防火墻和代理 的英文怎麼說

中文拼音 [fánghuǒdài]
防火墻和代理 英文
firewalis and proxies
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : fire
  • : 名詞(磚、石等築成的屏障或外圍) wall
  • : 和動詞(在粉狀物中加液體攪拌或揉弄使有黏性) mix (powder) with water, etc. : 和點兒灰泥 prepare some plaster
  • : Ⅰ動詞1 (代替) take the place of; be in place of 2 (代理) act on behalf of; acting Ⅱ名詞1 (歷...
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • 防火 : fire prevention; fire safety; fireproof
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了的相關技術基礎,分析了透明作為一種先進易用的技術的原,闡述了linux操作系統網路數據包攔截技術http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范具體的工作流程。接著敘述了本透明服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、服務實現、 gui配置管程序以及過濾功能(如url過濾、命令過濾日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構實現流程。
  2. This firewall system includes five modules : filter manage, record route, application proxy, scan defense and log record

    系統是由包過濾管模塊、路由記錄模塊、應用模塊、掃描禦模塊日誌記錄模塊構成。
  3. You can adapt the hierarchy approach, for instance, to allow the enterprise firewall administrator to communicate directly with a proxy user bypassing the super and local administrators

    您可以修改層次通道,例如,允許企業員越過超級管本地管員而直接與用戶通信。
  4. Quickly test multiple port and protocol combinations to bypass firewalls and proxies and choose the fastest connection

    快速測試多埠協議的結合,穿越防火墻和代理服務器,選擇最快連接。
  5. Because the maximum amount can vary with different firewall and proxy implementations, large hidden fields can be sporadically problematic

    因為最大數量會隨所採用的防火墻和代理的不同而不同,較大的隱藏域可能會出現偶發性問題。
  6. Because the maximum amount can vary with different firewall and proxy implementations, large hidden fields can cause sporadic problems

    由於最大數量會隨所採用的防火墻和代理的不同而不同,因此大量隱藏欄位可能會導致偶發性問題。
  7. Because the maximum amount can vary with different firewall and proxy implementations, large hidden fields can be sporadically problematic. for more information see

    因為最大數量會隨所採用的防火墻和代理的不同而不同,較大的隱藏域可能會出現偶發性問題。
  8. Because the maximum amount of data allowed in hidden fields can vary with different firewall and proxy implementations, large hidden fields can cause unpredictable behavior

    由於隱藏欄位中允許的最大數據量隨所採用的防火墻和代理的不同而異,因此較大的隱藏欄位會導致發生不可預知的行為。
  9. This system, the combination of adsl and embedded technology, consists of hardware and software, the paper will describe the platform and firewall as well as proxy, the transplant of linux and the encode and decode in the physical layer is beyond this paper. the gateway is a especial - purpose computer and based on x86 architecture for software - compliance with pc

    該系統是adsl技術嵌入式技術相結合的產物,按照常規分由硬體軟體組成,本文將講述硬體平臺的設計建立過程,以及軟體當中的防火墻和代理訪問設計實現過程,至於嵌入式linux操作系統的移植層具體的編解碼都將不涉及。
  10. The firewall and proxy, parts of the software of the system, based on the ip chians, is a packet filtering firewall. first, it provides transparent - proxy to the user on the user ' s lan via ip forwarding and ip masquerading in which all the hosts share on ip address to access the internet. and then the firewall provides protection to the host behind it via ip filtering preventing invalid access such as ip spoofing. after that, the firewall can let the hosts behind it to provide internet services to the outside hosts via ip port forwarding, for example www and smtp

    左巴八碩士學住論文v銳示》 a引工r 」 snie引s該解決方案的軟體部分? ?網關的防火墻和代理功能,由linux提供的ipchans建立的包過慮實現,它首先通過ip轉發ip偽裝實現透明,讓用戶內部網的所有主機共享一個ip地址對internet進行訪問,同時,通過阻止ip欺騙等非法訪問,為用戶的內部網提供一定的安全保障。
  11. The author introduces hardware and software development platform of intel ixp1200. he puts forward tcp relay module, arp proxy module and webui module etc. he also develops the best allocation way of micro - engine through three experiments. in the end, the conclusion is made on the whole project and gives an expectation for the development of network security devices in. the future

    本文從網路安全現狀及np應用角度出發,介紹了intel網路處器硬體軟體開發平臺,設計了多層并行結構、剖析了基本工作模式,實現了tcp中繼、 arp透明模式、 webui控制界面等關鍵模塊,並通過三個性能對比實驗,確定了最佳微引擎分配方式,最後完成了netchannel5000系列的研製工作,並展望了未來的發展方向。
  12. After studying many relative books and combining with my own understanding, i write this thesis. this thesis includes : the meaning & characteristics of network security ; threatening & attacking that the computer network faces ; general measures to protect network security ; brief introduction, classification and relationships to network security technology ; general description and key technology of fire proofing ( package filtrate technology, delegating technology, nat technology ) ; the constructive type of fire proofing ( filter route ware, multi - port host computer, host computer screen, subnet screen etc. ) ; the examples of the constructive application of fire proofing ; the future developing trend of fire proofing technology and products, etc. so, net security and fireproof technology are the title of this paper

