配置協議 的英文怎麼說

中文拼音 [pèizhìxié]
配置協議 英文
c configuration protocol
  • : Ⅰ動詞1 (兩性結合) join in marriage 2 (使動物交配) mate (animals) 3 (按適當的標準或比例加以...
  • : 動詞1. (擱; 放) place; put; lay 2. (設立; 布置) set up; establish; arrange; fix up 3. (購置) buy; purchase
  • : Ⅰ形容詞(共同) joint; common Ⅱ動詞(協助) assist; help; aid
  • : Ⅰ名詞(意見; 言論) opinion; view Ⅱ動詞(商議) discuss; exchange views on; talk over
  • 配置 : dispose (troops, etc. ); deploy; allocation; collocation; configuration; positioning; allotment
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了防火墻的相關技術基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路數據包攔截技術和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  2. Seller may also at its election terminate this agreement upon written notice to member in the event member ( i ) fails to observe or perform any other provisions of this agreement to be observed or performed by member and such failure continues for a period of thirty ( 30 ) days after written notice from seller, or ( ii ) becomes insolvent or unable to pay its debts as they mature, or files a voluntary petition or suffers any involuntary petition to be filed against it under any provision of any bankruptcy or insolvency statute, or makes an assignment for the benefit of creditors, or applies for or consents to the appointment of a receiver or custodian for its assets, or any attachment or garnishment is initiated or filed against its property, or ( iii ) dissolves, liquidates, consolidates ( other than a consolidation in which member is the surviving entity ), or ceases to conduct operations

    有下列事件賣方可以選擇終止( 1 )賣方發出書面通知30天後,應該遵守或者履行的成員不能遵守或者履行的任何有關規定; ( 2 )到期破產或者無力償還債務,或者在有關破產或者破產條例規定下自願申請或者遭受強制立案,或者作一個債主賠償費的分,或者申請或者允許他的資產接受者或者保密人員,任何附件或者壓扣件創或者財產立案; ( 3 )解散,破產,合併(在合併中成員是存在的獨體) ,或者終止商品營運。
  3. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統、帳戶設及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在、管理和應用方面提供了基本的框架。
  4. Secondly, the composition and function of expander board is introduced, the paper describes a detail developing process of selecting component, design interface circuit, protract pcb with protel and design pci interface logic and user ' s logic. with ahdl and max + plus. in addition this paper discusses how to debug pci board, and give the simulation waveform and the result of debug. on the base of all functions is ture, this paper introduce the config registers and memory of bu - 61580, realize the interrupt function and communication based on mil - std - 1553b

    首先分析了擴展板的組成、功能,對pci介面邏輯和擴展板的內部邏輯進行詳細設計,並根據其資源要求進行器件選擇,然後使用protel工具進行電路板的製作。另外,本文還介紹了擴展板的調試方法,給出了邏輯模擬波形和調試結果。在此基礎上,本文闡述了晶元的方法,實現了1553b通訊擴展板間的通訊及中斷功能,達到了開發技術指標。
  5. It includes chip selection, schematic circuit design, cpu selection and configuration, startup of the system, selection and configuration of embedded operation system, selection and configuration of tcp / ip software. it also describes some driver programming techniques of network controller. part 3 ( chapter 5 and 6 ) briefly introduces encryption technology and the ipsec protocol system, including architecture, mode, security association, security policy, implementation mode, processing of in / out packet, esp ( encapsulation security payload ), ah ( authentication header ), ike ( internet key exchange ) etc. the security requirements of embedded - networking is also analyzed

    本文首先探討了嵌入式網路的原理和設計要求,接著介紹了本文所開發的嵌入式系統的硬體平臺的設計(包括處理器的選擇與、存儲器的選擇和io設備的選用等) ,系統的啟動(包括bios和dos的啟動以及嵌入式操作系統vrtx的和引導) ,網路及其安全服務的實現(包括嵌入式棧usnet的選取、底層驅動程序的設計和安全ipsec的分析與實施) 。
  6. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路自身的脆弱性;主機、網路設備的是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  7. The protocol is not implemented or has not been configured

    未實現或未配置協議
  8. The protocol family is not implemented or has not been configured

    未實現或未配置協議族。
  9. It lets you enable server protocols, configure protocol options such as tcp ports, configure server services to start automatically, and configure client computers to connect in your preferred manner. this tool configures the more advanced connectivity elements but does not enable features

    使用它,您可以啟用服務器配置協議選項(例如tcp埠) ,將服務器服務為自動啟動,以及將客戶端計算機為以所需的方式連接。
  10. This paper puts forward a protocol of address auto - allocation based on multi - agent wsnmaap ( wireless sensor network multi - agents address allocation protocol ), which can improve expansibility and uniqueness

    本文提出了一種基於多代理的地址配置協議wsnmaap ( wirelesssensornetworkmulti - agentsaddressallocationprotocol ) ,能夠提高網路的可擴展性,並實現網內節點地址的唯一性。
  11. Theoretically, every user with access to the network could install a dhcp server to give out illegal ip numbers

    理論上,有網路的存取的每個用戶能安裝一個動態宿主配置協議服務器給出不合法的ip數字。
  12. Gets the dynamic host configuration protocol dhcp scope name

    獲取動態主機配置協議( dhcp )范圍名。
  13. Note that you can configure protocols and startup options here

    注意,在這里可以配置協議和啟動選項。
  14. Dhcp dynamic host configuration protocol

    動態主機配置協議
  15. Dynamic host configuration protocol dhcp

    動態主機配置協議
  16. Dynamic host configuration protocol

    動態主機配置協議
  17. You will also learn how to configure a protocol for your specific needs

    還將了解如何根據自己的特定需求來配置協議
  18. Class uses the dynamic host configuration protocol dhcp to locate the script

    類將使用動態主機配置協議( dhcp )定位該腳本。
  19. The dynamic host configuration protocol ( dhcp ) was designed to help ration ip addresses

    動態主機配置協議( dhcp )被設計幫助分ip位址。
  20. Specifies the amount of time remaining on the dynamic host configuration protocol dhcp lease for this ip address

    指定此ip地址的動態主機配置協議( dhcp )租約的剩餘時間量。
分享友人