单词 | firewall |
释义 | firewalls是firewall的复数
复数:firewalls 例句释义: 防火墙,风火墙,马头墙,介绍防火墙,防火墙及其常见问题,防火墙运作原理 1. Web service interactions in the grid must be able to traverse corporate firewalls across the enterprises. 网格中的Web服务交互必须能够跨企业穿越公司防火墙。 www.ibm.com 2. With TeamViewer you can remotely control any computer as if you were sitting right in front of it - even through firewalls. 随着TeamViewer您可以远程控制任何一台电脑就好像你坐在它前面的权利-即使是通过防火墙。 www.pb86.net 3. In cases like this, business logic needs to be kept behind a secure set of firewalls (often called a DMZ). 在类似这种情况下,需要将业务逻辑置于一组安全防火墙之后(经常称为DMZ)。 www.ibm.com 4. You might hear this referred to as "setting up the encryption domain" for the firewalls. 您可能会听到这被称之为防火墙“设置加密域”。 www.ibm.com 5. Also it uses a non-standard port, so it is often blocked by client firewalls. 由于使用了非标准的端口,这样客户端防火墙经常会阻止其运行。 www.infoq.com 6. Although, it might be that the packets that traceroute uses to trace the route may also be blocked by firewalls. 但是,traceroute用来跟踪路由的数据包也可能被防火墙阻止。 www.ibm.com 7. The rule of thumb is to have at least three logical instances of an operating system and similar firewalls, routers, switches, and so on. 根据经验,至少要三个操作系统逻辑实例和类似防火墙、路由器、交换机等。 www.ibm.com 8. Some firewalls are nice, and let you idle for up to a day or so; some are gestapo and terminate your session after 5 minutes. 一些防火墙比较友好,允许你的空闲会话时间为一天甚至超过一天;另一些却如盖世太保,5分钟空闲就终止你的会话。 blog.sina.com.cn 9. The ideal configuration is to have direct network connectivity between the forests with no firewalls. 理想的配置是在林之间建立直接的网络连接,而不设置防火墙。 technet.microsoft.com 10. Luckily, most modern firewalls automatically update them selves once a week. 幸运的是,大多数现代防火墙每星期都会自动升级。 www.bing.com 1. Electronic money (in the form of digital bits) requires a complex set of codes, passwords, firewalls, etcetera. 电子货币(形式的数位比特)需要一套复杂的代码,密码,防火墙,等等。 www.cyut.edu.tw 2. Collect information about network switches, routers, firewalls, and any other devices. 收集关于网络交换机、路由器、防火墙和任何其他设备的信息。 www.ibm.com 3. Although, they do not perform any transformation, firewalls limit consumer access to only predefined points in the domain boundaries. 尽管,防火墙不去执行任何转换,但是它们限制消费者仅能访问域边界内预先定义的点。 www.ibm.com 4. Firewall vendors offer VPNs that are essentially firewalls in combination with a variety of security measures and management tools. 有些防火墙供应商也提供vpn,它们基本上是防火墙与各种安全措施与管理工具的结合。 www.hotdic.com 5. In Britain officials are pondering plans for banks to erect firewalls between the different parts of their businesses. 英国官员正为银行制订方案,以在英国企业不同部门间设立防火墙。 www.ecocn.org 6. Firewalls are only a part of the security equation, insuring that traffic only takes place on specified ports between specified addresses. 防火墙只是保证通信仅仅在特定地址之间的指定端口上进行的安全性因素之一。 www-128.ibm.com 7. IBM only performs testing of the out-of-the-box hypervisor edition image on isolated networks, behind multiple firewalls. IBM只是在多个防火墙后面的隔离网络上执行开箱即用虚拟机监控程序版本映像的测试。 www.ibm.com 8. These firewalls act as a security buffer between the corporation's private network and all external networks, including the Internet. 这些防火墙,在公司专用网络与包括因特网在内的所有外部网络之间,起到安全缓冲区的作用。 www.educity.cn 9. There are three basic techniques used for firewalls: packet filtering, circuit gateway, and application gateways. 有三种基本技术用于防火墙:包过滤,电路网关,应用网关。 www.docin.com 10. One of the effective ways to prevent risk contagion is to set up firewalls between banking and capital markets. 防止风险蔓延的有效方式之一,就是在银行业和资本市场之间建立防火墙。 www.ftchinese.com 1. You'll find honeypots, firewalls, IDS, and several network utilities to help you map your heterogeneous network better. 您会发现“粘蜜罐”、防火墙、IDS以及一些网络工具可帮助您更好地映射异构网络。 www.ibm.com 2. Only qualified commercial banks are allowed to participate in non-banking activities, and have strict firewalls separating them. 在中国,只有合格的商业银行才能获准从事非银行业活动,并在两者之间建立了严格的防火墙。 www.ftchinese.com 3. Firewalls can also offer peace of mind to the company by restricting WWW access to personnel making outgoing connections to the Internet. 防火墙通过限制(本公司)人员向外接到互联网进行www访问,也让公司相安无事。 www.hotdic.com 4. Most new computers come with a built-in firewall. Firewalls are a necessary part of safe web surfing. 大部分新电脑内嵌有防火墙。防火墙是上网安全保障的必要部分。 www.59edu.com 5. The specifics of configuring firewalls will not be covered here, since firewall configuration is specific to the each firewall vendor. 这里将不讨论配置防火墙的细节,因为防火墙配置是特定于每个防火墙厂商的。 