单词 | ARP |
释义 |
例句释义: 地址分解协议,空袭预防措施,南极研究计划,地址转换协议,阿尔普 1. One couple came into our office to ask the ARP branch director for permission to borrow a car to go and get their marriage certificate. 有一对男女到我们办公室里来向防空处长借汽车去领结婚证书。 www.zftrans.com 2. Experiments show that this program effectively limits the ARP attacks took place, the effect significantly. 实验证明,此方案有效地限制了ARP攻击的发生,效果明显。 kns50.chkd.cnki.net 3. Lying to machines involves lots of different techniques, and a commonly used one -- ARP Cache Poisoning -- is the focus of this article. 要骗过计算机则包括许多不同的技术,一个常用的是——ARP缓存中毒(ARPCachePoisoning)——这是本文的核心。 www.bing.com 4. You just learned that the ARP protocol has no way of verifying ARP replies. 你刚刚才知道ARP协议没有任何认证ARP响应的方法。 www.bing.com 5. One form of hacker attack even involves feeding bad data to ARP tables, a practice known as ARP poisoning. 黑客攻击的一种形式就包括修改恶意数据到ARP映射缓存,即所谓的ARP中毒。 www.bing.com 6. Know why my short description of ARP doesn't mention any sort of authentication method? 知道为什么在我对ARP的简短描述中没有提到任何形式的认证方法吗? www.bing.com 7. Step 7: Destination device send the Address Resolution Protocol (ARP) reply message and it will not be a broadcast, but a unicast. 第七步:目标设备发送地址解析协议(ARP)回复邮件,它会不会是广播,而是一个单播。 www.bing.com 8. If the mapping is not in cache, ARP builds an ARP request frame for the destination hosts hardware address. 如果这一映象在高速缓存中找不到,地址解析协议就会产生一个ARP请求帧以获取目标主机硬件地址。 www.yfnet.org 9. Better yet, I can broadcast my faked ARP reply to my victim's entire network and fool all his computers. 更进一步,我能广播我做的假冒ARP响应到受害者的整个网络中,欺骗网络中所有的计算机。 www.bing.com 10. Routers, in particular, do not update their ARP cache as frequently as computers. 但是路由器却并不像计算机那样频繁更新它们的ARP映射缓存。 bbs.internet.org.cn 1. That's because every device you add to your network has to be manually added to your ARP script or entered into each machine's ARP table. 那是因为你每加入一台设备到你的网络中都需要你手动地编写ARP脚本或输入每台设备的ARP映射表。 www.bing.com 2. This store is known as the Address Resolution Protocol (ARP) cache. 这个存储器叫作地址分辨协议(ARP)高速缓存。 zhidao.baidu.com 3. Below normal circumstance, the ARP of a lead plane should have the MAC address of gateway only in cache. 正常情况下,一台主机的ARP缓存中应该只有网关的MAC地址。 www.nwpu.net 4. VV 340, also known as Arp 302, provides a textbook example of colliding galaxies seen in the early stages of their interaction. 也叫Arp302,提供了碰撞星系相互作用早期阶段的范例。 www.bing.com 5. The solution is to add the MAC address of the Ethernet card in the DECstation statically to the ARP table of the TFTP server. 解决方案是将以太网卡的MAC地址静态加入到TFTP服务器的ARP表中。 debian.fr 6. IP. If not ARP table entry is found, we overwrite the original IP packet with an ARP request for the IP address. 如果ARP表中找不到,则将原来的IP包替换成一个ARP请求。 wenku.baidu.com 7. When IP needs a hardware address, ARP first consults the ARP cache for the hardware address that corresponds to the destination IP address. 当IP协议需要某一硬件地址时,地址解析协议首先向ARP高速缓存询问与目的地IP地址相应的硬件地址。 www.yfnet.org 8. The firmware does not respond to ARP requests during a TFTP transfer. This leads to an ARP timeout and the transfer stops. 固件在一个TFTP传输中没有回应ARP请求,这导致一个ARP超时并且停止传输。 debian.fr 9. You can even create a login script that would add these static entries to your PCs as they boot. 