网站首页  词典首页

请输入您要查询的英文单词:

 

单词 firewall
释义

firewall

美 [?fa?r?w??l]
英 [?fa??r(r)?w??l]
  • n.【计】防火墙;风火墙;马头墙
  • 网络防火墙系统;防火墙保护;防火墙技术
复数:firewalls  
firewall
n.
1.
防火墙,网盾(防止窃取计算机信息的系统)a part of a computer system that prevents people from getting at information without permission, but still allows them to receive information that is sent to them

例句

释义:
1.
Chain consists of rules that specify altering of packets just as they are about to leave the firewall.
链由指定正当信息包打算离开防火墙时改变它们的规则所组成。
www-128.ibm.com
2.
The government's controls over what its citizens can see online is often referred to as the "Great Firewall of China. "
中国政府用来控制本国公民网上浏览的手段通常让人联想到“中国国家防火墙”。
www.bing.com
3.
Encryption Even if intruders manage to break through a firewall, the data on a network can be made safe if it's encrypted.
加密即使入侵者设法突破了防火墙,如果网络上的数据是加密的,就能使其安全。
www2.ccw.com.cn
4.
When communicating with an external, public network like this there may be restrictions on your firewall that limit the communication.
当您与这样一个外部公共网络通信时,您的防火墙上可能有一些限制通信的限制。
www.ibm.com
5.
Tired of the controls, many Chinese have learned to get around "the Great Firewall, " or GFW, as the system is known.
由于厌恶网络控制,许多中国网民学会了翻越网络防火墙,GFW是此套系统的通称。
dongxi.net
6.
The European agreement appears to be an attempt to remove Greece as a lightening rod and build a firewall around Spain and Italy.
欧债协议似乎试图将希腊作为一个避雷针,并建立给西班牙和意大利建立一面防火墙。
www.bing.com
7.
Keep your computer safe from security threats with this easy-to-follow advice for installing a firewall.
为了保护你的电脑远离威胁,请按照这个浅显易懂的建议安装防火墙。
www.bing.com
8.
As security becomes an inescapable enterprise concern, most computer users deal with some sort of firewall, especially at work.
安全性已成为企业无法回避的问题,多数计算机用户都采用了某种防火墙,尤其是在工作场所。
www-128.ibm.com
9.
Be aware that the customer may be behind a firewall, and may have to configure it in order for you to make your socket connection.
要明白,客户可能位于防火墙的后面,他可能必须对防火墙进行配置,以便您能够建立套接字连接。
www-128.ibm.com
10.
A SOCKS proxy is often used to allow users behind a firewall to connect to Internet servers in a limited, controlled manner.
SOCKS代理一般用于使防火墙后面的用户能够以有限的、受控的方式连接到Internet服务器。
www-128.ibm.com
1.
So would some sort of relationship with Baidu be one of those "specific things" which might break Facebook through the great firewall?
与百度之间结成某种关系,是否属于可能帮助Facebook突破“防火长城”的“具体事情”之列?
www.ftchinese.com
2.
How much quality the first-class firewall has?
一流防火墙有多少成色?
ilib.cn
3.
Then, I start and stop the firewall. . . ooops, made a bit of a mistake when I added the rules.
然后,我启动防火墙,但又马上停止了它……哎,我在添加规则时犯了一个小错。
www.ibm.com
4.
Sending an email. Pitfall: There is an inherent wiener-ness to this approach as you cower behind the safety of your firewall.
发送邮件.诱惑:使用这种方法,你可以安全地躲在你的防火墙后面,你是一个天生的命根子主义者。
www.elanso.com
5.
"So far, the GFW [Great Firewall] is lagging behind and still needs improvement, " said the man known as its father.
“目前,GFW[防火长城]已经落伍,仍需改善。”GFW之父说。
www.bing.com
6.
It was the responsibility of the eurozone to show that there was an effective firewall.
这是欧元区的责任,足以表明其具备有效的防范机制。
www.bing.com
7.
In the network for an enterprise, a computer server acting as a gateway node is often also acting as a proxy server and a firewall server.
在网络的企业,一台计算机服务器作为网关节点也往往是作为一个代理服务器和防火墙服务器。
it.zhishi.sohu.com
8.
Meanwhile, the Great Firewall has also been busy trying to block all references to the event.
与此同时,国家防火墙也已经在忙碌地屏蔽所有提及此事的网络内容。
www.forbeschina.com
9.
Set up a "Firewall" system, the general need is to set up "Corporate Firewall" and "Business Firewall" two type of system.
建立“防火墙”制度,一般需要设置“法人防火墙”与“业务防火墙”两类制度。
www.fabiao.net
10.
Such a firewall is a "common phenomenon around the world, " he argues, and nor is China alone in monitoring and controlling the Internet.
这样的一个防火墙是“各个国家的一种普遍现象”,他说,“并不是只有中国来监控互联网。”
www.douban.com
1.
Proxies are often used to communicate through a firewall to allow communication from a company's intranet to the Internet.
代理通常用于穿过防火墙进行通信,使得我们能够从公司内部网与因特网进行通信。
www.ibm.com
2.
In that case, Google first blamed itself, citing a technical change, then faulted the Great Firewall-just as service returned to normal.
那次谷歌先是归咎于自身,说是缘于一次技术更新,过后等服务回归正常时又将其归因于防火长城。
c.wsj.com
3.
We are unable to connect to the login server due to a server check, a firewall block or other network issues.
我们无法连接到登录服务器由于服务器检查,防火墙阻止或其他网络问题。
women.zhishi.sohu.com
4.
The next screen prompts you to configure firewall settings, as shown in Figure 16.
下一个屏幕提示您配置防火墙的设置,如图16所示。
www.ibm.com
5.
The great firewall is overloaded and that is why the authorities are trying to move the focus of control to the desktop.
长城防火墙现已不堪重负,所以当局试图将监控重点移至个人电脑。
www.bing.com
6.
If the data on the network is encrypted , it is still safe even if the intruder managed to break through a firewall. P.
宏是一个完成特定应用程序的命令序列。5。如果网络上数据经过加密,即使入侵者设法突破防火墙,这些数据也是安全的。
www.kuaiyilin.com
7.
One moment you're designing a new site which will cost heaps of money, and the next you're modifying a firewall rule for a developer.
这一刻你在设计一个要花费很多钱的新网站,下一刻又要为开发人员修改防火墙规则。
www.infoq.com
8.
Multiple customers share the same infrastructure, but each others' cloud is secure and separated as though behind its own firewall.
多名客户共享相同的基础设施,但是每名用户的云都得到了保护并彼此分离,就好象他们位于自己的防火墙之内。
www.ibm.com
9.
