| 1. | Integrated 1 port fax server 1 port scanning server 50 users license 并发最高1路传真1路扫描不限用户整机 |
| 2. | Port scanning is used to check whether ports on a given host are open 端口扫描用来检查给定主机上的端口是否打开。 |
| 3. | A 、 source port : set the port to use as the source during a port scan 源端口:设置一个所使用端口直到一个端口被扫描。 |
| 4. | Ports scan also is the common way to search target computer by hackers 端口扫描也是黑客搜集目标主机信息的一种常用方法。 |
| 5. | The simplest form of a tcp port scan is to open a connection to all ports on a host Tcp端口扫描的最简单形式是打开一个到主机所有端口的连接。 |
| 6. | Via ports scanning , it can gained many useful information , also find out system security hole 通过端口扫描,可以得到许多有用的信息,从而发现系统的安全漏洞。 |
| 7. | " port scan " means show whether a port is active or not by scan every ports one by one 通过对端口的扫描,就可以得到任何一个系统都开了哪些端口,也就是提供了哪些服务。 |
| 8. | It is very useful and necessary to research the ports scan technology for cope with net inbreak effectively 为了有效地对付网络入侵行为,对端口扫描进行研究是非常有益和必要的。 |
| 9. | In this section , i ll discuss a form of port scanning used by attackers that may not be detected so easily by the target host 在本节中,我将讨论攻击者所使用的一种端口扫描形式,它不会被目标主机轻易地侦测到。 |
| 10. | Then it studies the network vulnerability scanning technology , witch includes port scanning , vulnerability scanning and dictionary attacking . after that , the article pays attention to the attacking technology on vulnerability 然后又进一步研究了漏洞攻击技术,并分析在实施网络攻击过程中,执行网络漏洞扫描所面临的困难。 |