你甚至可以创建一个登录脚本当它们启动时自动添加这些静态ARP到你的计算机中。 www.bing.com 10. You also examined ARP cache tuning and saw how you could monitor and tune ARP statistics. 您还研究了ARP缓存优化,并且看到了如何监视和优化ARP统计。 www.ibm.com 1. From 2008 school campus network times has caused by an ARP attack brought large drops, campus network extremely bad influence. 从2008年至今我校校园网络曾多次遭到ARP攻击导致校园网络大面积掉线,带来极坏的影响。 it.zhishi.sohu.com 2. The new Hubble picture shows a pair of interacting galaxies called Arp 273. 这幅新哈勃照片展示了一个叫做Arp273的相互作用的星系对。 www.bing.com 3. The founders of networking probably simplified the communication process for ARP so that it would function efficiently. 网络的设计者可能出于高效的考虑将ARP的对话过程设计得如此简单。 www.bing.com 4. It usually involves an ARP broadcast (address resolution protocol) that informs the network infrastructure that an IP address has moved. 这通常包括ARP广播(地址解析协议),通知网络基础架构一个IP地址已经发生了移动。 www.ibm.com 5. ARP spoofing attack and then analyze the entire implementation process and its principles. 然后分析ARP欺骗攻击的整个实施流程及其原理。 it.zhishi.sohu.com 6. All hosts receive the request and the frame is passed up to ARP. 所有的主机都收到这个请求,而且帧被送达地址解析协议。 www.yfnet.org 7. If you see a high purge count, increase the size of the ARP table. 如果您发现较高的清除计数,那么可以增大ARP表的大小。 www.ibm.com 8. The closest period of time, the ARP charge that each Internet bar discovers has upgraded, the climax that another ARP attacks comes. 最近一段时间,各网吧发现的ARP攻击已经升级,又一波ARP攻击的高潮来临。 www.nwpu.net 9. The paper points out that ARP spoofing prevention is now divided into tow levels. 指出了ARP欺骗防御也分成了两个级别,一个是针对主机安全的主机级防御; www.qikan.com.cn 10. When the hardware address is received, both the IP address and hardware address are stored as an entry in the local ARP cache. 当收到硬件地址时,源主机就把IP地址和硬件地址当作入口存储在本地ARP高速缓存中。 www.yfnet.org 1. This group of galaxies, known as Arp 194 is 600 million light years away from Earth in the constellation Cepheus . 这组星系,即通常被认为的阿尔普194,在距地球有6亿光年距离在仙王星系。 dictsearch.appspot.com 2. Another way is to open up command prompt and type " arp -a " . 另一种方式是打开命令提示符,键入“ARP协议一”。 wenda.tianya.cn 3. All the devices on the network ignore this ARP Request, except for the HP LaserJet printer. 局域网内所有的设备都会忽略这个ARP请求,除了惠普LaserJet打印机。 www.bing.com 4. Your best defense is understanding ARP Poisoning and monitoring for it. 你最好的防御方法就是掌握ARP中毒的机制并监视它。 www.bing.com 5. Every device on your LAN maintains its own ARP cache. 在你的局域网里的每台设备都维护它自己的ARP映射缓存。 bbs.internet.org.cn 6. For financial data analysis, it uses graph. For the core element of ARP-Audit Unit, it gives diverse solutions. 对于审计系统的核心要素审计工作单元,根据不同的业务类型,提出了不同的实现技术。 www.juhe8.com 7. The Address Resolution Protocol(ARP) is a protocol based on friendly communication and complete trust, so it is prone to be attacked. 地址解析协议(ARP)是建立在友好通信、充分信任基础上的协议,因此,很容易受到攻击。 kns50.chkd.cnki.net 8. This paper, by analyzing internal work principle of ARP protocol, researches on security of library network. 本文基于数据链路层地址解析协议ARP的内部工作原理,研究了图书馆网络的安全防范问题。 www.ceps.com.tw 9. When the other hosts on the subnet receive the spoofed ARP packets, they begin routing traffic through the victim's host. 当其他主机上接收子仿冒arp的包,他们开始路由通过交通受害人的东道主。 