We recommend that you use a dedicated firewall server to help enhance the security of your Exchange computer.
我们建议您使用专用防火墙服务器来帮助增强Exchange计算机的安全性。
technet.microsoft.com
10.
A common way to connect your partitions to a physical network is to run a firewall in one of your partitions.
将分区连接到物理网络的一个常见方法是在某个分区上运行防火墙。
www.ibm.com
1.
China is still behind the infamous Great Firewall, the system that filters and censors websites with politically sensitive content.
中国依然蜷缩在声名不佳的防火墙后面,借由这一系统对含有敏感政治内容的网站进行审查和过滤。
dongxi.net
2.
None of this will work unless the Europeans create a firewall around the solvent governments.
除非欧洲围绕有偿债能力的政府构筑一个防火墙,否则所有都无济于事。
www.ecocn.org
3.
According to the Great Firewall site, its Chinese version, google. cn, is also blocked while that of China-sanctioned Baidu is not.
据中国防火长城网站表示,Google的中文版google.cn也被阻拦了,而中国认可的“百度”则没有。
www.bing.com
4.
Right-click the connection on which you want to turn on the Internet Connection Firewall, and then click Properties.
右键单击要打开Windows防火墙的连接,然后单击“属性”。
support.microsoft.com
5.
But it did not provide the "firewall" to address the short-term liquidity needs that the markets wanted.
但它没有提供市场所希望的解决短期流动性所需的“防火墙”。
www.ftchinese.com
6.
You need a user account policy to spell out the general responsibilities of each firewall administrator.
您需要一个用户帐户策略来定义每个防火墙管理员的通常职责。
www-128.ibm.com
7.
The plan contains a firewall to protect nations so they have access to financing as they reform their economies, she said.
她指出,该计划包含保护各国的预防措施,以使它们在进行经济改革时能够获得融资。
iipdigital.usembassy.gov
8.
Firewall has no interface and cannot be started by user manually.
防火墙没有用户界面,而且无法手动启动。
dev4.9983.com
9.
So my feeling is that this is an attempt to shore up the great firewall which doesn't work a lot of the time.
所以我感觉这是在试图加固常常起不到作用的‘大防火墙’。
www.bing.com
10.
Also, introduction of a firewall allows detection of services that do not follow encapsulation policy of a domain.
而且,防火墙的引入提供了对不遵循域的封装规则的服务进行检测。
www.ibm.com
1.
A firewall effectively implements a security policy governing the network traffic between two or more networks.
防火墙可以有效地实现管理两个或多个网络之间网络传输的安全策略。
www-128.ibm.com
2.
That's China's own version of Twitter, as the U. S. -based blue bird-branded microblog is blocked by the Great Firewall.
那是中国自己微博客,类似于被防火墙屏蔽的美国基于蓝鸟品牌的微博Twitter。
www.bing.com
3.
So even if the firewall takes place problems, the external network unable to get a connection with the protected internal network.
因此,即使发生在防火墙的问题,外部网络无法获得与保护内部网络。
money.zhishi.sohu.com
4.
China already heavily filters content and blocks numerous foreign websites, a system known as the "Great Firewall of China. "
中国已严重过滤了互联网内容和封锁了大量的国外网站,其中一个系统为中国超级防火墙。
blog.sina.com.cn
5.
But it shifted the onus of censoring results from Google to China's filtering system, known as the Great Firewall of China.
但是这把搜索结果的审核责任从Google转到了中国的过滤系统,即中国国家防火墙。
www.bing.com
6.
The "Great Firewall of China, " a system able to block banned content from being downloaded to Chinese computers, becomes operational.
《中国防火长城》开始运行。这是一款能够阻止违禁内容被下载到国内电脑上的系统。
www.bing.com
7.
Allows you to use the business interface as you would without the firewall in place.
允许您像在没有防火墙的情况下一样使用业务接口。
www-128.ibm.com
8.
And finally, the only port that must be opened on the inner firewall is the HTTP(S) port for the target application servers.
最后,内部防火墙唯一必须开放的端口就是用于目标应用服务器的HTTP(S)端口。
www.ibm.com
9.
A firewall can interfere with two components trying to transmit disconnected ADO recordsets .
防火墙可以影响试图传输不连接的ADO记录集的两个组件。
www.bing.com
10.
If it does, you may find the firewall shunting away traffic that looks like a Denial of Service (DoS) attack.
如果真是这样,防火墙会将这些流量当作拒绝服务攻击(DoS)流量分流掉。
www.ibm.com
1.
If you are trying to use SOAP through a firewall, you might need to use a SOCKS proxy.
如果试图穿过防火墙使用SOAP,可能需要使用SOCKS代理。
www-128.ibm.com
2.
It is an ambitious plan, but Greece may need even more help and the firewall does not look strong enough to withstand a bout of contagion.
这是一个雄伟的计划,但希腊可能需要更多帮助,而这堵防火墙对抵挡危机的蔓延似乎还不够强壮。
www.ecolion.cn
3.
Creating a credible financial firewall has been a key demand by Mario Draghi, president of the European Central Bank.
建立一个令人信服的金融防火墙一直是欧洲央行(ECB)行长马里奥?德拉吉(MarioDraghi)的一项关键要求。
www.ftchinese.com
4.
The organizational chart application is an internal application to your enterprise, and is protected by the firewall.
组织结构图应用程序是企业的内部应用程序,受到防火墙的保护。
www.ibm.com
5.
The firewall ensures that only trusted applications are able to receive or send data across the internet.
防火墙可以确保只有受信任的应用程序都能够接收或发送数据在互联网上。
bbs.kafan.cn
6.
The most prominent is China's "great firewall" . But China is by no means the only country erecting borders in cyberspace.
最突出的是中国的“greatfirewall”,但中国决不是在虚拟空间设限的唯一国家。
www.ecocn.org
7.
What are the best practices and gotchas the network admins and developers should keep in mind when looking for a web app firewall solution?
在寻求Web应用防火墙方案时的最佳实践是什么?网络管理员与开发者需要牢记哪些内容?
www.infoq.com
8.
Including two other loans already made toGreece, the eurozone said the firewall is now above 800bn euros.
加上提供给希腊政府的其他两笔借款,现在欧元区的防火墙据说已经超过了8000亿欧元。
www.bing.com
9.
While Fang defends the "Great Firewall" as an urgent necessity and thinks the internet censorship should be developed even stronger.
而方认为“长城防火墙”是迫切的,必要的,互联网审查应该更为严格。
bbs.enfamily.cn
10.
If the foundations of the firewall are too shallow, then the bank plan plunges too deep.
