防火墻技術 的英文怎麼說

中文拼音 [fánghuǒshù]
防火墻技術 英文
firewall technology
  • : Ⅰ動詞(防鷥) provide against; defend against; guard against Ⅱ名詞1 (防守; 防禦) defence 2 (堤...
  • : fire
  • : 名詞(磚、石等築成的屏障或外圍) wall
  • : 名詞(技能; 本領) skill; ability; trick; technique
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  • 防火 : fire prevention; fire safety; fireproof
  1. Then this paper concerns about the network packet intercepting technology of linux os and gives a thoroughly overview of network hacking methods and some application protocol criterion, including http, ftp, telnet, nntp, pop3, smtp etc. then the system design scheme of the transparent proxy has been discussed, this system can be divided to 4 modules below : establishment of transparent charnel, implement of proxy service, gui configuration and management application, accessory filter functions ( such as url filter, command filter and logger etc ). we explain key techniques in all 4 main parts of this system, define the interfaces of each module, what is more the main data structures and software implements codes are all illustrated

    首先,論文陳述了的相關基礎,分析了透明代理作為一種先進易用的防火墻技術的原理,闡述了linux操作系統網路數據包攔截和http 、 ftp 、 telnet 、 nntp 、 pop3 、 smtp等應用層協議的協議規范和具體的工作流程。接著敘述了本透明代理服務器的系統總體設計方案,將系統分為以下幾個部分:透明通道建立、代理服務實現、 gui配置管理程序以及過濾功能(如url過濾、命令過濾和日誌審計等) 。論文然後分別介紹各個關鍵部分的具體實現要點,解釋了相互間的介面關系,列出了主要數據結構和實現流程。
  2. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享完成對控管規則、封裝數據、網上鄰居名字列表等數據的讀寫操作,從而很方便的根據控管規則實現了對網路封包的認證操作,提高了系統的過濾效率。鑒于目前防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣前景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  3. W factere w the work of strengthen the security of the enterprise information mp to be the highest priority, the whcle enthely analyses all ldnds of security problems tha a intemal netwrk of stock compan may risk thtough rystematic view. it gives out sollltions fbr the crst systffo wt on wtg, operating systeln, taling system, tu1ti - vinrs, beckalp, secwity edce and physical settings

    在此基礎上,對公司現有系統作出了系統化的安全方案,包括應用防火墻技術、 vlav和windows2000 )系統的安全機製作出的網路和系統平臺,病毒和系統備份方案,根據公司中心機房建設的規模,以及中心機房所在地的現場條件,分別就空調系統、后備電源系統、雷擊和系統監控給出實施方案。
  4. In this paper, the shortages and limitations of the perimeter firewall and current host firewall are analyzed, the current network attacks and the methods defending against them are analyzed and discussed, the strategies of the network security in the intranet are discussed, the scarcities of the current applications for the host firewall in the intranet are analyzed, a kind of intranet host firewall model based on the techniques of tcp / ip packets filter, vpn and ids is designed and discussed deeply

    本文針對網路安全的現狀,分析了邊界及現有主機的不足之處;對現有黑客的網路攻擊手段與方法進行分析研究,並對禦這些攻擊的方法進行了研究;對企業網的網路安全策略進行討論,分析了現有主機在企業網中應用的不足,並在此基礎上,結合包過濾、虛擬專用網、入侵檢測等防火墻技術,設計了一種企業網中的主機模型,並對這一模型進行了較深入地研究。
  5. Research of ipv4 ipv6 dual stack firewall based on linux

    6雙協議棧防火墻技術的研究
  6. Firewall technique and firewall system design

    淺談防火墻技術系統設計
  7. Firewall technology of supporting mobile node in mobile ip

    支持移動節點的防火墻技術
  8. Probing into distributed fire - wall technique

    分散式防火墻技術的探討
  9. Analysis of the computer network security and firewall technique

    計算機網路安全與防火墻技術
  10. Research on application of linux firewall technology on library

    防火墻技術在圖書館的應用研究
  11. Discuss on the situation and trend of the firewall technology

    網路防火墻技術現狀與發展前景探析
  12. The developmental trend of firewall

    防火墻技術的幾個發展趨勢
  13. Study on the technology of trojan ' s penetration through personal - firewall