hi.baidu.com 10. MAC Flooding is an ARP Cache Poisoning technique aimed at network switches. MAC洪泛是一种旨在网络交换机的ARP缓存中毒技术。 www.bing.com 1. Conclusion Finding the causes, removing incentives and targeted therapy in time are very important to avoid the ARP. 结论及时找出病因、去除诱因、行针对性治疗对避免ARP的复发具有重要意义。 www.bing.com 2. Sending LE_ARP packets for the broadcast address returns the ATM address of the BUS. 为了广播地址请求而发送的LE_ARP包将返回总线的ATM地址。 club.163.com 3. Has analyzed the ARP virus's attack principle, as well as several typical ARP deceit way. 分析了ARP病毒的攻击原理,以及几种典型的ARP欺骗方式。 cn.qikan.com 4. Well, why don't I craft a perfectly valid, yet malicious, ARP reply containing any arbitrary IP and MAC address I choose? 嗯,我为什么不能制造一个完美有效但是恶意的,包含任何我自己选择的IP地址和MAC地址的ARP响应报文? www.bing.com 5. From our perspective, the bright cores of the Arp 273 galaxies are separated by only a little over 100, 000 light-years. 从我们的观点来看,Arp273的两个星系明亮的核心仅仅相距100000光年多一点点。 www.bing.com 6. In the final analysis for the implementation of ARP deception against their principle. 最后分析了ARP欺骗攻击的整个实施流程及其原理。 it.zhishi.sohu.com 7. The Address Resolution Protocol (ARP) command can only display MAC address of other computer that is turned on. 该地址解析协议(ARP)命令只能显示MAC地址的其他计算机上打开。 wenda.tianya.cn 8. To withstand the ARP attacks, an algorithm using an active technique to detect the ARP attacks was proposed. 为了能有效对抗ARP攻击,提出一种采用主动检测技术的算法。 www.dictall.com 9. However, static ARP entries are hard to maintain; impossible in large networks. 然而,静态ARP很难被维护;在大型网络中更是不可能。 www.bing.com 10. You'll rarely have to deal with ARP and MAC during day-to-day operations. 在日常处理中,你几乎不会涉及到ARP和MAC。 www.bing.com 1. The ARP virus is one kind of address deceit virus, the influence harm is very big to the local area network. ARP病毒是一种地址欺骗病毒,对局域网的影响危害很大。 cn.qikan.com 2. ARP is basically a form of networking roll call. ARP基本上就是一种网络上的点名。 www.bing.com 3. ARP security vulnerability poses the serious threat to the security of computer in LAN. 地址解析协议的安全漏洞对局域网内主机的安全构成严重威胁。 www.ceps.com.tw 4. After attack is finished, stop attack instantly and correct ARP information. 在攻击完成后,立即停止攻击并更正ARP信息。 www.nwpu.net 5. ARP poisoning enables local hackers to cause general networking mayhem. ARP中毒能让局域网内的黑客在其网内造成巨大的网络破坏。 www.bing.com 6. Good network administrators should be aware of ARP Cache Poisoning techniques. 优秀的网络管理员应该能意识到ARP缓存中的技术。 www.bing.com 7. When many clients are connected to the system, you might want to tune the ARP cache. 当有许多客户端连接到系统时,您可能希望优化ARP缓存。 www.ibm.com 8. If several network layer protocols are supported on the link, Inverse ARP messages will be sent for each. 假如链结上支援多个网路层协定,转位址解析协定会送给每个协定讯息。 www.cyut.edu.tw 9. If you manage a small network, you might try using static IP addresses and static ARP tables. 如果你管理着一个小型网络,你或许可以试试使用静态IP地址和静态ARP映射表。 www.bing.com 10. If the router needs to map the VCs to network layer addresses, it will send an Inverse ARP message on each VC. 假如路由器想把虚拟电路应对到网路层位址,它会在每个虚拟电路上回传反转位址解析协定。 www.cyut.edu.tw 1. So, we think, support road by implement implementation " ARP attacks active defence " , also can solve the problem of 80% only. 