如果说,欧洲的防火墙根基太浅,那么银行业的扶持计划可谓涉足太深。
www.bing.com
1.
One blogger posted an image of a voodoo doll, calling it the Great Firewall and inviting users to -- digitally -- stick pins in it.
一个博客张贴了一张巫毒娃娃的图片,称它就是网上长城,并邀请用户,——当然是数字化的方式,将针扎在上面。
dictsearch.appspot.com
2.
China is considered the king of Web filtering, with its elaborate censorship system dubbed the 'Great Firewall. '
中国被认为是网络过滤之王,其精密的审查系统被称为“防火长城”(GreatFirewall)。
chinese.wsj.com
3.
Often, it is necessary to use some sort of proxy server to traverse a firewall and access Web content.
我们经常需要使用某种代理服务器来穿越防火墙并访问Web内容。
www-128.ibm.com
4.
Privacy notice: firewall administrator could configure the firewall to monitor web pages that you (or other users) are visiting.
隐私公告:防火墙管理员可以监控你(或其它用户)访问的网页。
www.isacn.org
5.
After you enable Internet Connection Firewall protection, verify that the connection to your server is still working.
启用Windows防火墙保护后,请验证与服务器的连接是否仍然在工作。
support.microsoft.com
6.
The "Great Firewall" works well in keeping out or at least filtering Western ideas.
在天朝,网络长城运行良好,西方之思潮不是被拒之门外,亦被过滤清理。
www.bing.com
7.
China's system of monitoring and restricting access to overseas internet content is known as the "Great Firewall" .
中国监视并限制访问海外互联网内容的系统被称为“防火长城”。
www.ftchinese.com
8.
Because OpenBSD is both thin and secure, one of the most common OpenBSD implementation purposes is as a firewall.
因为OpenBSD很小并且很安全,所以OpenBSD实现的最常见目标之一是用作防火墙。
www.ibm.com
9.
But many wondered why Beijing, with its Great Firewall, didn't take the sites down and slap the wrists of the authors of the hoax.
但许多人想不通,北京有长城防火墙,为什么没有关闭那些网站并将发布虚假消息的人抓起来。
kk.dongxi.net
10.
After applying this step and the previous step, you should end up with a firewall topology like the one shown in Figure 3.
通过应用这一步骤和前一步骤,应该可以建立图3所示的防火墙拓扑。
www.ibm.com
1.
This solves both problems: no need to set up a local (and complicated) server and no need to open up their firewall and risk attacks.
这解决了两个问题:无需建立一个本地(且复杂的)服务器;无需冒着受攻击的风险而打开防火墙。
www.ibm.com
2.
Some sites firewall off most ports, or at least enough to include ssh's standard port 22.
某些地方防火墙关闭了大多数端口,或者至少关闭了包括ssh的标准端口22在内的许多端口。
www.ibm.com
3.
Type the name of your proxy host. This is the computer or firewall on your network serving as a proxy.
输入你的代理主机名。就是在你的网络环境里充当代理服务器的那台计算机或者防火墙。
rebol.nirvanastudio.org
4.
A stateful firewall is capable of assigning and remembering the state of connections made for sending or receiving packets.
有状态的防火墙能够指定并记住为发送或接收信息包所建立的连接的状态。
www-128.ibm.com
5.
Firewall vendors offer VPNs that are essentially firewalls in combination with a variety of security measures and management tools.
有些防火墙供应商也提供vpn,它们基本上是防火墙与各种安全措施与管理工具的结合。
www.hotdic.com
6.
Finally, we show performance evaluation result of this kind of SIP-aware firewall with dynamic layer 7 filtering.
最后给出了此类动态七层过滤SIP感知防火墙的性能评估结果。
www.boshuo.net
7.
Global firewall rules are applied to all processes and applications on your computer that request network access.
全局防火墙规则被应用于您计算机上请求网络连接的所有应用程序。
bbs.kafan.cn
8.
If your client and server are separated by a firewall, you'll want to have your client communicate directly with a servlet through HTTP.
如果您的客户机和服务器被防火墙分隔,您应该让客户机通过HTTP与servlet直接通信。
www.ibm.com
9.
We've also shown EJB clients on the edge as they might be on either side of the firewall.
我们也在边缘地方显示了EJB客户端,因为它们可能位于防火墙的任一侧。
www.ibm.com
10.
China's system of Internet censorship and surveillance, popularly known as the "Great Firewall, " is the most advanced in the world.
中国对互联网审查和过滤监控的系统,也就是广为人知的防火长城,在世界上是最先进的。
www.hrw.org
1.
To determine whether your firewall server allows for NTLM authentication, see the product documentation for your firewall product.
若要确定防火墙服务器是否允许NTLM身份验证,请参阅防火墙产品的产品文档。
technet.microsoft.com
2.
Of course, you can unblock the ports enter pesa, etc. , with the exceptions if you know how to do Giggles in your firewall.
当然,您也可以解除封锁港口进入佩萨等,与例外,如果你知道如何做的笑声在您的防火墙。
www.ept-team.com
3.
A VPN provides a remote user with a connection in an organization's corporate network and in its firewall.
VPN为远程用户提供其防火墙和组织企业网络中一个连接。
support.microsoft.com
4.
Create the new XML Firewall with a static back end (instead of the loopback you used for scenario #1).
创建一个带有静态后台的新XMLFirewall(而不是在场景#1中使用的回送)。
www.ibm.com
5.
Inside of the firewall the only permit destination for traffic from the interior or exterior route is the bastion host.
在防火墙内部,对于来自内外部路由器的通信量来说,唯一允许到达的目的地是bastion主机。
www.godict.com
6.
After a bit of back and forth on the mailing list, he put his machine outside the firewall and gave me VNC access to debug the problem.
经过邮件列表上的一番往来,他干脆把机器放到公司防火墙的外面,然后给了我一个VNC帐号去调试这个问题。
www.infoq.com
7.
Firewall policies can be either packet-filter based or proxy-filter based, and are configured with a policy manager.
防火墙策略可基于包过滤或代理过滤,通过策略管理器可进行配置。
www.bing.com
8.
Intrusion Detection is an important security technology of protecting information system as well as firewall and data encryption techniques.
入侵检测是继数据加密、防火墙等传统安全保护技术后的又一种新的安全技术。
www.fabiao.net
9.
To enable this mode, select the Don't allow exceptions box on the General page of the Windows Firewall window.
为了打开这种模式,你可以选中Windows防火墙窗口中通用设置页面上的不允许例外情况的发生单选框。
www.ibm.com
10.
It is possible if using a client firewall the cognosrcp application launcher may be blocked.
