埠掃描 的英文怎麼說

中文拼音 [sǎomiáo]
埠掃描 英文
port scan
  • : 名詞1. (碼頭) pier; port; wharf; jetty 2. (有碼頭的城鎮) port city3. (商埠) commercial port
  • : 掃構詞成分。
  • : 動詞1. (照底樣畫) copy; depict; trace 2. (在原來顏色淡或需改正之處重復塗抹) retouch; touch up
  1. It is very useful and necessary to research the ports scan technology for cope with net inbreak effectively

    為了有效地對付網路入侵行為,對埠掃描進行研究是非常有益和必要的。
  2. The dvd recent three stars face toes the chinese consumer, releases the world the section 1 to make to order for high and clear degree television to broadcast the, namely three stars the dvd - hd938, it can pass the general port to realize the pal system the type bottom to is every other line with the line painting quality for scanning outputting 576 is 576 p, can emerging the export surplus commonly even pal system type line scanning ; but the adoption image strengthen the technique to ask for help the dvi port to can more realizes 1080 is 720s p exportation result. more important, pass to see the format conversion of the, and the can of high and clear degree television is produceding can attain of distinguish the rate. 1080 is 720 p

    慧聰影音商務網最近三星面向中國消費者,推出了世界第一款為高清晰度電視定製的dvd播放器,即三星dvd - hd938 ,它可以通過一般實現pal制式下隔行和逐行輸出576i 576p ,能夠展現出超過普通甚至pal制式逐行的畫質而採用影像增強技術藉助dvi更可以實現1080i 720p輸出效果。更重要的是,通過視頻的格式轉換,可以產生高清晰度電視所能達到的解析度1080i 720p 。
  3. The article highlights the implementation of how to detect the route to an aimed intranet by traceroute, how to determine the operating system by the tcp / ip stacks fingerprints, how to find the users information of the common os, how to realize the port scan by multi - thread, how to find the vulnerabilities of a terminal, and how to control a remote system by the trojan horse

    文章還詳細介紹了如何利用traceroute和源路由的traceroute探測到達目標網路的路徑;如何利用常規方法和tcp ip協議棧指紋特徵來識別操作系統類型;如何探測常見操作系統的用戶信息;如何利用多線程實現埠掃描;如何發現系統中與用戶、服務相關的漏洞缺陷;如何利用木馬技術來實現遠程控制等。
  4. Via ports scanning, it can gained many useful information, also find out system security hole

    通過埠掃描,可以得到許多有用的信息,從而發現系統的安全漏洞。
  5. Bitcomet is a p2p file - sharing freeware fully compatible with bittorrent, which is one of the most popular p2p protocol designed for high - speed distribution of 100mb or gb sized files. bitcomet is a powerful, clean, fast, and easy - to - use bittorrent client. it supports simultaneous downloads, download queue, selected downloads in torrent package, fast - resume, chatting, disk cache, speed limits, port mapping, proxy, ip - filter, etc

    Bitcomet是基於bittorrent協議的高效p2p文件分享免費軟體(俗稱bt下載客戶端) ,支持多任務下載,文件有選擇的下載;磁盤緩存,減小對硬盤的損傷;只需一個監聽,方便手工防火墻和nat / router配置;在windowsxp下能自動配置支持upnp的nat和xp防火墻,續傳做種免,速度限制等多項實用功能,以及自然方便的使用界面。
  6. As most scanners are not user friendly, and are also tied to a spec ific pc in the office, this network scanner allows the user to use the fax machine to scan the document, enter his own extension number, and the scanned document will automatically be routed to his own email inbox

    多功能版巧妙的功能為用戶提供了更多的功能選擇,可以將紙面文檔手寫簽名圖形等信息快速地通過傳真服務器發送出去。多功能版提供單個傳真,收發傳真速率可達20份小時。
  7. From the view point of the foundation of dft ( which includes the testable measure of gate - level circuits, the testable and controllable measure of functional - level, the flow and methodology of dft and so on ), the author introduce some common testing technology such as scan and bist in modern times. especially the boundary scan technology has been widely adopted in the dft of vlsi. with the special controller, the testing vector could be scanned to the corresponding ports of inner cores from the testing input ports, and the response could also be shifted to the testing output ports

    本文從可測性設計的基礎理論出發(包括門級電路的可測性測度、功能級上的可測性和可控性、可測性設計的流程和方法等) ,介紹了現代常用的可測性技術,比如:技術、內嵌自測試技術等,特別是邊緣技術已經廣泛地應用到vlsi的可測性設計之中,它通過特定的控制器,從相應的測試輸入將測試向量至芯核所對應的管腳,再將結果從相應的測試輸出出。
  8. Firstly, the interrelated knowledge about network security vulnerability is introduced in this thesis, include definition, cause of formation, character and attribute, sort and detecting method. different kinds of skills and characteristics of port - scan technique are analyzed and compared in this thesis. then, the virtues and defects of three kinds of fingerprint technique of os - detect are also analyzed and compared

