目標主機 的英文怎麼說

中文拼音 [biāozhǔ]
目標主機 英文
target host
  • : Ⅰ名詞1 (眼睛) eye 2 (大項中再分的小項) item 3 [生物學] (把同一綱的生物按彼此相似的特徵分為幾...
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : machineengine
  • 目標 : 1. (對象) target; objective 2. (目的) goal; aim; destination
  1. This thesis is organized in two parts : the first part of this thesis focuses on strangeness production at sps energies. the strange baryon and strange meson pro - duction at sps energies are modeled via luciae model which includes the reseat ter - ing

    我們的工作要集中在用建立在強子和弦制上的高能核反應模型- luciae ,模擬wa97和na49實驗中的奇異重子和奇異介子產生的數據。
  2. In the multitudinous intrusion event, the hacker often gain control of the target computer through exploiting essential system process, and leaves trojan horse or back door in the system after a successful intrusion, which provides a shortcut for next access. therefore the process detection for the exploited system process and the trojan horse is important topics in the intrusion detection field

    在眾多的入侵事件中,黑客往往通過感染關鍵系統進程獲得目標主機的系統權限,並在成功入侵后在目標主機留下木馬、后門作為下次入侵的捷徑,所以對這些受感染的系統進程以及木馬、后門進程進行檢測是入侵檢測技術研究的重要課題之一。
  3. For example, an attacker may break into a honeynet, then launch an outbound attack never seen before, successfully harming or compromising its intended victim

    比如說,一個攻擊者可能侵入蜜網,然後發起一次對外的以前從來沒見過的攻擊,成功的損害或攻陷了它的目標主機
  4. According to the conclusion of this thesis, we can claim that deception and lure increase the attacker ' s workload because they ca n ' t easily tell which of their attack attempts work and which fail. this method also exhausts attacker resources, increases the sophistication required for attack, all of these are help for computer network security

    通過理論的證明和試驗的驗證,欺騙誘導系統使攻擊者對進攻的難度加大,增加了攻擊者的工作量,消耗了攻擊者的資源,延長了攻擊者的攻擊時間,將攻擊誘導到蜜罐系統,保護了目標主機的安全。
  5. Since no host trust relationships have been formed, the first time you ssh into a new host, you will be prompted with a message saying that the authenticity of the target host cannot be established, and you will be asked if you would like to continue

    由於還沒有形成信任關系,在第一次ssh到一個新時,您將看到一條提示消息,告訴您不能建立目標主機的認證,並且被詢問是否要繼續。
  6. System administrator can generate agent or dispatch agent to destination hosts. once the agent dispatch to the host on which maids _ station had been installed, the agent can run and monitor the network

    從而管理員可以在maids端生成需要的代理,派發到,由移動代理監視目標主機,執行入侵檢測任務。
  7. The idea is to find out which ports are open on a specific target host, but it is done in such a tricky way that the attacked host or a poor - quality intrusion detection tool may not notice

    這種攻擊的想法是找出特定目標主機上打開的埠,但完成的方式非常狡猾,因此被攻擊的或質量低劣的入侵檢測工具不會發現。
  8. The object that the apparatus deals with mostly is a plane

    測定儀中所處理的飛行要是飛
  9. Ports scan also is the common way to search target computer by hackers

    埠掃描也是黑客搜集目標主機信息的一種常用方法。
  10. In this section, i ll discuss a form of port scanning used by attackers that may not be detected so easily by the target host

    在本節中,我將討論攻擊者所使用的一種埠掃描形式,它不會被目標主機輕易地偵測到。
  11. To specify the target host

    指定目標主機
  12. Ensure that the destination has enough space for the extraction of product files

    要確保目標主機上有足夠的空間解壓產品文件。
  13. Jre version 1. 3. 2 or higher must be installed and available on the target host

    必須在目標主機上安裝jre version 1 . 3 . 2或更高版本,並且它們在目標主機上必須是可用的。
  14. This is the least reliable of the name resolution methods as it depends on the target host being on a locally connected subnet

    目標主機聯接到本地子網時這是最可靠的名字解析方法。
  15. The release manager then rebases his her read - only stream to the new baseline and deploys to the testing target hosts

    發布經理隨后變基他/她的只讀流到新的基線並用於測試的目標主機上。
  16. Property is a null reference nothing in visual basic, requests bypass the proxy and connect directly to the destination host

    屬性為空引用(在visual basic中為nothing )時,請求迴避此代理並且直接連接到目標主機
  17. Knowing which ports are open on a host is an important first step for an attacker to deduce possible vulnerabilities to the target host

    知道上哪些埠是打開的,對于攻擊者推斷目標主機上可能存在的弱點是重要的第一步。
  18. To accomplish this, the attacker sends a tcp packet with the syn flag set to the target host, just like when opening a regular tcp connection

    要實現這一點,攻擊者向目標主機發送設置了syn志的tcp包,就象打開常規tcp連接時一樣。
  19. Secondly, it can detect opened ports on the basis of results of the first port - scan, and get the information of service and version of these opened ports. thirdly, through many kinds of detecting ways, it can get the os - fingerprints of tcp / ip protocol stack of the destination computer, and guess the faraway operation system exactly. at last, taking cve ( common vulnerabilities and exposures ) as the standard, a more practical vulnerability database by combining the structures of two large - scale oversea vulnerability databases is designed

    設計開發的網路漏洞探測系統具有較強的綜合性能,能夠提供多種埠掃描技術,在第一次掃描結果的基礎上對開放的埠進行第二次探測,得到開放的埠的服務和版本信息,通過多種探測方法獲得目標主機的tcp / ip協議棧指紋信息、較準確的推測出遠程操作系統,並以cve ( commonvulnerabilitiesandexposures )為準,結合國外兩個大型漏洞數據庫的結構,設計了較實用的漏洞數據庫。
  20. Our employees who work in china access internet through international dedicated line, so for me, everything is accessible, unless the target host or network was broken

    公司的中國員工是通過國際專線訪問網際網路的,所以對我來講,沒有什麼能訪問或者不能訪問的,除非目標主機或網路壞掉了。
分享友人