可能出现这种情况:如果使用一个客户端防火墙,则Cognosrcp应用程序启动器可能会被封锁。
www.ibm.com
1.
It is possible if using a client firewall the cognosrcp application launcher may be blocked.
可能出现这种情况:如果使用一个客户端防火墙,则Cognosrcp应用程序启动器可能会被封锁。
www.ibm.com
2.
I usually run a set of "leak test" utilities to check whether the firewall can handle malware that tries to evade normal program control.
我通常会运行一系列“漏泄测试”工具,来检查防火墙能带应对那些想逃过正常程序控制的恶意软件。
www.kafan.cn
3.
So that in general have to guard against network attacks can be used for killing the firewall and virus protection.
使大家对于一般的网络攻击有所防范,可以用防火墙进行查杀和防护病毒。
news.zhishi.sohu.com
4.
When prompted to configure Firewall Client, type the name of your server.
提示您设定防火墙用户端时,请输入伺服器的名称。
www.microsoft.com
5.
A "plain" socket implements these methods exactly as described, without attempting to go through a firewall or proxy.
空白套接字实现了下面描述的方法,并不考虑通过防火墙或代理服务器。
www.51goushu.com
6.
The firewall lets you restrict the ports through which users can access both IIS and the computer on which Analysis Services is running.
防火墙可以限制用户可用于同时访问IIS和运行AnalysisServices的计算机的端口。
msdn2.microsoft.com
7.
But those messages, traveling from computer to computer, were more likely to be stopped by antivirus or firewall software.
但是,那些在电脑之间传播的信息更容易被杀毒软件或者防火墙拦截下来。
dongxi.net
8.
You can use software and hardware solutions as a firewall to help secure your messaging environment.
可以使用软件解决方案和硬件解决方案作为防火墙,以帮助保护您的邮件系统。
technet.microsoft.com
9.
When using waproamd, do not forget to install a firewall; the utility itself does not protect against intrusion.
在使用waproamd时不要忘记安装防火墙;工具本身不能防止入侵。
www.ibm.com
10.
A firewall is a type of defense system that you can set up for your computer.
防火墙是你能为你的电脑设置的一种保护系统的方式。
www.bing.com
1.
Keep in mind though, that your firewall's reliability is limited by the hardware on which it's installed.
但请记住,您的防火墙的可靠性是由所安装的硬件决定的。
www.bing.com
2.
it means the connection is either controlled by firewall or at the moment no application uses this port.
要么连接受防火墙的控制,要么目前没有任何应用程序使用此端口。
bbs.kafan.cn
3.
The better firewall products let you drag and drop groups in a graphical user interface (GUI) environment to easily define network security.
更好的防火墙产品可以让你在一种图形用户接口(gui)环境中用鼠标器在屏幕上操作进行分组,以便简便地定义网络安全性。
www.hotdic.com
4.
It is usually deployed at the firewall and has access to internal services.
它通常部署在防火墙处,并能够访问内部服务。
www-128.ibm.com
5.
It should be clear that you need a tight application gateway firewall with a strict policy.
这很明显,你需要利用一个严密的条款来使得防火墙够严格。
www.8bai.com.cn
6.
Proxy servers relay TCP traffic through firewall hosts to provide user applications transparent access across the firewall.
代理服务器通过防火墙主机中继TCP通信,以便通过防火墙透明访问用户应用程序。
technet.microsoft.com
7.
Congratulations, the registration process is now complete and you will now be returned to the registered version of Firewall Plus.
恭喜你,注册程序已经完成,你将返回到防火墙加注册的版本。
wenwen.soso.com
8.
Intrusion detection and prevention is enabled with an annually licensed IPS engine with Juniper Deep Inspection Firewall signature packs.
入侵侦测和保护,是通过每年授权一次的IPS引擎和Juniper深度检测防火墙(JuniperDeepInspectionFirewall)签名包提供的。
www.bing.com
9.
Fang is the architect of the so-called "Great Firewall" used to snuff out improper information posted on the internet.
方兴斌是“长城防火墙”的设计者。“长城防火墙”用于删除粘贴在互联网上的不适当信息。
bbs.enfamily.cn
10.
If the video does not play on any clients outside the firewall, then ask the firewall administrator to turn on firewall tracing.
如果不能在防火墙外的任何客户机上播放视频,则向防火墙管理员要求打开防火墙跟踪。
www.ibm.com
1.
Iptables is the command-line interface used to manipulate the firewall tables within the kernel.
是用于操作内核中的防火墙列表的命令行接口。
www.linuxsir.org
2.
Find out if the security architecture has been implemented with a protocol firewall, domain firewall and enterprise firewall positioning.
查明安全架构是否通过一个协议防火墙、域防火墙和企业防火墙配置实现。
www.ibm.com
3.
You cannot modify the Windows firewall settings of a remote computer over a remote connection.
不能通过远程连接来修改远程计算机的Windows防火墙设置。
msdn2.microsoft.com
4.
If it is necessary to renew the permit in its first visit to the network firewall, will be prohibited after the update!
如果以后需要更新可以在防火墙中先允许其访问网络,更新完毕之后再禁止即可!
www.cngr.cn
5.
Unable to connect to the network is not connected or blocked by the firewall.
无法连接到网络未连接或防火墙阻止。
zhidao.baidu.com
6.
Although the user's computer using antivirus software and firewall, but this does not guarantee the absolute security of the computer.
尽管用户的计算机使用了杀毒软件和防火墙,但是这不能保证计算机的肯定安全。
www.0772zd.cn
7.
The option can be useful for clients inside a firewall communicating with a MobiLink synchronization server outside the firewall.
此选项对于防火墙内的客户端与防火墙外的MobiLink同步服务器进行的通信十分有用。
www.ianywhere.com
8.
Managed remoting can accommodate a firewall between the communicating components, as the following illustration shows.
托管远程处理可以适应通信组件之间的防火墙,如下面的插图所示。
msdn2.microsoft.com
9.
Most new computers come with a built-in firewall. Firewalls are a necessary part of safe web surfing.
大部分新电脑内嵌有防火墙。防火墙是上网安全保障的必要部分。
www.59edu.com
10.
Private clouds are apps or platforms dedicated to a specific organization and deployed on-premises, usually behind the firewall.
私有云则是指特定组织专有,并在自身场地部署、常隐藏在防火墙之后的应用或者平台。
www.infoq.com
1.
The specifics of configuring firewalls will not be covered here, since firewall configuration is specific to the each firewall vendor.
这里将不讨论配置防火墙的细节,因为防火墙配置是特定于每个防火墙厂商的。
www.ibm.com
2.
Upgrade to the current version of your favorite desktop OS, which will have integral firewall capabilities.
