| 1. | Files to the target machine 文件复制到目标机器。 |
| 2. | No connection could be made because the target machine actively refused it 不能做任何连接,因为目标机器积极地拒绝它。 |
| 3. | First , the attacker needs to make sure that the fake packets will actually be routed to the target 首先,攻击者需要确保假的信息包确实被路由到目标机器。 |
| 4. | Second , even if packets make it to the target , responses will be routed to the forged ip address 其次,即使信息包被传递到目标机器,响应也将被路由到伪造的ip地址。 |
| 5. | The destination has enough space for product deployment 300 - 400 mb based on the products chosen 目标机器应该为产品部署留出足够的空间(根据选择产品,这个空间大约是300 - 400 mb ) |
| 6. | Once you re on the same network segment , you re almost always able to see all traffic addressed to the machine of interest 一旦您位于相同的网段上,几乎总能看见流向目标机器的所有信息包。 |
| 7. | The relationship between machine description and code generation , and the technique of mapping rtl into object code by tree pattern matching are described in detail 重点研究了机器描述与代码生成之间的关系、如何选用合适的中间表示进行目标机器指令系统的描述、树模式匹配的目标代码生成技术等。 |
| 8. | Usually , what happens in practice is that the attacker will break onto a machine that is on the same network segment as one of the two machines in question usually the network of the target 通常,实际发生的情况是,攻击者将非法闯入与讨论中的两个机器之一位于相同网段上的一台机器(通常是目标机器的网络) 。 |
| 9. | In another way , we develop a compiler in virtue of gcc ' s intermediate language , rtl ( register transfer language ) , but we must rewrite the program of code generation and code optimization 此外,我们借助gcc编译过程中产生的中间代码rtl ( registertransferlanguage )文件,重写目标代码生成和优化功能程序,为新的目标机器开发c语言编译器。 |
| 10. | On auditmachine assuming we have our machinelist . txt file containing the names of our target machines and we have our audit accounts set up correctly , we will generate an output file called audit . xml (假设我们使machinelist . txt包含我们的目标机器的名称) ,并且我们的审计帐户设置正确,那么我们将生成一个名为audit . xml的输出文件。 |