馬埠 的英文怎麼說

中文拼音 []
馬埠 英文
mabu
  • : Ⅰ名詞1 [動物學] (哺乳動物) horse 2 (象棋棋子) horse one of the pieces in chinese chess3 (姓...
  • : 名詞1. (碼頭) pier; port; wharf; jetty 2. (有碼頭的城鎮) port city3. (商埠) commercial port
  1. In view of the furious opium smuggling, the viceroy of guangdong and guangxi ordered the establishment of three customs stations in 1868 at fat tau chau, cheung chau and kap shui mun ma wan respectively to collect likin on opium trade

    鑒于香港開后鴉片走私活動猖獗,兩廣總督于同治七年(一八六八年)下令,于佛頭洲、長洲及汲水門(灣)設置稅關,對鴉片貿易抽取厘金。
  2. Classic kung - fu comedy adventure about shanghai sailors battling vicious pirates. blending buster keaton - esque comedy, dazzling martial artistry, and eye - popping stuntwork, this richly rewards genre fans willing to endure a slow start

    香港開初期海盜橫行,水師小隊目如成飾,不滿官府對付海盜不力,憤而辭官,與師兄卓一飛洪金寶飾合力對付盜羅三炮,卻接連敗退。
  3. Happy valley is used for horseracing for more then 150 years, and it is still a major racecourse in hong kong

    至於俗稱為快活谷的跑場,自香港開以來,便一直是舉行賽活動的地方。
  4. The article highlights the implementation of how to detect the route to an aimed intranet by traceroute, how to determine the operating system by the tcp / ip stacks fingerprints, how to find the users information of the common os, how to realize the port scan by multi - thread, how to find the vulnerabilities of a terminal, and how to control a remote system by the trojan horse

    文章還詳細介紹了如何利用traceroute和源路由的traceroute探測到達目標網路的路徑;如何利用常規方法和tcp ip協議棧指紋特徵來識別操作系統類型;如何探測常見操作系統的用戶信息;如何利用多線程實現掃描;如何發現系統中與用戶、服務相關的漏洞缺陷;如何利用木技術來實現遠程控制等。
  5. Trojan horse is a remote control program based on " client / server " mode. after the trojan horse server running on user ' s pc, it can open a specifical port or connect with trojan horse client or do other actions

    「特洛伊木」 ,是一種基於「客戶機服務器」模式的遠程控制程序,它的服務器端程序在用戶的計算機上運行后,可以打開特定的也可以與客戶機交互或是執行特定命令等等。
  6. Intranet attack include : information - detector, ip - deceive, dos, password - attack, man - in - the - middle - attack, application layer attack, network reconnaissance, trust exploitation, port redirection, virus. it is helpful to obtain complete and distinct security requirements with intranet security risk analysis. 2

    主要包括數據包探測器、 ip電子欺騙、拒絕服務、密碼攻擊、中間人攻擊、應用層攻擊、網路偵察、信任利用、重定向、病毒和特洛伊木
  7. Socket option to the socket, such that the port can be reused immediately

    套接字選項,以便可以上重用。
  8. The article focuses on the five important technologies we used, including the router detection technology, the os identification technology, the port identification technology, the trojan horse technology and the ports - reflection technology

    本文重點討論了系統在實現過程中採用的目標網路尋徑技術、操作系統類型識別技術、特定識別法技術、木技術、反彈技術等關鍵性技術。
分享友人