升级到最新版本,你最喜欢的桌面操作系统,其中将有完整的防火墙能力。
jukuu.com
3.
The error message suggests that a firewall might be the cause of this problem.
该错误信息显示防火墙可能是导致此问题的原因。
support.microsoft.com
4.
Figure 3 also shows EJB clients on the edge, as they might be on either side of the firewall.
图3还在边缘上显示EJB客户机,因为它们可能位于防火墙的任一侧。
www.ibm.com
5.
Services that should be used by a limited number of users in a network should be protected from unwanted access by a firewall.
应该由有限数目用户使用的服务应该通过防火墙保护起来以防止不必要的访问。
www-128.ibm.com
6.
They must go back on the HTTP response flow or to an endpoint outside the firewall.
它们必须在HTTP响应流中或者防火墙外的端点中返回。
www.ibm.com
7.
During boot time, the hard-coded firewall boot policy blocks traffic on the default UDP port until the firewall service is running.
在引导时,硬编码防火墙引导策略会阻止默认UDP端口上的通信,直到防火墙服务开始运行为止。
www.microsoft.com
8.
All services that require the secret ports will function correctly with an extra security layer provided at the firewall level.
只需在防火墙级上提供一个额外的安全层,需要秘密端口的所有服务就会正常工作。
www.ibm.com
9.
The best way to see the benefits of dynamic firewall scripts is to see them in action.
了解动态防火墙脚本好处的最佳方法是在运行时查看它们。
www.ibm.com
10.
MobileIron then relays the information to an appliance behind the firewall, presenting IT with a window onto how smartphones are being used.
然后MobileIron将数据转送到公司防火墙后面的设备上,向IT部门展示一个智能手机使用情况的窗口。
www.bing.com
1.
An application on the Windows Firewall exceptions list is allowed to receive all incoming traffic.
允许Windows防火墙例外列表中的应用程序接收所有传入通信。
support.microsoft.com
2.
A firmware firewall, a collection of commands that prevent the execution of predefined activities that could place the system at risk.
固化的防火墙,一组命令集合,防止执行那些可能置系统于风险之中的预定动作。
www.ebigear.com
3.
We then conducted testing to see if external users who were not behind a firewall of some sort could view the clips.
然后,我们实施测试,以了解不在某类防火墙后的外部用户是否能观看这些片段。
www.ibm.com
4.
All electronic communications coming into and leaving the corporation must be evaluated by the firewall.
所有进出公司的电子通信都必须经过防火墙的评估。
www.educity.cn
5.
Windows Firewall offers some protection from network attacks by malicious software known as worms.
Windows防火墙提供了面临诸如蠕虫之类恶意程序的网络攻击时的防御手段。
www.ibm.com
6.
the firewall does not look strong enough to withstand a bout of contagion.
防火墙似乎没有强到可以抵挡危机的蔓延
www.ecocn.org
7.
The same result can be achieved by closing the port on the firewall, but that requires a request to a separate team.
同样的结果也可通过关闭防火墙上的端口来实现,但那需要向另外一个独立的团队发出申请。
www.ibm.com
8.
Firewall can temporarily disable or provide an access to a network for a keylogger by mistake.
防火墙可以暂时停用或提供一个获取一个网络为键盘记录程序,由错误的。
bbs.kafan.cn
9.
NOTE: Some personal firewalls block the operation of the local HTTP service, so you may have to adjust your firewall settings.
注意:某些个人防火墙会阻塞本地HTTP服务的操作,因此务必调整好防火墙的设置。
www.ibm.com
10.
They are all inside the firewall and are as secure as any other system on a company? S network.
它们都位于防火墙之内,与公司网络中的其他系统一样安全。
www-128.ibm.com
1.
For more information about whether you can use NTLM with your firewall, see your firewall manufacturer's documentation.
有关是否可以将NTLM和防火墙一起使用的详细信息,请参阅防火墙制造商提供的文档。
technet.microsoft.com
2.
used wisely , tunneling is a safe technique that combines flexibility with the protection of a firewall.
如果审慎地使用,穿透法将是一项结合灵活性与对防火墙的保护的安全技巧。
www.ichacha.net
3.
Finally, all MMOGs are topped off with the game's firewall and, of course, a connection to the Internet.
最后,所有MMOG都需要游戏防火墙和到互联网的连接。
www.ibm.com
4.
A personal firewall on the machine running the service can enforce such a policy.
运行服务的机器上的个人防火墙可以加强这种策略。
www-128.ibm.com
5.
With a firewall, you can create a solid barrier and then open only the ports that you need.
藉由一个防火墙,你能产生一个坚硬的障壁然后只开启你需要的端口。
bbs.chinaunix.net
6.
It offers a safe, proven mechanism for working around the constraints of the firewall.
它为在防火墙限制的范围内进行工作提供了一个安全、可靠的机制。
www-128.ibm.com
7.
The main tasks of the host firewall in DFW are capturing network_packets, receiving security policies, sending logs and "heartbeat" .
DFW中主机防火墙的主要任务可归纳为以下几点:网络数据包拦截、安全策略接收、日志发送模块以及“心跳”发送。
www.fabiao.net
8.
So if you're worried about intruders sneaking into your network, ratchet up all the settings on your hardware firewall.
所以,如果你担心入侵者会偷偷潜入网络,不妨调高硬件防火墙上的所有设置。
bbs.translators.com.cn
9.
Originally, a firewall is composed of an independent machine, lays aside between yours private network and the public network.
原来,一个防火墙是由一个单独的机器组成的,放置在你的私有网络和公网之间。
zhidao.baidu.com
10.
This may be used to connect on a network with a restrictive firewall.
这可以用于连接到防火墙后的网络。
translations.launchpad.net
1.
Previously, you could allow exception traffic or disable the firewall (allow all traffic).
在以前,你可以允许例外交通开放情况的存在,或者禁止防火墙的运行(允许所有的通讯开放)。
www.ibm.com
2.
Certain modems and routers can cause conflicts with your updated ESET Smart Security Personal firewall.
某些调制解调器和路由器可能会导致冲突与您更新ESET的智能安全个人防火墙。
www.nod32club.com
3.
Australia's firewall is a case in point, even if it is a clumsy way of enforcing the law.
澳大利亚的防火墙就是个例子,即使他是一种笨拙方式在实施法律约束。
www.bing.com
4.
The Edge Transport server role and a firewall can co-exist on the same computer provided that firewall is not scanning TCP port 25.
假如防火墙不扫描TCP端口25,则边缘传输服务器角色和防火墙可以在相同计算机上共存。
technet.microsoft.com
5.
