dos-a-dos 中文意思是什麼

dos-a-dos 解釋
合裝本
  • dos : 版本
  • a : an 用在以母音音素開始的詞前〉 indefinite art 1 〈普通可數名詞第一次提到時,冠以不定冠詞主要表示類...
  1. In soft, abnegating bald dos operating system, we will realize testing and displaying in real time on windows operating system. in hardware, we use computer as postposition cpu, monolithic processor as front cpu, and link them into simple network. in this way, we will realize a kind of distributing testing system providing with high precision and remote controlled ability

    軟體上,屏棄枯燥的D O S界面,使用windows平臺實現實時性很高的實測實顯任務;硬體上,將計算機作為上位機,單片機作下位機,連成簡單的網路,實現高精度的、具有遠程控制能力的一種分散式測試系統。
  2. Then, the paper present a protocol misusage ids in application layer based on markov chain, and obtain the following results after test : the system can have good effection on detecting the probe packet, dos attack and novelty attack. the system can overcome part of disadvantages in traditional intrusion detection system, and adapt requirements with different network. the experiment shows that the system can improve the detection accuracy rate, reduce the false negatives probability

    通過對檢測系統的測試分析,系統對掃描探測報文、 dos攻擊報文和新的攻擊報文等有較好的檢測率。基於馬爾可夫鏈建立的網路異常檢測系統可以克服傳統入侵檢測系統的部分缺陷,能夠適應不同網路環境的要求,同時也有效提高了系統的檢測能力和檢測效率,降低了誤報率。
  3. Like dos passos he did write a trilogy.

    他像道斯帕索斯那樣寫過一部三部曲。
  4. Denial of service attacks ( dos ) use a networked computer or computers to bombard another networked computer or server communication traffic with the intention of disrupting or rendering the latter inoperable, or enabling unauthorized access

    妨礙信息傳送的攻擊是利用一部或多部聯網電腦連珠炮發地向另一部聯網電腦或伺服器傳送大量資料,意圖擾亂其運作、令其無法運作或擅自接達。
  5. Detecting a p2p dos attack is easy ; defending against it is difficult

    P2p拒絕服務攻擊檢測容易,防禦困難。
  6. Such control can be realized in case where a atom interact with photonic band gap matericals when the atom is placed in photonic crystals whose density of modes is dramatically different from that of free space vacuum. it was known that control could be achieved by varying the frequency ( which leads to the changes of the relative position of the upper levels from the forbidden gap ) or by varying the photonic density of modes ( dos ) or by varying the intial atomic state

    由於光子晶體具有不同於真空中的光子態密度,原子和光子帶隙材料便發生相互作用,這樣便可以控制原子的自發輻射。改變原子上能級與光子禁帶邊緣的相對位置、材料中的光子態密度或原子初態都可以控制原子的自發輻射。
  7. Fullname : a context - menu add - on that produces a dos box with the full path to the target file

    這是一個外加的附加上下文菜單,可以生成一個帶有目標文件完整路徑的dos對話框。
  8. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  9. Apparently, whenever you create or resize a partition for dos use, it s a good idea to fill the first few sectors with zeros

    顯然,當您為dos新建分區或者改動分區大小時,最好把前面幾個扇區全部清零。
  10. This ran on an operating system called dos, produced by a then small company named microsoft

    這種電腦採用了一種被稱為磁盤操作系統( dos )的工作程序,而這種程序是由當時規模不大的微軟公司生產的。
  11. In advanced dos, a 16 bit binary value created by the system that identifies a drive, directory and file so that the file can is found and opened

    在高級磁盤操作系統中,由系統建立的一種16位二進制數值,用於標識驅動器、目錄和文件,使得該文件可以找到並打開。
  12. Employing diversity - oriented synthesis ( dos ) to construct skeletally complex natural product - like libraries and using it in the studies of chemical biology and lead discovery is becoming a tendency

    用多樣性導向合成方法建立骨架多樣、構造復雜、立體化學多樣性的「類天然產物」化合物庫進行生物學相關研究,並以此為基礎發現藥物先導化合物正在成為一種趨勢。
  13. Nav triggers a dos using 100 % cpu for a very long time

    資產凈值板機一做使用100 %處理器作為非常長的時間。
  14. A brief talk on avoiding dos in the fundamental router structure

    淺談路由基礎結構免遭拒絕服務
  15. Chinese tourists can now travel to brazil without having to request a special visa, brazil ' s tourism minister, walfrido dos mares guia, told the magazine

    巴西旅遊部長沃爾弗里多?馬勒斯告訴雜志,目前中國遊客赴巴旅遊不再需要特別簽證。
  16. Does the ship have a process for receiving information from contracting governments requiring them to execute a dos with a port facility, and if so, please elaborate

    當締約國政府要求船舶向港口設施遞交保安聲明,船舶是否具有一套接收此類信息的程序?如果有的話,請詳細說明。
  17. Exits and returns a dos errorlevel value when an error occurs

    退出並返回一個dos errorlevel值。
  18. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算法的基礎上,著重研究了代數方法編碼反向追蹤信息的方案,該方案把追蹤重構問題當作多項式重構問題,使用代數編碼理論技術提供魯棒的傳送和重構方法,是dos攻擊過程中的反向追蹤問題的一種新的解決方法; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方法作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  19. To use it, you must run it in a dos prompt window, specifying the complete path of the com component you want to import

    要使用它,必須在dos提示窗口中運行它,指定想導入的com組件的完整路徑。
  20. Displays information about a dos command

    顯示dos命令的幫助信息。
分享友人