| 1. | Apply strict network and data security policy 严格执行网络及数据库安全要求限制。 |
| 2. | Performing network operations >执行网络操作 |
| 3. | In synchronous mode , calls to functions that perform network operations such as 在同步模式中,对执行网络操作的函数(如 |
| 4. | Describes how to use the . net framework when performing network operations 描述在执行网络操作时如何使用. net framework 。 |
| 5. | Wisl ( what the internet sounds like ) - wisl performs network performance measurements and dynamically generates sounds ( music ) that represent the current state of the network 可以执行网络性能度量,动态生成代表当前网络状态的声音(音乐) 。 |
| 6. | Be responsible for the implementation of asb overseas network rno contract , plan network optimization schedule for the whole radio network and perform network optimization task 负责asb海外网络优化合同的实施,对整个网络制定网络优化方案,执行网络优化任务 |
| 7. | Examples of such methods include methods that communicate with other web services , access remote databases , perform network i o , and read and write to large files 这些方法包括:与其他web服务进行通信的方法,访问远程数据库的方法,执行网络i / o的方法,以及读取和写入大文件的方法。 |
| 8. | Then it studies the network vulnerability scanning technology , witch includes port scanning , vulnerability scanning and dictionary attacking . after that , the article pays attention to the attacking technology on vulnerability 然后又进一步研究了漏洞攻击技术,并分析在实施网络攻击过程中,执行网络漏洞扫描所面临的困难。 |
| 9. | And nvs consists of two parts : nvs console and nvs sensor . nvs sensor runs as a trojan horse on an innocent host . an attacker uses nvs console to control nvs sensor to perform vulnerability scanning Nvs执行端内核是以木马形式植入第三方“无辜”主机,而本地攻击者使用nvs控制端控制远程执行端,对目标系统执行网络漏洞扫描。 |