Firewall just is an effective measure of network security. It will ensure that all communications conform to your Security policy.
而防火墙就是保证网络安全的一种有效措施。它可以保证所有的通信符合安全政策。
www.ebigear.com
6.
Note Windows Firewall is known as Internet Connection Firewall in earlier versions of Windows.
注意:Windows防火墙在Windows的早期版本中称为Internet连接防火墙。
support.microsoft.com
7.
Unlike firewall administrators, proxy users do not have access to a firewall machine.
不像防火墙管理员,代理用户无法访问防火墙机器。
www-128.ibm.com
8.
Try to run the Configuration Wizard to configure the firewall component properly .
尝试运行配置向导来配置适当的防火墙的组成部分。
dictsearch.appspot.com
9.
This update addresses an issue that could cause your system to stop responding if certain firewall or antivirus programs are installed.
本更新程序解决了安装某些防火墙或反病毒程序后可能导致系统停止响应的问题。
www.microsoft.com
10.
And finally, the suite adds an antispam and firewall module and will thus provide you with a complete, worry-free protection.
最后,增加了反垃圾邮件软件和防火墙模块,从而为您提供一个完整的,无忧无虑的保护。
bbs.kafan.cn
1.
The internal host connects to the company internal network and the external host sits in the DMZ in front of the firewall.
内部主机接到公司的内部网,而外部主机置于防火墙前面的非军事化区。
www2.ccw.com.cn
2.
An open system has to face up to various threats and attacks. We introduce of the traditional firewall technology.
作为一个面向大众的开放系统,计算机网络面临着来自各方面的威胁和攻击。
kns50.chkd.cnki.net
3.
And compared with China's sophisticated controls, Thai censorship is Firewall 101. It uses keyword searches to turn up suspect websites.
与中国复杂精巧的互联网审查体系相比,泰国使用Firewall101审查系统,依靠关键字找出有嫌疑的网站。
www.24en.com
4.
"The unpredictability of the firewall actually makes it more effective, " another Chinese software engineer told me.
“审查系统的不确定性在事实上使它变得更有效,”另一位中国的软件工程师告诉我。
dictsearch.appspot.com
5.
Intrusion detection system as a reasonable complement of Firewall can detect real-time computer and network intrusion events.
入侵检测系统作为防火墙的合理补充,能够实时地检测出计算机和网络中出现的入侵活动。
www.fabiao.net
6.
The firewall is the security system in-between the inside and outside network, responsible for controlling the visit to resources.
防火墙是在内部网与外部网之间实施安全防范的系统,负责对资源的访问控制。
dict.kekenet.com
7.
Configure transparent firewall, virtual firewall, and high availability firewall features on a security appliance.
配置透明模式防火墙,虚拟防火墙,高可用性等特性。
www.szedu.com.cn
8.
The father of the great firewall thinks it's an honour [to have invented it].
但是,防火长城之父以此[它的发明]为荣。
www.bing.com
9.
Another important control is the implementation of a personal firewall on all workstations.
另一个重要控制是在所有工作站安装启用个人防火墙。
blog.sina.com.cn
10.
Warning : Do not download or install this patch unless your Personal firewall module is currently version 1044.
警告:不要下载或安装此修补程序,除非您的个人防火墙模块目前版本1044。
www.nod32club.com
1.
And, advantage of detecting state firewall technology over traditional firewall technology was indicated.
并指出了状态检测防火墙技术与传统防火墙技术相比较的优势所在。
www.ceps.com.tw
2.
A closed society. Our first industry-specific firewall and VPN system for your company network: EAGLE.
一个安全隔离的系统我们为您提供的第一个应用于企业网络的工业级防火墙和VPN系统
bbs.hd-factc.com
3.
If there is a firewall, ensure that the SMTP Command Filters on the firewall do not filter the AUTH NTLM command.
如果有防火墙,请确保防火墙上的SMTP命令筛选器不筛选AUTHNTLM命令。
www.microsoft.com
4.
Without a firewall, an intruder could rework content, steal data or even take up residence and establish a private site on the Web server.
没有防火墙,入侵者可以修改内容、窃取数据、甚至留驻在网站服务器上建立私人网站。
www.1stenglish.com
5.
As the maintenance network security equipment: firewall also was everybody again familiar one kind of equipment.
作为维护网络安全的设备——防火墙也是大家再熟悉不过的一种设备了。
kns50.chkd.cnki.net
6.
Customers, business partners, colleagues, and guests can join a Web meeting, even across the firewall.
客户、业务合作伙伴、同事和访客能够加入一个Web会议,甚至可以越过防火墙加入到会议中。
www.ibm.com
7.
Also, the logic of the firewall application grid is likely to change a bit (more on this later).
此外,防火墙的应用网格的逻辑可能会改变一点(详见下文)。
bbs.kafan.cn
8.
Twitter, though blocked by the Great Firewall, has a small but fiercely loyal following on the mainland.
推特(twitter)虽然也被防火长城屏蔽,在中国大陆却有着数量虽少但十分坚定的追随者。
blog.sina.com.cn
9.
If both the novice and the expert are behind firewalls, the connection depends on the inbound configuration of the firewall.
如果初学者和专家都位于防火墙之后,连接将取决于防火墙的入站配置。
support.microsoft.com
10.
It is not suitable for passing data through a firewall but provides better performance when storing data.
它不适用于跨防火墙传递数据,但在存储数据时提供了更佳的性能。
msdn2.microsoft.com
1.
While SOAP was designed to work within existing Web application environments, the protocol may introduce firewall and routing problems.
虽然SOAP是被设计为与现存的Web应用环境一起工作,但这种协议可能会给防火墙及路由带来问题。
www.ibm.com
2.
The process of forwarding or rejecting traffic based on the contents of a state table maintained by a firewall .
基于状态的包过滤,按照防火墙维护的一个连接状态表来决定数据流量转发或者拒绝的过程。
dictsearch.appspot.com
3.
If QuickTime can configure itself for your firewall, you can now watch streaming QuickTime movies.
如果QuickTime自身就可以按照防火墙来配置,那么您现在就可以观看QuickTime流影片了。
docs.info.apple.com
4.
Today firewall is used for to protect the computer network to exempt is must been authorized personnel's harassment and hacker's invasion.
今天的防火墙被用来保护计算机网络免受非授权人员的骚扰与黑客的入侵。
zhidao.wangchao.net.cn
5.
If you have a personal firewall program installed, you might have to reconfigure or update the personal firewall program.
如果已安装了个人防火墙程序,则可能需要重新配置或更新该个人防火墙程序。
support.microsoft.com
6.
