| 1. | To specify the target host 指定目标主机。 |
| 2. | Jre version 1 . 3 . 2 or higher must be installed and available on the target host 必须在目标主机上安装jre version 1 . 3 . 2或更高版本,并且它们在目标主机上必须是可用的。 |
| 3. | This is the least reliable of the name resolution methods as it depends on the target host being on a locally connected subnet 当目标主机联接到本地子网时这是最可靠的名字解析方法。 |
| 4. | The release manager then rebases his her read - only stream to the new baseline and deploys to the testing target hosts 发布经理随后变基他/她的只读流到新的基线并用于测试的目标主机上。 |
| 5. | In this section , i ll discuss a form of port scanning used by attackers that may not be detected so easily by the target host 在本节中,我将讨论攻击者所使用的一种端口扫描形式,它不会被目标主机轻易地侦测到。 |
| 6. | Knowing which ports are open on a host is an important first step for an attacker to deduce possible vulnerabilities to the target host 知道主机上哪些端口是打开的,对于攻击者推断目标主机上可能存在的弱点是重要的第一步。 |
| 7. | To accomplish this , the attacker sends a tcp packet with the syn flag set to the target host , just like when opening a regular tcp connection 要实现这一点,攻击者向目标主机发送设置了syn标志的tcp包,就象打开常规tcp连接时一样。 |
| 8. | In the reply to a connect , bnd . port contains the port number that the server assigned to connect to the target host , while bnd . addr contains the associated ip address 在对于一个连接的回应中,绑定的端口包括了服务器连接目标的端口号,并且绑定地址包含了关联的地址。 |
| 9. | Our employees who work in china access internet through international dedicated line , so for me , everything is accessible , unless the target host or network was broken 公司的中国员工是通过国际专线访问互联网的,所以对我来讲,没有什么能访问或者不能访问的,除非目标主机或网络坏掉了。 |
| 10. | The idea is to find out which ports are open on a specific target host , but it is done in such a tricky way that the attacked host or a poor - quality intrusion detection tool may not notice 这种攻击的想法是找出特定目标主机上打开的端口,但完成的方式非常狡猾,因此被攻击的主机或质量低劣的入侵检测工具不会发现。 |