所以,我们认为,依靠路由器实现“ARP攻击主动防御”,也只能够解决80%的问题。 www.nwpu.net 2. Step 3: The source broadcast the Address Resolution Protocol (ARP) request message to the local network. 第3步:源广播地址解析协议(ARP)请求消息到本地网络。 www.bing.com 3. By correctly employing arp. Patterns and practice them daily. Easy, eh? 答案是正确的琶音形式和每天的练习。很简单,不是吗? www.guitarq.com 4. You've learned many devices accept ARP replies before even requesting them. 你已经知道了很多设备在没有发出任何请求的情况下仍然接受响应。 www.bing.com 5. "ARP two-way bind calm " can defence is slight, the ARP attack with not brillant method. “ARP双向绑定”能够防御轻微的、手段不高明的ARP攻击。 www.nwpu.net 6. So by the road by implement the task that will assume defence ARP to attack is expedient only, cannot solve a problem very well. 所以由路由器来承担防御ARP攻击的任务只是权宜之计,并不能很好的解决问题。 www.nwpu.net 7. To explain NIC, MAC, and ARP, we'll start with one computer: yours. 为了解释NIC,MAC和ARP,我们将从你的计算机开始。 www.bing.com 8. A hacker can exploit ARP Cache Poisoning to intercept network traffic between two devices in your network. 黑客利用ARP缓存中毒来截获你的局域网中两台设备之间的网络信息。 www.bing.com 9. ARP uses a similar technique to associate an IP address to the MAC address. ARP运用了相似的技术来将IP地址和MAC地址联系起来。 www.mytimes.net.cn 10. Same concept as ARP Request, but Computer A asks, "Who has this MAC address? " 和ARP请求的概念一样,但是计算机A询问,“WhohasthisMACaddress?”(谁的MAC地址是这个?) www.bing.com 1. This article introduced the ARP principle of work, analyzed "man in the middle" attack caused by ARP spoof. 介绍了ARP协议的工作原理,详细分析了ARP欺骗导致的“中间人”攻击。 www.ceps.com.tw 2. The most commonly used now basic it is to studying a method " ARP two-way bind calm " . 现在最常用的基本对治方法是“ARP双向绑定”。 www.nwpu.net 3. ARP is the universal tool for matching IP addresses to MAC addresses. ARP是把IP地址映射到MAC地址的通用工具。 www.ebigear.com 4. Function inet_init also initializes the various inet modules, such as the ARP, ICMP, the IP modules, and the TCP and UDP modules. 函数inet_init也会对各个inet模块进行初始化,例如ARP、ICMP和IP模块,以及TCP和UDP模块。 www.ibm.com 5. The Prevention of ARP spoofing which has widely spread in campus network is highly paid attention to by network administrators and users. 如何防范校园网络流行的ARP欺骗攻击,已成为网络管理员与用户高度关注的问题。 kns50.chkd.cnki.net 6. Here's an example of a normal ARP communication. 这里是一次常规的ARP通信的例子。 www.bing.com 7. Arp 273 lies in the constellation Andromeda, roughly 300 million light-years away from Earth. Arp273位于仙女座,距地球大约3亿光年。 www.bing.com 8. The "rose galaxy, " or Arp 273, is more than 300 million light-years away from Earth, in the Andromeda constellation. 图中的“玫瑰”,即Arp273位于仙女座星系,离地球有3亿光年。 www.bing.com 9. This latest version employs a new scanning method based on ARP to deliver more complete and in-depth scanning results. 这个最新版本采用了一种新的扫描方法的ARP基础,以提供更完整和深入的扫描结果。 www.jisuxz.com 10. I'd highly recommend deploying an ARP monitoring tool, such as ARPwatch, to alert you when unusual ARP communication occurs. 我强烈建议安装一个ARP监视工具,比如ARPwatch,当有不正常的ARP通信时它会提醒你。 www.bing.com 1. The article also addresses ARP cache tuning and how to monitor and tune ARP statistics. 本文还将讨论ARP缓存优化,以及如何监视和优化ARP统计信息。 www.ibm.com 2. Arp 273 may offer an analog of their far future encounter. Arp273可能可以为我们提供这两者在非常遥远的未来遭遇时的类比。 