But it has not yet made that vital public pledge to do whatever it takes, without limit, to create a proper firewall and stop the panic.
但它还没有做出这一重大的公开承诺:毫无限制地采取任何措施,建立适当的防火墙,并遏止恐慌。
www.bing.com
7.
Private clouds use the concepts of public cloud storage but in a form that can be securely embedded within a user's firewall.
私有云使用公共云存储的概念,但是以可安全嵌入到用户防火墙内的形式。
www.ibm.com
8.
With the ECB unwilling to help, Europe's policymakers are scrambling for other ways to build the firewall.
由于欧洲央行不愿意帮忙,欧洲的政策决策者们苦苦寻求其他建立防火墙的方法。
bbs.ecocn.org
9.
Use WHOIS to look up the IP address' range, then block 'em with the server's firewall.
使用WHOIS查IP地址的范围,然后用服务器的防火墙阻止他们。
bbs.et8.net
10.
I still believe strongly in maintaining an appropriate firewall between commercial banking institutions and capital market instruments.
我仍然坚信,应该在商业银行机构与资本市场工具之间保持一道适当的防火墙。
www.ftchinese.com
1.
It typically lives between a firewall and a number of application servers.
它通常存在于防火墙和多个应用服务器之间。
www.ibm.com
2.
tcpdump is an essential tool for exploring low-level packet exchanges and verifying that your firewall is working correctly.
tcpdump是研究低级信息包交换和验证防火墙是否正常工作的必备工具。
www.ibm.com
3.
Where possible, filtering at the firewall is an extremely effective method of securing access to an ssh server.
情况许可的话,利用防火墙进行过滤是一个非常有效的方法来加固ssh服务器。
hi.baidu.com
4.
The firewall could be in a separate partition, fully protecting the back office.
这个防火墙可以在一个独立的分区中,充分地保护后台管理。
www.ibm.com
5.
Increase security by configuring the firewall to restrict access to the default endpoint to local client computers on a specific subnet .
通过将防火墙配置为限制访问特定子网上的本地客户机的默认端点,提高安全性。
www.bing.com
6.
These policies can be used to enable services, configure settings, and set firewall rules.
浙西策略可用于使能服务、配置设置及设定防火墙规则。
www.bing.com
7.
This paper introduces the basic content of network communications. It also discusses cryptography , user authentication, firewall etc.
介绍了网络安全的基本内容,简述了加密技术、份认证技术、火墙技术等基本的信息安全技术。
dictsearch.appspot.com
8.
The system served as a kind of firewall, making it much more difficult for law enforcement to track the masterminds.
该转移系统类似网络防火墙,防火墙的存在使得执法人员追踪幕后操纵者的希望愈发渺茫。
www.bing.com
9.
Virtual Private Network and Firewall are two very important defense facilities of the current network security defense system.
虚拟专用网和防火墙是当前网络安全防御体系中两个非常重要和常见的防御设施。
kns50.chkd.cnki.net
10.
Sample target applications are a firewall, a password manager, Internet acc email synchronisation .
预计中的应用程序的例子有防火墙、口令管理器、互联网接入以及电子邮件同步等。
dictsearch.appspot.com
1.
Also, the Extended Simple Mail Transfer Protocol (ESMTP) command X-LINK2STATE must not be blocked by a firewall.
此外,防火墙不得阻止扩展简单邮件传输协议(ESMTP)命令X-LINK2STATE。
technet.microsoft.com
2.
Patients' privacy could not be guaranteed because our replies would not be secure outside the university's firewall.
假如在大学的防火墙外(外网)对病人进行答复又不安全,病人的隐私得不到保证。
blog.163.com
3.
That means you don't have to set up port-forwarding, turn your Firewall or NAT off, or do anything different than before.
这意味着您不必设置端口转发,把你的防火墙或NAT关闭,或做任何事情比以前有所不同。
zhidao.baidu.com
4.
This implies having a list of well known client IP Port entries which are granted access to the internal Dispatcher URI by a firewall.
这意味着防火墙有一个已知的客户机IP和端口条目列表,它们有权访问内部DispatcherURI。
www.ibm.com
5.
If you can connect after disabling the firewall, then you can adjust the firewall rules on your systems to allow the traffic to pass.
如果禁用防火墙之后仍不能连接,那么您可以调整您的系统上的防火墙规则,以便允许流量通过。
www.ibm.com
6.
Deploy KILL-WEB applies firewall, through its cache primitive website page can defend its webpage is not distorted effectively.
部署KILL-WEB应用防火墙,通过其缓存原始网站页面可有效防护其网页不被篡改。
www.nwpu.net
7.
Firewall gets this information from the connection tracking state of the packets.
防火墙可以从信息包的连接跟踪状态获得该信息。
www.ibm.com
8.
But there has to be an internal firewall that separates proprietary trading from commercial banking.
但必须设置一个内部防火墙,将自营交易与商业银行业务隔离开来。
www.ftchinese.com
9.
Firewall has made motion, acquiesce can see in systematic firewall not the project that open allows to pass is ticked off to choose.
防火墙作过手脚,在系统防火墙可看到默认未开启答应通过的项目都被勾选。
dictsearch.appspot.com
10.
The network security, this paper dielectric from the firewall, attack and emergency response, intrusion detection, several simple hackers.
介此网络安全,本文从防火墙、攻击与应急响应、入侵检测、黑客等几点进行简单的探讨。
wenda.tianya.cn
1.
A personal firewall helps protect your computer by limiting the types of traffic initiated by and directed to your computer.
个人防火墙通过限制通信类型来保护您的计算机。
www.ibm.com
2.
Nothing matters more than putting a firewall around the likes of Italy and Spain.
任何事都比在意大利和西班牙周围建立一个防火墙来的重要。
www.bing.com
3.
Setting this registry value on every domain controller inside the firewall does not affect performance.
在防火墙内的每个域控制器上都设置此注册表值并不影响性能。
support.microsoft.com
4.
Thus, he is wary of any venture that deploys behind the firewall.
因而,他对那些在防火墙后面部署软件的公司持谨慎态度。
www.bing.com
5.
Traditional static defense means such as firewall and data encryption have been unable to fully meet the requirements of network security.
传统的防火墙、数据加密等静态防御方式已不能完全满足网络安全的要求。
www.fabiao.net
6.
Organizations cannot expose a database through a corporate firewall.
组织不能通过公司防火墙公开数据库。
www.ibm.com
7.
Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next.
它的作用类似于一堵防止火灾从一处蔓延到另一处的实实在在的防火墙。
www.educity.cn
8.
The settlement also included a provision that securities firms erect a firewall separating analysts from investment-banking operations.
