(或者他控制的)发送一个TCPSYN攻击或者自己包到目标端口请求连接。
Since the connection is always up, your computer's IP address will change less frequently (if at all), thus making it more of a fixed target for attack.
自从连接以后总是向上的,你的计算机IP住址将会时常(如果全然)更不改变,如此攻击的固定目标的使它成为更多。
Since the connection is always up, your computer's IP address will change less frequently (if at all), thus making it more of a fixed target for attack.
自从连接以后总是向上的,你的计算机IP住址将会时常(如果全然)更不改变,如此攻击的固定目标的使它成为更多。
应用推荐