而火墻 的英文怎麼說

中文拼音 [ērhuǒ]
而火墻 英文
flame shield
  • : fire
  • : 名詞(磚、石等築成的屏障或外圍) wall
  1. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝數據、網上鄰居名字列表等數據的讀寫操作,從很方便的根據控管規則實現了對網路封包的認證操作,提高了系統的過濾效率。鑒于目前防技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  2. Network security techniques include router filter, firewalls, intrusion detection, audit, counteroffensive and etc. in these techniques, router filter and firewalls are static security techniques, and others are dynamic security techniques

    目前網路安全技術包括路由器、防、漏洞防堵、入侵檢測、審計和反攻擊等,其中路由器過濾、防、漏洞防堵屬于靜態安全技術,入侵檢測、審計和反攻擊等屬于動態防護。
  3. Install a personal " fire wall " software and be careful while accepting file transfer from unknown senders via email, icq or netmeeting

    安裝個人防( firewall )軟體,以避免因透過電郵、 icq及netmeeting接收或開啟不明來歷的檔案導緻密碼被盜用。
  4. By installing a compact version of linux with only the important system applications, no graphical user interface, and no user applications, you can create the perfect footprint to turn your old machine into a firewall

    Linux的緊湊版本只含有重要的系統應用程序,沒有圖形用戶介面和用戶應用程序。安裝了緊湊版本的linux之後,您就可以漂亮地把老機器變成防了。
  5. This paper is beneficial for the study of the intranet network security and the applications of the intranet host firewalls

    不僅在理論上對企業級的計算機網路安全防護的研究和發展有較大的意義,且對實際的企業級主機防的設計應用也有一定的指導意義。
  6. Just as burglar alarms alert homeowners when someone has broken through a locked window or door, intrusion - detection systems alert system administrators when hackers have gotten past a firewall, making it possible to thwart the attack and even track down the intruder

    正像有人破窗或破門入時防盜警報警告房屋主人那樣,當黑客突破防時,入侵探測系統就警告系統管理員,使得有可能挫敗入侵,甚至也可能追捕入侵者。
  7. Intrusion detection, an important supplement to the firewall, should combine with the firewall to build a better security system

    需要將防與入侵檢測技術相結合,來構造一個比較完善的防禦系統。
  8. Network driver technology is used in kernel mode. currently, most personal firewalls use ndis hook driver technology. however, ndis hook greatly depends on platform, so developers need to judge os version so as to use some undocumented structures

    目前大多數個人防採用內核模式的ndishook驅動程序技術,但是,這種技術對平臺的依賴性比較大,需要在程序中判斷操作系統的版本使用一些未見文檔的結構定義。
  9. The thesis designed the structure of a firewall in global, and then it go deep into the problem of searching and maintaining the filter rules and the state inspection table. it employed the data structure and algorithms of geometry and graph theory in the design of firewall

    本文在帶狀態監測的防結構基礎上,首先從總體上設計了整個防的結構,進研究了過濾規則庫和狀態監測表的搜索、維護問題,提出了將計算幾何學、圖論中的數據結構和演算法引入防的設計的方式,將基礎理論應用到實踐中來。
  10. A deep packet inspection engine will enable the asic to quickly inspect packet payloads to identify potential security threats, such as worms, that would pass through existing firewall solutions unchecked

    高級的包偵測引擎將能夠使asic快速偵測包的有效載荷以便識別潛在的安全威脅,例如現在那些將通過防不能阻止的蠕蟲病毒信息包。
  11. In the traditional risk management, the response methods are always deficient. we divide the response into passive and active response. the passive response supports the email alarm and the window alarm, while the active response implements the dynamic protection through the cooperation with the firewall

    傳統的風險管理中,安全響應環節往往不夠完善,本文將風險管理的響應措施分類為被動響應和主動響應,被動響應提供郵件通知、窗口報警等措施;主動響應則聯合防實現動態防禦的功能。
  12. You can adapt the hierarchy approach, for instance, to allow the enterprise firewall administrator to communicate directly with a proxy user bypassing the super and local administrators

    您可以修改層次通道,例如,允許企業防管理員越過超級管理員和本地管理員直接與代理用戶通信。
  13. With the evolution of network technologyjnternet takes more and more great part in our life. in the same time, the security of network become the focus of people. the traditonal method used for defence is adopt as strategy of prohibit, such as firewall, encrypt, access control, security system e. t. these methods all have some impact on defence, but from the view of system security management. but they are not enough only for defence. intrusion detection system can detect outside attack or misuse, it is an kind of logical compensation for defence

    隨著網路技術的迅速發展,網路日益成為人們生活的重要部分,與此同時,黑客頻頻入侵網路,網路安全問題成為人們關注的焦點,傳統安全方法是採用盡可能多的禁止策略來進行防禦。目前採用的手段有防、加密、身份認證、訪問控制、安全操作系統等,這些對系統非法入侵都起到一定的作用。然從系統安全管理角度來說,僅有防禦是不夠的,還應採取主動策略。
  14. Professional firewall management services offer many advantages, including trained personnel to monitor network security, plus regular maintenance schedules to keep your firewall up - to - date

    專業的防管理服務,除了有工程師監視變動與設定,還會提供定期的維護與更新;它最有價值的一點,是全天候的服務,因為隨時待命的緊急回應能力是很重要的。
  15. When you submit your personal data at our web site, we have additional security measures to protect your personal data including firewall and authentication by account number as well as password and financial information will be sent in encrypted format via a secure payment gateway

    當閣下於本公司網站呈交閣下的個人資料時,本公司設有額外的保安措施以保障閣下的個人資料,包括使用防,並以戶口號碼及密碼加以確認,財務資料會以加密方式透過一個保安付款閘道器傳送。
  16. Because the maximum amount can vary with different firewall and proxy implementations, large hidden fields can be sporadically problematic

    因為最大數量會隨所採用的防和代理的不同不同,較大的隱藏域可能會出現偶發性問題。
  17. Because the maximum amount can vary with different firewall and proxy implementations, large hidden fields can cause sporadic problems

    由於最大數量會隨所採用的防和代理的不同不同,因此大量隱藏欄位可能會導致偶發性問題。
  18. Because the maximum amount can vary with different firewall and proxy implementations, large hidden fields can be sporadically problematic. for more information see

    因為最大數量會隨所採用的防和代理的不同不同,較大的隱藏域可能會出現偶發性問題。
  19. Because the maximum amount of data allowed in hidden fields can vary with different firewall and proxy implementations, large hidden fields can cause unpredictable behavior

    由於隱藏欄位中允許的最大數據量隨所採用的防和代理的不同異,因此較大的隱藏欄位會導致發生不可預知的行為。
  20. It works both as a classic protection of file - servers and, via its optional plug - ins, as a protection of various subsystems running on the server, including electronic mail, firewall proxy etc

    4 server edition為文件服務器提供一流的病毒防護,且通過它的插件,有效防護服務器上的子系統,包括電子郵件,防代理等
分享友人