| 1. | The article focuses on the five important technologies we used , including the router detection technology , the os identification technology , the port identification technology , the trojan horse technology and the ports - reflection technology 本文重点讨论了系统在实现过程中采用的目标网络寻径技术、操作系统类型识别技术、特定端口识别法技术、木马技术、反弹技术等关键性技术。 |