| 1. | To specify the target host 指定目标主机。 |
| 2. | Ports scan also is the common way to search target computer by hackers 端口扫描也是黑客搜集目标主机信息的一种常用方法。 |
| 3. | Ensure that the destination has enough space for the extraction of product files 要确保目标主机上有足够的空间解压产品文件。 |
| 4. | Jre version 1 . 3 . 2 or higher must be installed and available on the target host 必须在目标主机上安装jre version 1 . 3 . 2或更高版本,并且它们在目标主机上必须是可用的。 |
| 5. | This is the least reliable of the name resolution methods as it depends on the target host being on a locally connected subnet 当目标主机联接到本地子网时这是最可靠的名字解析方法。 |
| 6. | The release manager then rebases his her read - only stream to the new baseline and deploys to the testing target hosts 发布经理随后变基他/她的只读流到新的基线并用于测试的目标主机上。 |
| 7. | In this section , i ll discuss a form of port scanning used by attackers that may not be detected so easily by the target host 在本节中,我将讨论攻击者所使用的一种端口扫描形式,它不会被目标主机轻易地侦测到。 |
| 8. | Property is a null reference nothing in visual basic , requests bypass the proxy and connect directly to the destination host 属性为空引用(在visual basic中为nothing )时,请求回避此代理并且直接连接到目标主机。 |
| 9. | Knowing which ports are open on a host is an important first step for an attacker to deduce possible vulnerabilities to the target host 知道主机上哪些端口是打开的,对于攻击者推断目标主机上可能存在的弱点是重要的第一步。 |
| 10. | To accomplish this , the attacker sends a tcp packet with the syn flag set to the target host , just like when opening a regular tcp connection 要实现这一点,攻击者向目标主机发送设置了syn标志的tcp包,就象打开常规tcp连接时一样。 |