• The first type of network scanning you should use is one that finds and locates the Internet Protocol (IP) addresses in use on the network.

    应该使用第一种类型网络扫描网络中查找定位正在使用的Internet协议(IP)地址

    youdao

  • Network scanning is one of the methods of data acquisition in DNMAI, scanning result is some fundamental data for vulnerability analysis.

    网络扫描DNMAI数据采集方法种,扫描结果也是脆弱性分析基础数据之一。

    youdao

  • Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.

    黑客进入虚拟之后,可以使用黑客工具启动恶意网络扫描攻击活动,并把这些活动伪装善意的网络扫描

    youdao

  • Determining what hosts exist on your network is the most basic of network scanning tasks, and it can be the greatest way of understanding what is going on within your network.

    确定网络中的主机基本网络扫描任务并且了解网络运行状况的最好方式

    youdao

  • Raw network scanning provides a wealth of information, such as understanding the precise nature of exchanged information over the network and the performance of the network as a whole.

    原始网络扫描可以提供大量信息比如了解通过网络所交换信息的确切性质以及网络的整体性能

    youdao

  • For example, with the Ethernet, network standard packets are echoed to all physical ports and, by scanning all the packets that go past on the network, you can examine the content.

    例如对于以太网来说网络标准数据包将发送所有物理端口并且通过扫描通过网络传输所有数据包,可以检查其中的内容。

    youdao

  • Hosts might be down, services might be temporarily unavailable and, in a very busy network, the scanning packets simply might not have gone through.

    主机可能关闭,某些服务可能暂时无法使用,并且一个非常繁忙网络中,扫描数据包可能根本无法通过。

    youdao

  • The other type of scanning involves actually looking at the information contained within the raw packets that go past on your network.

    其他类型扫描还包括实际查看网络传输原始数据包所包含的信息

    youdao

  • In this article, you've examined methods for scanning your network to find hosts and open ports and how to record and compare that information over time.

    本文中,研究了一些相关的方法,可用于扫描网络寻找主机打开端口记录相关信息在经过一段时间之后对信息进行比较

    youdao

  • Scanning your network enables you to build a quick picture of exactly what is going on, configuration options, and what is available on your network.

    扫描网络可以使迅速而准确地了解网络运行状况配置选项及其提供的服务。

    youdao

  • When scanning for network IPs, there are a few things that you should keep in mind.

    扫描网络IP的时候,请记住下面几点

    youdao

  • For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.

    对于防御拒绝服务攻击端口扫描我们网络传输分别采取相应措施进行防范。

    youdao

  • IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.

    IaaS提供商可能允许基于网络漏洞扫描因为他们无法区分善意网络扫描攻击活动

    youdao

  • Because hackers want to find loopholes must first scan the vulnerability, so each company should be on its own network vulnerability scanning as a regular, regular process.

    因为黑客若想发现漏洞必须进行漏洞扫描因此每个公司应该自家网络的漏洞扫描作为一个常规的、定期的流程。

    youdao

  • Also, standard tech-niques such as network-based vulnerability scanning are usually forbidden by IaaS providers because, for example, friendly scans can't be distinguished from at-tacker activity.

    此外标准的技术,基于网络漏洞扫描通常IaaS提供商禁止原因之一是无法友好的扫描攻击者的活动区别开来。

    youdao

  • By scanning the protected network actively and gathering necessary information, this system can dynamically configure IDS to improve detection efficiency.

    通过主动扫描保护网络获取有效信息动态地配置入侵检测系统提高检测效率。

    youdao

  • Scanning a port of the target system is the first step that network intruders will do before entering the system.

    目标系统进行端口扫描网络系统入侵者进入目标系统的一步

    youdao

  • Vulnerability scanning technology is an emerging technology, to solve it from another angle issue of network security.

    漏洞扫描技术门新兴的技术,另一个角度解决网络安全问题

    youdao

  • Scanning electron microscopy indicated the addition of SPI and KG could make bighead surimi form firm and uniform gel network.

    电镜分析则表明SPIKG加入使鱼鱼糜形成致密、均匀的凝胶网络结构。

    youdao

  • The experiment demonstrates that the completeness of the result of alias scanning relies heavily on the connectivity of the destination network and other networks.

    试验发现别名探子扫描结果完整性目标网络其他网络连接关系的复杂性有很大关系。

    youdao

  • New scanning techniques will continue to evolve and bombard your network, probing for holes and weak spots in your security.

    总结扫描技术持续进化不断攻击网络探测安全漏洞弱点

    youdao

  • The paper presents a scanner color management model based on BP neural network and the analysis of color rendering principle of scanning objects.

    本文分析扫描呈色原理基础提出基于BP神经网络扫描仪色彩管理模型

    youdao

  • It is estimated that if the semantic search engine to achieve in a very short period of time scanning the entire network, is likely to take several years.

    估计,如果语义搜索引擎实现时间扫描整个网络有可能还要花费数年的时间。

    youdao

  • Furthermore, there are entity models created by polygon mesh in many applications such as cartoon, vision environment, network browse, physic scanning, computer games.

    此外动画、虚拟环境网络浏览医学扫描计算机游戏领域已经可以看到许多多边形网格构建的实体模型

    youdao

  • The network vulnerability scanner based on port scanning and plugin is proposed in this article.

    本文提出了基于端口扫描插件网络漏洞扫描器模型

    youdao

  • The use of plug - ins technology to create a distributed network security scanning system process is presented, too.

    阐述了运用插件技术构建分布式网络安全扫描系统过程

    youdao

  • In current worm simulation, network simulators drop the scanning packets sent to invalid IP addresses, which will underestimate the traffic brought by worm.

    蠕虫模拟时产生无效ip地址扫描在源节点所属的路由器直接丢弃与实际网络中数据包的传输情况差距较大。

    youdao

  • The first step that network system intruders enter the target system is the port scanning of the system.

    目标系统进行端口扫描,是网络系统入侵者进入目标系统一步

    youdao

  • It USES network spider to scanning all HTML documents and find out the pages which is useful.

    该系统利用网络蜘蛛扫描校园网中所有HTML文档寻找所有检索关键字相关的页面

    youdao

  • It USES network spider to scanning all HTML documents and find out the pages which is useful.

    该系统利用网络蜘蛛扫描校园网中所有HTML文档寻找所有检索关键字相关的页面

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定