Next share the disaster recovery IP address with any other employees, divisions, vendors, partners: any entity that currently has your primary IP address in its security Settings.
接下来,把灾难恢复IP地址通知其他职员、分部、厂商和合作伙伴:当前在其安全设置中包含您的主ip地址的所有实体。
In tunnel mode, the inner IP header carries the intended source and original destination addresses, while an outer IP header contains IP addresses for hop points such as security gateways.
在隧道模式,内部的ip报头承载预设的源和最初的目的地址,外部ip报头包含用于跳点的IP地址,比如安全网关。
IP address forgery is a fairly easy thing to do, and so relying on IP addresses for security is unwise.
伪造ip地址是相当容易的,所以依靠IP地址保证安全性是不明智的。
The tunnel endpoint is the tunneling computer closest to the IP traffic destination, as specified by the security rule's IP filter list.
隧道终结点是最接近IP通讯目标的隧道操作计算机,正如安全规则的IP筛选器列表所指定的。
To help protect your IP, the companies should pay great attention to the workplace IP security, where most of information leakage occurs.
公司应当极大关注工作场所的知识产权安全,工作场所是信息泄露的主要渠道。
IP multicast group key management is essential for the IP multicast security.
IP多播组密钥管理问题是IP多播安全的核心问题。
Mobile IP is a mobile solution on the network layer. More and more attentions are paid to the security and the application of Mobile IP technology.
移动IP是一种网络层的移动解决方案,它的安全与应用成为人们最为关注的问题。
This paper introduces IP layer security of computer system, incidences often use invading method to IP layer. In order to prevent the invading, should take the measure.
文章介绍了计算机网络系统IP层安全概况和入侵者对IP层常采用的入侵手段,以及为防止这种入侵所采取的措施。
Check IP address of all sessions: This security feature prevents sessions from being hijacked by verifying whether the session is emanating from the same IP.
检查所有会话的IP地址:这个安全设置避免服务器受到来自同一个IP地址的会话攻击。
Check IP address of all sessions: This security feature prevents sessions from being hijacked by verifying whether the session is emanating from the same IP.
检查所有会话的IP地址:这个安全设置避免服务器受到来自同一个IP地址的会话攻击。
应用推荐