    綜上原因,本文將「網路安全」技術」組在一起形成本論文題目。本論文是筆者在研讀許多相關文獻並結合自己解基礎上寫成的,主要內容為:網路安全含義及特徵、計算機網路所面臨的威脅攻擊、保障網路安全的一般措施;網路安全技術的簡介、分類及關系;概論、關鍵技術(包過濾技術、技術、 nat技術等) ;的構建類型(過濾路由器、多埠主機、主機屏蔽、子網屏蔽等) ;的構建應用舉例;技術的未來發展趨勢及產品等。
  13. ( 2 ) researching on the method of defending data security and the architectures of computer network firewall, and constructing the prototype of cf firewall. ( 3 ) researching on the packet filter technology in computer network firewall, designing and realizing cf _ firewall packet filter router. ( 4 ) researching on the proxy technology in computer network firewall, discussing the applications of proxy technology in computer network, designing and realizing cf _ firewall http proxy server and cf _ firewall ftp proxy server

    主要研究內容如下: ( 1 )提出並討論協同設計網路安全問題,指出進行協同設計網路安全環境方面研究的必要性; ( 2 )研究網路安全範機制網路體系結構,建立cf _ firewall網路原型系統; ( 3 )研究網路包過濾技術,設計並實現cf _ firewall過濾路由器; ( 4 )研究網路應用技術,討論技術的實用性,設計並實現cf _ firewallhttp服務器cf _ firewallftp服務器; ( 5 )研究反向技術vpn技術在建立協同設計網路安全環境里的作用,以指導具體的協同設計網路安全環境的方案選型。
  14. Finally, system software exploiture is based on kingview 6. 5 and we used three - dimensional sculpt to simulate locale equipments and realized dynamic simulation, real - time display and memory, historic query, upon or under parameter alarm display, alarm query and historic report forms print, and we can realize internet management and view directly etc. according to industry ethernet setting, firewall ’ s install and high - speed transmission it can satisfy system ’ s security, credibility and real - time in coal mine which is new scada system of mine monitor and control warming system

    最後,利用「組態王」軟體進行系統開發,生動的描繪現場設備並動態模擬設備工作,實現實時數據顯示與存儲,歷史數據查詢列印,超限或低限報警,報警查詢,同時能實現網內權限管,局域網內直接訪問數據等。通過工業以太網路軟體設置系統的安裝以及高速傳輸質量能使系統在實時性、安全性可靠性等方面滿足煤礦實時監測系統應用的要求,該系統可以說是新一scada煤礦實時監測監控系統。
  15. The server, web services producer : this is a web server, typically behind firewalls and or proxy gateways

    服務器, web服務生產者:它是一個web服務器,通常位於/或網關的後面。
  16. The text commenced from the technique background of the firewall, which introduced the ixa architecture of the network processor first, including the total architecture characteristics, internal technique, hardware etc. ; then described the whole hardware structure and the software structure of the firewall, and development environment ; after that introduced the conception of network security and firewall technique, and gave analysis of characteristics of ipv6 protocol in detail ; with the firewall design immediately after at every step thorough, put forward the requirement of the ipv6 firewall project first, including design target, technique innovation, application situation etc., described software and hardware architecture of the whole system, the internal connection and total flow later on, elaborated function and realization of six modules of control plane, including vpn, packet filter core, application proxy, configuration and management, url filter, log, and referred to the database that the

    正文開始從的技術背景入手,先介紹了網路處器的ixa架構,包括總體的架構特點、內部技術、具體型號硬體等;接著描述了的整個硬體結構軟體結構,以及開發環境;然後介紹了網路安全的概念技術,並對ipv6協議特點作了較為詳細的分析;接著按著設計的步步深入,先提出了ipv6的需求,包括設計目標、技術創新點、應用場合等,隨后描述了系統整體的軟硬體結構、內部聯系及總體流程,而後著重詳細闡述上層vpn 、包過濾核心、應用、配置管、 url過濾、日誌六個控制平面子模塊的功能實現,並提及系統實現中使用的數據庫。
  17. The second part gives a design method of a typical application - campus network firewall. this part first analyses the network code of linux operation system, and builds a firewall system based on the packet filtering of linux with proxy and authentication. the purpose is not only protect the network security but also try to decrease expenses

    文中分析了linux操作系統的網路部分碼,並提出了基於linux包過濾為主體,結合技術身份認證技術的系統,目的在於以保障網路的安全為前提,同時又要盡可能的降低各種費用。
  18. Building the complex network firewall based on packet filter and proxy

    基於包過濾服務的復合型網路構建
  19. As a new firewall structure stream filter overcomes many defects of packet filter and application proxy firewall, together with both advantages improving the anti _ attack ability. base investigation, at present only " dongruan " com

    流過濾是技術中一個新概念,它表了一種全新的體系結構,不但克服包過濾應用的諸多缺陷,而且融合了它們的優點,提高了抗攻擊性。
分享友人