和解还包括这样一项条款,即证券公司必须建立一道防火墙,将分析师与投行业务隔离开来。
cn.wsj.com
9.
Whether your organization has an existing network or is setting up a new one, firewall planning is extremely important.
无论您的组织已有现成的网络,还是正在搭建一个新的网络,防火墙的规划都是一个极其重要的考虑因素。
technet.microsoft.com
10.
Hackers view this "feature" as a free ride on the XMLmobile, waving at the firewall sentries as they happily pass by.
黑客将这种“特性”看作XML提供的免费服务,他们可以利用这种特性轻松地通过防火墙。
www.ibm.com
1.
At present time, network security technology has become the hot issue and the firewall technology is one of them.
网络安全技术是当前谈论的热门话题,防火墙技术就是其中一种。
it.bab.la
2.
Network Address Translation (NAT) is sometimes deployed with a firewall.
网络地址转换(NAT)有时会与防火墙一起部署。
www.ibm.com
3.
Install virus firewall and network firewall, undertake updating to virus library regularly, check poison poison by the plan.
安装病毒防火墙和网络防火墙,定期对病毒库进行更新,按计划查毒杀毒。
www.nwpu.net
4.
The detection will tell: whether the host computer is online, the route to the host computer and the information about firewall.
扫描预探测包括了主机在线探测、网络路径探测、防火墙探测等多项信息的探测。
www.magsci.org
5.
For most of company and organizations, which are lack of the budget, the firewall which are developed by myself, is a very good choice.
对于大多数缺乏资金预算的企事业单位,结合单位实际自主开发防火墙,保护内网安全确实是一个性价比较高的选择。
lib.nwnu.edu.cn
6.
If you are okay with security and firewall issues, the rest of the issues can be dealt with.
如果您能够处理安全性和防火墙问题,那么其他问题也能得到处理。
www.ibm.com
7.
Thus firewall configuration can be tailored to suit any specific need and any security level requirement.
因而,可以定制防火墙配置来满足任何特定需求和任何安全性级别需求。
www-128.ibm.com
8.
It is an attempt to build a vast cyber dam alongside the existing Great Firewall.
这是试图在现有的“大防火墙”之外,再构建一座巨大的网上大坝。
www.ftchinese.com
9.
A firewall is simply a group of components that collectively form a barrier between an organization's intranet and the Internet.
防火墙是简单的一组部件之间的障碍,集体形式组织的局域网和互联网
www.baike.com
10.
Is one of the major Linux Firewall distributions.
是主要的Linux防火墙发行版本之一。
www-128.ibm.com
1.
The service requestors will send the SOAP request to the Gateway, which will invoke the service inside the firewall as shown in Figure 1.
服务请求者将向Gateway发送SOAP请求,Gateway将调用防火墙内部的服务,如图1所示。
www.ibm.com
2.
Scan Activity Tab does not provide the correct status of the Antivirus and Firewall module.
扫描活动面板无法提供正确的反病毒和防火墙模块状体。
bbs.kafan.cn
3.
A simple and fast solution for remote control, desktop sharing and file transfer that works behind any firewall and NAT proxy.
一种远程控制,桌面共享和文件传输的防火墙和NAT背后代理作品,简单而快速的解决方案。
www.maiyadi.com
4.
The complexity of a jerry-rigged firewall will undermine its effectiveness.
一个偷工减料的防火墙,其复杂性将削弱其效力。
www.bing.com
5.
In many cases the firewall is still the choke point of the bandwidth.
在很多场合下,防火墙的性能已经成为网络带宽的瓶颈问题。
www.fabiao.net
6.
Firewall best practices and standard default firewall configurations can help protect networks from attacks that . . .
采用防火墙最佳做法和标准的默认防火墙配置,有助于保护网络免受从企业外部发起的攻击。
search.ggiiss.com
7.
To modify firewall settings, you must be logged on locally and you must be a member of the local Administrators group.
若要修改防火墙设置,必须从本地登录,并且您必须是本地管理员组的成员。
msdn2.microsoft.com
8.
And since the script shields me from the task of editing firewall rules by hand, it eliminates a major source of errors.
由于这个脚本可以让我不必手工编辑防火墙规则,这就消除了出错的主要根源。
www.ibm.com
9.
To suit specific requirements, you can add, delete, or even rearrange the order of the bricks in a firewall.
要满足特定需求,您可以增加、删除甚至重新设定防火墙的配置选项。
www-128.ibm.com
10.
At minimum, any reasonable firewall should have two separate interfaces: one to connect to the internal network and another to the external.
任何可用的防火墙至少应有两个独立的接口,一个连到内部网络,另一个连到外部网络。
www-128.ibm.com
1.
This causes the warning shown in Figure 17 to appear, confirming that the firewall has been disabled.
这将导致出现图17所示的警告信息,确认防火墙已经被禁用了。
www.ibm.com
2.
Such restrictions on the relatively strong, and generally through a proxy server or firewall to do the filtering hardware.
这类限制就比较强了,一般是通过代理服务器或者硬件防火墙做的过滤。
wenda.tianya.cn
3.
Consider the equivalent of a safe word for when the really important stuff needs to punch through your firewall.
考虑一下相同安全的命令对于真正重要的东西穿过你防火墙的情形。
www.bing.com
4.
Why must it be built differently than conventional single-tenant, behind-the-firewall identity management software?
为什么它必须以与传统单租户、防火墙后身份管理软件不同的方式来开发呢?
www.infoq.com
5.
Then introduce a firewall realize three basic technologies: packet filtering, application and monitoring model agent.
然后介绍了防火墙三种基本实现技术:分组过滤、应用代理和监测模型。
it.zhishi.sohu.com
6.
The firewall sit between the power phone system internal network and the public data network.
防火墙位于强力电话系统内部网络与公共数据网络之间。
zhidao.baidu.com
7.
Web content syndication is an area of growing importance on the Internet and behind the firewall.
在Internet上,Web内容联合是防火墙后面日渐重要的一个领域。
www.ibm.com
8.
Maintenance for network device, including Firewall, Router, Switches, PABX, Monitoring System.
维护网络设备,包括防火墙,路由器,交换机,程控电话,监控系统等。
xiangtan.01hrhunan.com
9.
Spain, lacking the firewall that Portugal had previously provided, could be feeling distinctly uneasy.
缺乏葡萄牙先前提供的防火墙,西班牙可能会明显感觉不安。
www.ecocn.org
10.
Worse, these programs may be running on special purpose machines or behind security and firewall protections.
更糟的是,这些应用程序可能运行在企业内部某台特定用途的电脑上或者隐身在内部防火墙和安全防护设备的后面。
www.bing.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/2/6 0:32:09