攔截程序 的英文怎麼說

中文拼音 [lánjiéchéng]
攔截程序 英文
hook procedure
  • : 動詞(不讓通過; 阻擋) bar; block; hinder; obstruct; hold back
  • : 名詞1 (規章; 法式) rule; regulation 2 (進度; 程序) order; procedure 3 (路途; 一段路) journe...
  • 攔截 : intercept
  • 程序 : 1 (進行次序) order; procedure; course; sequence; schedule; ground rule; routing process 2 [自動...
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路數據包技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流
  2. From software, a resident program is usually used to hold up the data of software protection lock, but mcamos technology s software protection lock adopts multiple encode processes, which can produce large numbers of data that makes the interception of software decoding unsuccessfully

    軟體方式主要是利用常駐軟體保護鎖的數據, ?揚科技之軟體保護鎖採用多重編碼方式,產生大量的數據讓軟體無法順利的解讀。
  3. This download updates the. net framework 1. 1 service pack 1 to work correctly with user access control turned on and prevents the user from getting a securityexception with exception message text hook cannot be created

    Net framework 1 . 1 service pack 1 ,可與啟用的使用者存取控制user access control一起正確運作,並防止使用者遇到錯誤訊息為無法建立攔截程序的安全性例外狀況securityexception 。
  4. The detection algorithms for low snr point target, the ballistic target signature analysis, the dynamical target recognition algorithms on seeker are systematically studied in this thesis. the detection algorithm for the low snr point target in image sequences and its performance is studied

    本文以動能器的探測器接收到的光學列圖像為處理對象,系統研究了其中的點目標的檢測、特徵分析與提取方法以及識別(威脅度評估)演算法問題,具體研究內容包括以下三個方面。
  5. Ndis intermediate driver works on the data link layer, which helps enlarge the filter range of data package, so not only ip package but also other kinds of package are intercepted, since data package of data link layer is frame

    Ndis中間驅動工作在數據鏈路層,的數據包是數據鏈路幀。這樣,不但可以ip數據包而且還能非ip數據包,擴大了數據包過濾的范圍。
  6. In distributed applications, even a high degree of control over serialization might not prevent malicious clients from intercepting the communication and using it in some way, even if that is merely showing data to others

    在分散式應用中,即使是對列化進行高度控制,仍可能無法防止惡意客戶端通信,並以某種方式使用該通信(即使僅僅顯示數據) 。
  7. You will not input or upload to the web site any information that may contain viruses, trojan horses, worms, time bombs or other computer programming routines that are intended to damage, interfere with, intercept or expropriate any system, the web site or information or that infringes the intellectual property rights of another

    不得向本網站輸入或上載任何含有病毒、特洛伊、蠕蟲、定時炸彈或其它意圖損害、干擾、或侵佔計算機系統、本網站或任何損害他人知識產權的計算機路徑。
分享友人