    木馬穿透個人防火墻技術研究
  14. The technology of network firewall

    網路防火墻技術
  15. After studying many relative books and combining with my own understanding, i write this thesis. this thesis includes : the meaning & characteristics of network security ; threatening & attacking that the computer network faces ; general measures to protect network security ; brief introduction, classification and relationships to network security technology ; general description and key technology of fire proofing ( package filtrate technology, delegating technology, nat technology ) ; the constructive type of fire proofing ( filter route ware, multi - port host computer, host computer screen, subnet screen etc. ) ; the examples of the constructive application of fire proofing ; the future developing trend of fire proofing technology and products, etc. so, net security and fireproof technology are the title of this paper

    綜上原因,本文將「網路安全」和「防火墻技術」組在一起形成本論文題目。本論文是筆者在研讀許多相關文獻並結合自己理解基礎上寫成的,主要內容為:網路安全含義及特徵、計算機網路所面臨的威脅和攻擊、保障網路安全的一般措施;網路安全的簡介、分類及關系;概論、關鍵(包過濾、代理、 nat等) ;的構建類型(過濾路由器、多埠主機、主機屏蔽、子網屏蔽等) ;的構建應用舉例;防火墻技術的未來發展趨勢及產品等。
  16. Of course, net security is a big topic, which includes : the definition of the net security, the identification of the ideal safe net, different understanding of the net security, proving the net security and the measures of protecting the net security etc. second, why to mention fireproof technology while talking the net security

    當然,網路安全是一個內涵十分廣泛的題目,它包括:網路安全的本質含義,理想安全網路的特徵,不同領域對網路安全的理解,保障網路安全的,網路安全的保障措施等等。其次,在論述「網路安全」時,為什麼在這個論文題目中要談「防火墻技術」呢
  17. According to " ipv6 hardware fire wall based on network processor technology " project that author participated, detailed introduction about ixa ( intel internet exchange ) and protocol characteristics of ipv6 are given by this thesis. combining the requirement of development trend of firewall and the outstanding characteristics of network processor, a scheme developing a high performance firewall is put forward and key technique of this firewall is introduced in detail by this thesis

    本文以作者參與的「基於網路處理器的ipv6硬體」項目作為論文編寫的依據,較為詳細介紹了ixa ( intelinternetexchange )架構和ipv6協議特點,結合防火墻技術發展趨勢要求和網路處理器的突出特點,著重提出開發兼容ipv4 / ipv6雙協議的高性能的方案並詳細介紹了其關鍵
  18. So network security becomes the sticking point of internet applications. in order to enhance the security of internet, provide steady and safe services, a lot of security technologies and measures are used to protect the networks. intrusion detection is one of those technologies that have done well in this field

    網路安全是計算機工作者在解決網路安全問題的過程中不斷拓展和豐富的一門學科,它包括防火墻技術, vpn,加密,病毒,入侵檢測等。
  19. Firstly, it introduces the information security theories and technologies used in the study. the information security theories mainly includes ppdr - the dynamic security model, sse - cmm, padminee - the life cycle of information security engineering model, bs7799 - the standard of information security management, the grade - classification standard of information system security protection, iatf - the technical framework of information security guarantee and the principle of wooden pail etc. and the information security technologies consist of the technology of firewall, invasion detection, virus prevention and cure, loophole scanning, the identity certification and the soc etc. then it studies on the designing of the information security guarantee system

    首先,介紹和分析與本研究相關的主要信息安全理論與,其中信息安全理論有ppdr動態安全模型、 sse - cmm系統安全工程-能力成熟度模型、 padminee信息安全生命周期工程模型、 bs7799信息安全管理標準、信息系統安全保護等級劃分準則、 iatf信息安全保障框架和木桶安全理論等;信息安全防火墻技術、入侵檢測、計算機病毒、漏洞掃描與評估、身份認證和soc等。
  20. The most used technique is the encryption decipher technology, others include the identity authentication, firewall technology, router security, intrusion detection, emergency responds and restores technical, the honeypot technology and so on. while these technologies is under development, some of them is only single function, mutually independent, and difficult for the system administration. they cannot be trusted completely as the solutions to network intrusion behavior which emerges one after another increasly in the reality

    目前,解決網路安全問題的主要手段有加密解密、身份認證、防火墻技術、安全路由器、入侵檢測、應急響應與恢復、蜜罐等,這些在發展的同時,也存在著功能單一,相互獨立,難于系統管理的不足,不能應對現實中層出不窮的網路入侵行為,所以單純依靠這些不可能滿足全部的安全要求。
分享友人