目的主機 的英文怎麼說
中文拼音 [mùdezhǔjī]
目的主機
英文
destination host-
The ccu host computer of bosch is the most advanced host system at present
博世ccu主機是目前最先進的主機系統。A _ dids can be distributed on any host in the network. a _ dids has good distribute and scalable ability because of its four - tier distributed architecture and flexible agent system
A _ dids可以分佈在網路中任意數目的主機上,其四層分散式體系結構和靈活的代理體系,使得系統具有很強的分佈性和擴展性。In the multitudinous intrusion event, the hacker often gain control of the target computer through exploiting essential system process, and leaves trojan horse or back door in the system after a successful intrusion, which provides a shortcut for next access. therefore the process detection for the exploited system process and the trojan horse is important topics in the intrusion detection field
在眾多的入侵事件中,黑客往往通過感染關鍵系統進程獲得目標主機的系統權限,並在成功入侵后在目標主機留下木馬、后門作為下次入侵的捷徑,所以對這些受感染的系統進程以及木馬、后門進程進行檢測是入侵檢測技術研究的重要課題之一。For example, an attacker may break into a honeynet, then launch an outbound attack never seen before, successfully harming or compromising its intended victim
比如說,一個攻擊者可能侵入蜜網,然後發起一次對外的以前從來沒見過的攻擊,成功的損害或攻陷了它的目標主機。Can use stress patterns, words in stress, rhythmic structures, and intonation contours in order to make the utterance fit for the aim, motivation, attitudes, state of emotions, etc
能夠運用重音、邏輯重音、節奏和各種語調的變換來適應溝通目的、動機、態度以及情緒情感的變化。主要是通過各種特定形式來表達不同的態度和情感。The purpose of this subject is to implement a transparent proxy server based on linux os which can provide intranet host network security
本課題目標是完成一套基於linux操作系統的透明代理型防火墻軟體,為在內部網的主機提供安全保護。So that how to adjust and reform our government functions in the infrastructure field while to promote the efficiency and benefit, has been one of the nuclear things that has affected the reformation of government functions in infrastructure invest - finance system
基礎設施建設投資動機和目的主要是為了獲取社會效益和環境效益。基礎設施建設投資的資金來源渠道單一,主要依靠政府財政,由財政無償撥款或由財政舉債籌措等。The asic chip embedded with bluetooth is usually employed as keyboard mouse equipment controller at present, so that is complicated and expensive to realize. noteworthily a new style of design is developed in the article : a 51 mcu is employed as keyboard mouse equipment controller while controlling bluetooth module as host, which give full play to 51 mcu and make the product at low cost, the design has sure practicability and innovative ; the software of pc end is designed as operating in the backstage, which receives data from usb interface to simulate the function of the keyboard and mouse. the design is easy, the thought is ingenious
由於目前常見的藍牙鍵盤鼠標設備控制器都是用嵌入藍牙核的asic晶元實現,所以實現復雜而且價格昂貴,而文中設計獨辟蹊徑:用一片51單片機作鍵盤和鼠標的微控制器,兼作控制藍牙模塊的主機,充分發揮了51單片機的性能,實現了低成本設計,具有一定實用性和創新性; pc機端軟體則設計為運行在後臺的應用程序,接收usb介面數據並進行處理,以模擬鍵盤鼠標功能,這一設計簡單易行,思路巧妙。According to the conclusion of this thesis, we can claim that deception and lure increase the attacker ' s workload because they ca n ' t easily tell which of their attack attempts work and which fail. this method also exhausts attacker resources, increases the sophistication required for attack, all of these are help for computer network security
通過理論的證明和試驗的驗證,欺騙誘導系統使攻擊者對目標進攻的難度加大,增加了攻擊者的工作量,消耗了攻擊者的資源,延長了攻擊者的攻擊時間,將攻擊誘導到蜜罐系統,保護了目標主機的安全。Since no host trust relationships have been formed, the first time you ssh into a new host, you will be prompted with a message saying that the authenticity of the target host cannot be established, and you will be asked if you would like to continue
由於還沒有形成信任關系,在第一次ssh到一個新主機時,您將看到一條提示消息,告訴您不能建立目標主機的認證,並且被詢問是否要繼續。Continual upgrading of the resource pool ' s hardware causes the total speed and capacity of this ber - computer to increase even faster than the number of connected hosts
持續升級資源庫里的硬體,會讓這臺超級電腦的總體速度和容量增加得比連結的主機數目要快。Destination host unknown
目的主機未知Destination host administratively prohibited
目的主機被強制禁止In the internet, the aim host is accessed by the ip address
在internet網路中,必須通過ip地址來訪問目的主機。Multicast consists of concurrently sending the same information from a source to a subset of all possible destinations in computer network
多播是一種允許一個主機向多個目的主機(但不是所有主機)發送同一信息的通信方式。System administrator can generate agent or dispatch agent to destination hosts. once the agent dispatch to the host on which maids _ station had been installed, the agent can run and monitor the network
從而管理員可以在maids端生成需要的代理,派發到目的主機,由移動代理監視目標主機,執行入侵檢測任務。The first component is presented around two questions. to answer the question “ how to migrate ”, a process migration algorithm is proposed basing on three migration conditions. the second question is “ which process is the source host, which process is the destination host, which process should be chosen to migrate and when ? ” to answer the question, a improved means of migration mechanism is presented
在整個理論分析的部分,主要是圍繞著兩個問題進行展開論述: ( 1 )如何遷移,使得進程能夠在新主機上正確運行,即進程遷移演算法; ( 2 )遷移機制,即由哪臺主機(源主機)選擇哪個進程向哪臺主機遷移(目的主機) 。Adapter module servers as the bridge of different system and transmits messages. intelligent routing module can choose route automatically for a transaction. the format transition module completes the transition between various messages
適配器模塊使中間業務平臺能很容易連接外部系統,或特定的主機;智能交換路由模塊能根據用戶設置的路由腳本,靈活地進行報文路徑的選擇;進行目標適配器的定位,控制報文信息的流轉。A series of problems have been dealt with, such as the interfirem trust situation as a whole, whether there is difference in the trust of suppliers with different kind of business or in different phases, the main factors that affect the trust for suppliers and how client trust influence their purchase intention and long - term collaborative intention. the main purpose of this paper is to understand the actuality of interfirm trust of domestic organizations in marketing, to discuss how the customer trust comes into being and the mechanism of customer trust in the development of client relationship development. the paper is aimed to offer some insights into further study of trust theory based on customer relationship and some practical advices for chinese enterprises to build up customer trust
本文就是基於組織營銷中客戶關系管理的視角,站在客戶的角度,主要研究在中國社會文化背景下的組織營銷的客戶關系中,目前我國客戶信任的總體水平如何、處于什麼樣的層次、對不同發展階段以及企業性質的供應商的信任度是否存在差異、影響客戶建立對供應商信任感的主要因素是什麼、客戶信任是如何影響客戶的購買意圖以及長期合作意圖等一系列問題,其研究的目的主要是了解目前我國組織營銷中客戶信任的現狀,探討客戶對供應商信任感的形成機制以及客戶信任在客戶關系發展中的作用機制,從而為我國以後進一步研究基於客戶關系的信任理論提供一些有益的借鑒和對中國企業如何建立客戶的信任提出一些有益的策略性建議。The idea is to find out which ports are open on a specific target host, but it is done in such a tricky way that the attacked host or a poor - quality intrusion detection tool may not notice
這種攻擊的想法是找出特定目標主機上打開的埠,但完成的方式非常狡猾,因此被攻擊的主機或質量低劣的入侵檢測工具不會發現。分享友人