firewall 中文意思是什麼

firewall 解釋
(拒黑客用的)防火墻〖軟體名
  1. Of all kinds village does an enterprise to should be mixed in civilian curtilage in the center ; ( should stay between 2 ) building have appropriate fire prevention span and fire prevention channel ; ( 3 ) abuts type farming curtilage every between due firewall ; ( when 4 ) builds bridal chamber house, should raise architectural fireproof grade, use the blame combustion housing materials such as ferroconcrete, brick, tile ; when decorating, reduce use bamboo, wood to wait as far as possible can burn material

    各類村辦企業應混在民宅當中; ( 2 )房屋之間應留有合適的防火間距和防火通道; ( 3 )毗連式農宅每戶之間應有防火墻; ( 4 )建造新房屋時,應提高建築的耐火等級,採用鋼筋混凝土、磚、瓦等非燃燒建築材料;裝修時,盡量減少使用竹、木等可燃材料。
  2. Which created a 121 mb bootable debian filesystem with vpn firewall router functionality. by removing documentation and compressing the root filesystem using the cloop kernel module, he was able to reduce the size to 27. 6 mb

    在刪除裏面的文檔文件,並使用cloop核心模塊kernel module壓縮之後,他成功地將系統縮減為27 . 6 mb 。
  3. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管規則、封裝數據、網上鄰居名字列表等數據的讀寫操作,從而很方便的根據控管規則實現了對網路封包的認證操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  4. Intrusion detection is an active technology for defense, supplies the complement for shortcoming of traditional security technology like firewall, cryptograph

    入侵檢測是一種主動防禦技術,它彌補了防火墻、信息加密等傳統安全技術的不足。
  5. Then it describes the software framework of the firewall system in data plane. the fifth chapter is about the dynamic packet filter ' s design and implementation. dynamic packet filtering technique greatly enhances packet filter ’ s efficiency and security

    第五章是動態包過濾模塊的設計與實現,包過濾是整個防火墻功能中最核心的部分,動態包過濾技術大大提高了包過濾的效率和安全性。
  6. Among many ways, firewall is the most effectual one

    在眾多安全措施中,防火墻首當其中。
  7. Netstealth successfully released a unique erotica - filtering firewall using gateway - transparent mode

    臨通科技成功研發出國內第一臺gateway穿透式網頁過濾色情防火墻
  8. To sum up, we provide a new powerful, extendible, user - defined firewall to satisfy different users

    總之,要為用戶提供一個可擴充、適應新網路安全要求、功能強大的新型防火墻。
  9. Why is internet so frangible ? after analyzing many events of network attacks and invalid intrusions, we found that the frangibility of internet is due to lack of the firewall to protect the network security

    造成internet網路不安全局面的原因很多,網路攻擊和非法入侵的手段也很多,但是究其根本原因,是缺乏一個能保證網路高度安全的防火墻。
  10. This paper primarily focuses on the design and implementation of the interactive mechanism between the guarder of ids and firewall system

    基於linux操作系統,本文主要完成了入侵檢測系統guarder及其與防火墻系統互動機制的設計與實現等工作。
  11. In the progress of formulate the module, many advanced technologies and methods, such as nat and vpn, are adopted. the impletion of module covers three kinds firewall module. this paper has special value on the research above electronic business security framework

    在設計過程中,運用了nat 、 vpn等先進的技術和方法,採用常用的三種防火墻模式(軟體防火墻、硬體防火墻和軟硬體相結合的方式) ,對模型中的主要模塊具體實現,最終建立一個結構合理、功能完善、經濟適用的防火墻系統。
  12. In - stat recent report shows the integrated security equipment market is on the point of fast development and will reach 3. 3 billion us dollars. the integrated security equipment is a small box with several secure function including firewall, vpn, defense to inbreak and kill computer virus

    In - stat近期報告,集成安全設備市場即將出來大幅增長,到2009年將達到33億美元,集成安全設備是一種具有各種安全功能的小盒。這些功能包括防火墻與vpn 、入侵防護以及殺毒抗毒功能,一些產品可能還帶有內容過濾、反垃圾郵件以及防木馬功能。
  13. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  14. ( 6 ) after working we pose two hypothesis of migrate : one is " firewall avoid hypothesis ", another is " habitat optimization hypothesis ". ( 7 ) fe have discovered phoenicurus crythrogaster, prunella fulvescen. < ;, carduelis horneianni * etberiza citrine ] la and seiccrcus castaniceps. they are all new distribution in heilongjiang province

    ( 6 )通過實驗數據和相關資料的總結,提出關于遷徙鳥類的兩個假說「屏障迴避假說」和「棲址優選假說」 ( 7 )在2000 - 2002年的環志過程中,在西部的高峰鳥站獲得紅腹紅尾鴝( phoenicuruservthrogaster ) 、褐巖鷚( prunellafulvescens ) 、極北朱頂雀( carduelishornemanni ) 、黃? ( emherizacitrinella )和栗頭?鶯( soicercuscastaniceps )等5種黑龍江省鳥類新分佈種。
  15. Rusty russell s various linux firewall projects

    Rusty russell的一些防火墻項目
  16. The key to configuring a firewall is twofold

    配置一個防火墻的關鍵有兩個:
  17. Research on the design of firewall management system based on usm

    的防火墻管理系統的研究與設計
  18. For the protection of system resource, need to establish a active defence machine different from firewall and antivirus software to detection intrusion. by monitoring network or computer systematic development behavior feature intrusion detection system ( ids ) judge whether have invade take

    為保護系統資源,需要建立不同於防火墻和防病毒軟體的主動防禦機制檢測入侵。入侵檢測系統( intrusiondetectionsystem )就是監控網路或計算機系統的動態行為特徵並據此判斷是否有入侵的主動防禦措施。
  19. Which antivir version contains a firewall

    什麼紅傘版本包含有防火墻?
  20. This could be a web server, antivirus software, firewall, and so on

    該軟體可以是web服務器殺毒軟體防火墻等。
分享友人