棧掃描 的英文怎麼說

中文拼音 [zhànsǎomiáo]
棧掃描 英文
stack scan
  • : 名詞1 (養牲畜的柵欄) shed; pen 2 (棧道) a plank road built on sides of cliffs for army3 (棧...
  • : 掃構詞成分。
  • : 動詞1. (照底樣畫) copy; depict; trace 2. (在原來顏色淡或需改正之處重復塗抹) retouch; touch up
  1. Employing idef to establish framework, dynamitic and functional models, the system also designs a non - back shifting search arithmetic for double - scanning buffer zone and a double - track structure for searching process. according to the characteristics of e - mail control and electronic documentary mining technology, bayes classifiers are made to strengthen the electronic control system in which electronic documentary mining technology is used ; and moreover the double systematic structure of c / s & b / s is constructor with the presence of some function relationships in mining process as well as systematic mining and program handling

    系統採用i _ 2def方法建立了結構模型、動態模型和功能模型;設計了雙緩沖區的無回溯搜索演算法及搜索過程的雙結構;根據電子郵件監控系統和電子文檔挖掘技術的特徵,設計了bayes分類器並使用了增強型方法,提出了一種運用電子文檔挖掘技術的電子郵件監控系統;構建了c / s和b / s雙重體系結構;並給出了挖掘過程的部分函數調用關系及系統挖掘的處理過程、部分處理程序。
  2. The article highlights the implementation of how to detect the route to an aimed intranet by traceroute, how to determine the operating system by the tcp / ip stacks fingerprints, how to find the users information of the common os, how to realize the port scan by multi - thread, how to find the vulnerabilities of a terminal, and how to control a remote system by the trojan horse

    文章還詳細介紹了如何利用traceroute和源路由的traceroute探測到達目標網路的路徑;如何利用常規方法和tcp ip協議指紋特徵來識別操作系統類型;如何探測常見操作系統的用戶信息;如何利用多線程實現埠;如何發現系統中與用戶、服務相關的漏洞缺陷;如何利用木馬技術來實現遠程控制等。
  3. Secondly, it can detect opened ports on the basis of results of the first port - scan, and get the information of service and version of these opened ports. thirdly, through many kinds of detecting ways, it can get the os - fingerprints of tcp / ip protocol stack of the destination computer, and guess the faraway operation system exactly. at last, taking cve ( common vulnerabilities and exposures ) as the standard, a more practical vulnerability database by combining the structures of two large - scale oversea vulnerability databases is designed

    設計開發的網路漏洞探測系統具有較強的綜合性能,能夠提供多種埠技術,在第一次結果的基礎上對開放的埠進行第二次探測,得到開放的埠的服務和版本信息,通過多種探測方法獲得目標主機的tcp / ip協議指紋信息、較準確的推測出遠程操作系統,並以cve ( commonvulnerabilitiesandexposures )為標準,結合國外兩個大型漏洞數據庫的結構,設計了較實用的漏洞數據庫。
分享友人