www.bing.com 3. ARP provides no way to verify that the responding device is really who it says it is. ARP没有提供任何方法去认证响应的设备就真是如它报文里所说的那台。 www.bing.com 4. The ARP protocol is used by IP to find the hardware address of a computer network card based on the IP address. ARP协议的作用是通过IP来查找建立在IP地址之上的计算机网卡硬件地址。 blog.sina.com.cn 5. ARP Cache Poisoning is trivial to exploit yet it can result in very significant network compromise. ARP缓存中毒能够利用一些微不足道的手段却造成网络的巨大危害。 www.bing.com 6. Think of ARP as network roll call. 把ARP想像成网络中的点名。 bbs.internet.org.cn 7. But you can help prevent ARP attacks using the following techniques. 但是你可以运用以下技术来防止ARP攻击。 www.bing.com 8. All Your ARP Are Belong To Us! 你的所有ARP报文都是我们的! www.bing.com 9. due to the defective design of ARP agreement, there is a serious security problem such as deceiving the ARP in the use of the process. 由于ARP协议的设计缺陷,使得其在使用过程中存在着ARP欺骗等严重的安全问题。 www.ceps.com.tw 10. The winner is a group of galaxies called Arp 274. 获奖的是被称为Arp274的一个星系群。 www.bing.com 1. Prepend Ethernet header to an outbound IP packet and see if we need * to send out an ARP request. 为传出的IP包添加以太网头并看是否需要发送ARP请求。 wenku.baidu.com 2. Flushes the ARP cache for one or all interfaces. 清洗一个特定接口或所有接口的ARP缓存。 angel.w15.5tom.cn 3. Next, the hacker sends a malicious ARP reply to your computer, associating his MAC Address with 192. 168. 0. 1 (see Diagram 4). 然后,黑客在发送一个恶意的ARP响应到你的计算机,将他的MAC地址和192.168.0.1绑定起来。(如图4)。 www.bing.com 4. Because in ARP, there is none. 答案是,ARP根本就没有。 www.bing.com 5. Can make ARP attack sufficient cannot go out so door, eliminated ARP completely inside the local area network to attack. 这样可以让ARP攻击足不能出户,在局域网内完全消除了ARP攻击。 www.nwpu.net 6. Because of the defects of ARP itself, there are very serious problems in ARP, such as peculating IP address and ARPspoofing. 由于ARP协议的设计缺陷,使得ARP协议在使用的过程中存在着盗用IP地址和ARP欺骗等严重的安全问题。 kns50.chkd.cnki.net 7. Implementation and Application of ARP in a Low Voltage Substation Automation System ARP在低压变电站自动化系统中的实现及应用 ilib.cn 8. A Way of Preventing ARP Spoofing and Implementation in Local Area Networks 在局域网中防止ARP欺骗的一种方法及其实现 www.ilib.cn 9. arp-suppress Specify arp suppress configuration information, default is disabled 指定地址抑制配置信息,默认是禁用的 wenku.baidu.com 10. Final result is, in the ARP cache watch of gateway, in the ARP cache watch of all lead plane inside the net of MAC address; 最终的结果是,在网关的ARP缓存表中,网内所有活动主机的MAC地址均为中毒主机的MAC地址; www.nwpu.net 1. Principle of Packet Sniff by ARP Spoof in a Switched Network and Defense Instrument ARP欺骗实现交换式网络数据包嗅探的原理及其防范 scholar.ilib.cn 2. A critical measure in management innovation - An all-round initiation of the ARP Program at CAS 管理创新的重大举措--中国科学院全面启动ARP项目 www.ilib.cn 3. Absorbed Arp to be rich with the manifestation of joy; 吸收了Arp富有乐感的表现形式; grandfather-art.com 4. A Brief Discussion On ARP Attack Principle And Its Solution 浅论ARP攻击的原理及解决方法 www.ilib.cn 5. Considerations on the Application of ARP to Knowledge Management 对ARP在知识管理应用中的思考 www.ilib.cn 6. arp. exe > NETWORK Display and modify IP - Hardware addresses 显示和更改计算机的IP与硬件物理地址的对应列表 blog.sina.com.cn 7. Principle of ARP Spoofing-Based Attacks and Defense Instrument ARP协议攻击原理及其防范措施 