    本論文首先介紹了網路安全漏洞的相關知識,包括漏洞的定義、成因、特徵和屬性、分類及檢測方法,對各種埠掃描技術及其特點進行了分析和比較,介紹了三種探測操作系統的指紋技術,並分析了它們的優缺點。
  9. Port scanning is used to check whether ports on a given host are open

    埠掃描用來檢查給定主機上的是否打開。
  10. Ports scan also is the common way to search target computer by hackers

    埠掃描也是黑客搜集目標主機信息的一種常用方法。
  11. The simplest form of a tcp port scan is to open a connection to all ports on a host

    Tcp埠掃描的最簡單形式是打開一個到主機所有的連接。
  12. In this section, i ll discuss a form of port scanning used by attackers that may not be detected so easily by the target host

    在本節中,我將討論攻擊者所使用的一種埠掃描形式,它不會被目標主機輕易地偵測到。
  13. The thesis describes the common network attack types as well as research condition of network intruding inspection system, and analyses the basic theory of network data packets transfer on account of protocol tcp / ip, and finally discusses network safe system framework on account of p2drr, which takes linux operating system as the development platform, has c as the development tool, uses libpcap as a tool to capture network data packets, and decode according to various protocols, along with the preprocess function on account of such inspection as i / o port scanning, and analyses the misuse inspecting technology deeply on account of key word mode matching, and studies theory abnormal inspecting system on account of data mining. the inspecting and output function of the whole system is designed as mold in plug - mechanism, so as to transplant and extend the system

    論文介紹了網路常見的攻擊模式及網路入侵檢測系統的研究現狀,分析了基於tcp ip協議的網路數據包傳輸的基本原理,討論了基於p2drr模型的網路安全系統架構,本系統以linux操作系統為開發平臺,採用c作為開發工具,利用1ibpcap庫為工具捕獲網路數據包,並根據不同協議實現報文的解碼,實現了基於埠掃描等檢測的預處理功能,對基於關鍵字模式匹配的誤用檢測技術作了深入地分析,並對基於數據挖掘的異常檢測系統進行了探討,整個系統的檢測與輸出功能均以插件機制設計成模塊,以便系統的移植和擴展。
  14. In this paper, technology of ddos and design of d - gun are introduced. totally it is divided into six parts, the first of part is introduction. the second part is interrelated technology about d - gun, including ddos principium, ports - scan, buffer overflow attack, backdoor and raw socket

    第二部分介紹相關技術基礎,主要討論了ddos原理和實現ddos自動傳播執行所需具備的相關技術,包括埠掃描技術、遠程入侵技術、后門技術,以及tcp / ip協議應用中的原始套接字。
  15. It may get a lots of useful information by scan target computer ' s ports

    對目標計算機進行埠掃描,能得到許多有用的信息。
  16. There is many scan ways, like manual or automatic by scan software

    進行的方法很多,可以是手工進行,也可以用埠掃描軟體進行。
  17. In misuse mode, modules such as port - scanning, sniffer, and ip spoofing have been implemented

    在誤用模式中系統設計了dos攻擊、 spoofing攻擊、網路欺騙、嗅探檢測、埠掃描模塊。
  18. That is to say, an entrance will confront to all users, any users can connect this server from client computer through this port

    埠掃描即通過一些方法檢測到一臺主機的一段特定是否提供相應的服務。
  19. Finally, the thesis analyzes address scan, port scan, operate system identify etc. to find what protocol to be used by the attacker in the information collections stage, and designs some program to deceive the attacker. also, in this section the style of honeypot, and the security of honeypot, including two designs about how to abduct the intrusion to the honeypot, the nat ( network address translation ) technique and the proxy technique will be discussed

    在第三部分,分析地址埠掃描、操作系統識別等信息收集階段的攻擊的原理和所利用的協議,以及所採用的攻擊手段,詳細的論述對地址攻擊的欺騙、對埠掃描攻擊的欺騙、對操作系統識別攻擊對欺騙的設計與實現。
  20. Secondly, it can detect opened ports on the basis of results of the first port - scan, and get the information of service and version of these opened ports. thirdly, through many kinds of detecting ways, it can get the os - fingerprints of tcp / ip protocol stack of the destination computer, and guess the faraway operation system exactly. at last, taking cve ( common vulnerabilities and exposures ) as the standard, a more practical vulnerability database by combining the structures of two large - scale oversea vulnerability databases is designed

    設計開發的網路漏洞探測系統具有較強的綜合性能,能夠提供多種埠掃描技術,在第一次結果的基礎上對開放的進行第二次探測,得到開放的的服務和版本信息,通過多種探測方法獲得目標主機的tcp / ip協議棧指紋信息、較準確的推測出遠程操作系統,並以cve ( commonvulnerabilitiesandexposures )為標準,結合國外兩個大型漏洞數據庫的結構,設計了較實用的漏洞數據庫。
分享友人