port scan 中文意思是什麼

port scan 解釋
檢測埠掃描
  • port : n 1 港;港口;〈比喻〉避難港;避難所,休息處。2 (特指有海關的)港市;輸入港;通商口岸。3 機場,...
  • scan : vt ( nn )1 細看,細察;審視。2 〈口語〉大略一閱;瀏覽。3 按韻節念,按句調讀,標出(詩)的格律(...
  1. Standard test access port and boundary scan architecture

    標準測試存取口及邊界掃描體系結構
  2. In this paper, we combine the standard modules realize the boundary scan of estarl and also expand it to the test of internal circuit. this structure can save the i / o port of the chip and simplify the testing program

    本文結合標準模塊設計實現了estar1的邊界掃描結構,並進行了擴展,應用到晶元內部測試,節約了測試i / o口消耗,簡化了測試過程。
  3. Test access port and boundary - scan architecture

    測試存取口及邊界掃描結構
  4. On the other hand, boundary - scan technique intelligent fault diagnostic method was applied to practice. for most digital system, devices with boundary - scan architecture are broadly used. only using four line or five line to connect pc parallel port with cut tap ( test access port ), all the ptvs can be loaded to cut and all homologous prvs can be taken back to intelligent fault diagnosis system

    至於本文採用邊界掃描測試故障診斷技術,是考慮到本系統的通用性和簡潔性,因為對于大多數數字系統而言,具有邊界掃描結構的器件己廣泛應用,本文只需4條或5條信號線就能將pc機和被測邊界掃描電路連接起來,由此極大地簡化了智能故障診斷系統中為實現ptvs加載和prvs獲取而專門設計的介面板電路。
  5. The article highlights the implementation of how to detect the route to an aimed intranet by traceroute, how to determine the operating system by the tcp / ip stacks fingerprints, how to find the users information of the common os, how to realize the port scan by multi - thread, how to find the vulnerabilities of a terminal, and how to control a remote system by the trojan horse

    文章還詳細介紹了如何利用traceroute和源路由的traceroute探測到達目標網路的路徑;如何利用常規方法和tcp ip協議棧指紋特徵來識別操作系統類型;如何探測常見操作系統的用戶信息;如何利用多線程實現埠掃描;如何發現系統中與用戶、服務相關的漏洞缺陷;如何利用木馬技術來實現遠程控制等。
  6. The system can scan the wideband frequency 、 lock the frequency of receiving data and convert the if signal to digital data timely. directly sampled data by a / d or saved data by sdram ( when signal speed is too high ) can be transmitted to pc by usb2. 0 or to dsp by link port in order to complete the modulation detecting and intercepting of signals

    信號經高速a / d變換可以實時或經sdram緩沖后(當采樣速率過高時)由usb2 . 0總線傳入pc或由linkport傳入後端雙dsp綜合信號處理板進行調制識別處理(或接收由雙dsp信號處理完的數據並傳入pc機完成後續運算處理) ,完成無線電監測。
  7. This structure not only achieves the purpose of hardware logic partition but also makes it convenient for the generation of test stimulus, fault simulation, and online debugging. furthermore, we make internal scan share the test access port, so the pin ’ s cost which brings for test is reduced

    此外為減少晶元引腳開銷,我們還把內部掃描和邊界掃描集成在一起,使其共用測試引腳,降低了因測試而帶來的晶元引腳開銷。
  8. Firstly, the interrelated knowledge about network security vulnerability is introduced in this thesis, include definition, cause of formation, character and attribute, sort and detecting method. different kinds of skills and characteristics of port - scan technique are analyzed and compared in this thesis. then, the virtues and defects of three kinds of fingerprint technique of os - detect are also analyzed and compared

    本論文首先介紹了網路安全漏洞的相關知識,包括漏洞的定義、成因、特徵和屬性、分類及檢測方法,對各種埠掃描技術及其特點進行了分析和比較,介紹了三種探測操作系統的指紋技術,並分析了它們的優缺點。
  9. A 、 source port : set the port to use as the source during a port scan

    源埠:設置一個所使用埠直到一個埠被掃描。
  10. The simplest form of a tcp port scan is to open a connection to all ports on a host

    Tcp埠掃描的最簡單形式是打開一個到主機所有埠的連接。
  11. " port scan " means show whether a port is active or not by scan every ports one by one

    通過對埠的掃描,就可以得到任何一個系統都開了哪些埠,也就是提供了哪些服務。
  12. Finally, the thesis analyzes address scan, port scan, operate system identify etc. to find what protocol to be used by the attacker in the information collections stage, and designs some program to deceive the attacker. also, in this section the style of honeypot, and the security of honeypot, including two designs about how to abduct the intrusion to the honeypot, the nat ( network address translation ) technique and the proxy technique will be discussed

    在第三部分,分析地址掃描、埠掃描、操作系統識別等信息收集階段的攻擊的原理和所利用的協議,以及所採用的攻擊手段,詳細的論述對地址掃描攻擊的欺騙、對埠掃描攻擊的欺騙、對操作系統識別攻擊對欺騙的設計與實現。
  13. Secondly, it can detect opened ports on the basis of results of the first port - scan, and get the information of service and version of these opened ports. thirdly, through many kinds of detecting ways, it can get the os - fingerprints of tcp / ip protocol stack of the destination computer, and guess the faraway operation system exactly. at last, taking cve ( common vulnerabilities and exposures ) as the standard, a more practical vulnerability database by combining the structures of two large - scale oversea vulnerability databases is designed

    設計開發的網路漏洞探測系統具有較強的綜合性能,能夠提供多種埠掃描技術,在第一次掃描結果的基礎上對開放的埠進行第二次探測,得到開放的埠的服務和版本信息,通過多種探測方法獲得目標主機的tcp / ip協議棧指紋信息、較準確的推測出遠程操作系統,並以cve ( commonvulnerabilitiesandexposures )為標準,結合國外兩個大型漏洞數據庫的結構,設計了較實用的漏洞數據庫。
分享友人