www.ilib.cn 8. The Network Security Research of Preventing ARP Cheating 防范ARP欺骗的网络安全性研究 www.ilib.cn 9. Analysis of Security Flaw of ARP Protocol and Protecting Methods ARP协议安全漏洞分析及其防御方法 www.ilib.cn 10. On protection against ARP attack within campus network 针对校园网中ARP攻击的防御 www.ilib.cn 1. Principle of ARP Cheating and Prevention Strategy ARP欺骗原理和防范策略 www.ilib.cn 2. The system broadcasts too many ARP packets when you copy a large file from a network file share in Windows 2000 SP4 在Windows2000SP4中从网络文件共享复制大型文件时,系统广播过多的ARP数据包 support.microsoft.com 3. Stores routing tables, ARP cache, fastswitching cache, and packet hold queues; 主要存储路由表、ARP缓存、快速交换表和包队列等? wenku.baidu.com 4. ARP Request Denial of Service Vulnerability 请求拒绝服务安全漏洞 www.oldhand.org 5. Research of the ARP Protocol's Key Issues in High-End Routers 高性能路由器中ARP协议关键问题的研究 www.ilib.cn 6. An implement of switch network sniffer based ARP spoofing 基于ARP欺骗的交换式网络监听实现 www.ilib.cn 7. The Bureau Area Net Suffers the ARP Research of Cheating the Attack 局域网受到ARP欺骗攻击的研究 www.ilib.cn 8. ARP Redirection Attack and Defensive Methods in LAN 局域网中的ARP重定向攻击及防御措施 www.ilib.cn 9. Anatomy of an ARP Poisoning Attack 剖析ARP中毒攻击 www.bing.com 10. A new method to actively detect the switch network ARP spoofing 交换网络ARP欺骗的主动检测机制 service.ilib.cn 1. attacks and precautions aimed at arp protocol 协议的攻击与防范 www.ichacha.net 2. Several Research and Implementation of Applications based on ARP Protocol 关于ARP协议应用的几点研究和实现 webtrek.cn 3. The Implementing of Distributed ARP 分布式ARP的研究实现 www.ilib.cn 4. A Solution to ARP Spoofing in Switching Networks 一种交换式网络内的ARP欺骗的解决方案 www.ilib.cn 5. Detection and defence of ARP cheat on campus network 校园网络ARP协议欺骗的检测与防御 www.ilib.cn 6. The Prevention And The Cleaning of ARP Virus in Campus Network 校园网ARP病毒预防与清除 www.ilib.cn 7. A Defense Research on the ARP Deceit of Trojan Horse Virus ARP欺骗木马病毒分析与防御研究 www.ilib.cn 8. Study of Security in ARP ARP协议中安全性的研究 www.ilib.cn 9. Analysis of Trojan using ARP spoofing 解析一种实施ARP欺骗的木马 www.ilib.cn 10. Analysis of Principle of ARP Spoofing ARP协议欺骗原理分析与抵御方法 edairy.cn 1. Timeout in seconds for ARP cache entries 以秒为单位的ARP缓存项目超时时间 angel.w15.5tom.cn 2. A Method of Man-in-the-middle Attack Based On ARP Spoofing 一种基于ARP欺骗的中间人攻击方法及防范 service.ilib.cn 3. Safety Strategies Based on ARP Protocol Intrusion 基于ARP协议入侵的安全策略 www.ilib.cn 4. The ARP entry addition failed 结果失败,错误提示为 dawnh.net 5. Host address recognition technology based on ARP 基于ARP协议的网络主机地址的识别技术研究 www.ilib.cn 6. Detecting and precaution of network spoofing based on ARP 基于ARP的网络欺骗的检测与防范 ilib.cn 7. Detect and Precaution Based on Intrusion of ARP Spoofing ARP欺骗入侵的检测与防范策略 www.ilib.cn 8. Study on Detection and Block of Illegal Connection to LAN Based on ARP 基于ARP协议的非法入网检测与阻止技术研究 www.ilib.cn 9. Solution of ARP Spoofing in LAN 一个ARP欺骗问题的分析和解决办法 www.ilib.cn 10. Switched Network Monitoring Based On ARP-Cheat 基于ARP欺骗的交换式网络监听 scholar.ilib.cn 1. An Algorithm Against Attacks Based on ARP Spoofing ARP欺骗原理及一种防范算法 service.ilib.cn 2. Building a Network Virtual Host Based on ARP 基于ARP协议构建网络虚拟主机 www.ilib.cn |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。