www.ibm.com 6. Register edition of " Remote Control King" controlled client will not be killing antivirus software, you can pass through network firewalls. 注册版“远控王”的受控端不会被杀毒软件查杀,可以穿越网络防火墙。 joys99.com 7. Firewalls in this picture emulate the traditional demilitarized zone (DMZ) setup for corporate firewalls between the intranet and Internet. 本图中的防火墙仿效用于公司内部网与互联网之间防火墙的传统非军事区(DMZ)设置。 www.ibm.com 8. You could also consider r? e configuring the firewalls to allow packets from the relocatable address and the stationary address. 你也可以考虑重新配置防火墙,接受来自可再定位地址和固定地址的数据包。 dictsearch.appspot.com 9. The article first introduces the principles of setting up the firewalls, then the standards of selecting firewalls. 通过介绍防火墙的部署原则,从防火墙部署的位置详细阐述了防火墙的选择标准。 kns50.chkd.cnki.net 10. The IBM project, while groundbreaking, will not make it easier for companies to access Second Life from behind their own firewalls. IBM项目的启动,将不会简化各公司通过他们自有的防火墙去访问SL。 www.bing.com 1. If the amount of data in a hidden field becomes very large, some proxies and firewalls will prevent access to the page that contains them. 如果隐藏域中的数据量过大,某些代理和防火墙将阻止对包含这些数据的页的访问。 msdn2.microsoft.com 2. Security consists of more than just firewalls at the edge of your network protecting you from the "outside. " 安全性不仅仅是在网络边界上保护系统不受“外部”攻击的防火墙。 www.ibm.com 3. NOTE: Some personal firewalls block the operation of the local HTTP service, so you may have to adjust your firewall settings. 注意:某些个人防火墙会阻塞本地HTTP服务的操作,因此务必调整好防火墙的设置。 www.ibm.com 4. A front-end server was frequently located in a perimeter network between the external and internal firewalls. 前端服务器通常位于外部和内部防火墙之间的外围网络中。 technet.microsoft.com 5. Some hosts are behind firewalls or other similar layers of software that prohibit or hinder incoming connections. 某些主机可能有防火墙或是其他类似的软体层保护,禁止或阻碍外来的连线动作。 edba.ncl.edu.tw 6. Security consists of more than just some firewalls at the edge of your network protecting you from the outside. 安全性不仅仅涉及到在网络边缘保护您不受外部攻击的防火墙。 www-128.ibm.com 7. To thwart this activity, state-of-the-art firewalls control inbound and outbound communications. 到阻碍这次活动,艺术级的防火墙控制入站和出省的通讯。 bbs.translators.com.cn 8. So providing server redundancy will not help unless power supplies, networks, firewalls etc. are all provided with redundant capacity. 因此提供服务器冗余性并不能带来帮助,除非电力供应、网络、防火墙等都以冗余容量被提供。 www.ibm.com 9. While these users are technically literate, network services setup and firewalls are not a normal part of their knowledgebase. 虽然这些用户懂得相关技术,但网络服务设置和防火墙可能并不属于他们的知识库中的一部分。 www.ibm.com 10. Also note that the HTTP DELETE, PUT, TRACE, and OPTIONS methods are not frequently used and are often blocked by firewalls. 另请注意,HTTPDELETE、PUT、TRACE和OPTIONS方法使用并不频繁,而且经常被防火墙阻止。 www.ibm.com 1. In addition, HTTP traffic is usually allowed through firewalls and other network traffic barriers, as we'll discuss later. 此外,通常允许HTTP流量可以通过防火墙和其它网络流量屏障,这一点我们会在后面讨论。 www.ibm.com 2. Companies can also install firewalls, which form a barrier between the internal network and the public internet. 公司也可以安装防火墙,这样可以在内部网和公共网络之间设置屏障。 www.hotdic.com 3. If both the novice and the expert are behind firewalls, the connection depends on the inbound configuration of the firewall. 如果初学者和专家都位于防火墙之后,连接将取决于防火墙的入站配置。 support.microsoft.com 4. Proficient knowledge of networks, familiar with routers, firewalls and other network equipment, a strong awareness of network security. 精通掌握网络知识,熟悉路由器、防火墙等网络设备,有较强的网络安全意识。 www.00105.net 5. I've tried a range of clever ideas for tweaking the ssh protocol or my own firewalls to keep out "black hats. " 我已经尝试过许多聪明的想法,用于调整ssh协议或自己的防火墙,以阻止“黑帽”黑客(指专门利用网络技巧入侵网络进行破坏的人,译者注)。 www.ibm.com 6. However, earlier versions of Remote Desktop Connection cannot connect to remote computers across firewalls and network address translators. 但是,早期版本的远程桌面连接无法连接到远程计算机跨防火墙和网络地址转换器。 support.microsoft.com 7. Stealth firewalls make a host practically invisible on the Internet, except to authorized communications. 在因特网上秘密行动防火墙使一个主人实际上看不见,除了到批准的通讯。 bbs.translators.com.cn 8. This allows the traffic to traverse network firewalls without requiring RPC ports to be opened. 这样,不必打开RPC端口即可使通信通过网络防火墙。 technet.microsoft.com 9. Firewalls are expensive, but they remain the most effective safeguard against the unauthorized intrusion of sensitive data. 防火墙是很贵的,但它们是防止对敏感数据非法窃取的最有效手段。 dictsearch.appspot.com 10. Network security is provided by high-performance, state-of-the-art firewalls. 网络安全通过高性能、先进的防火墙提供。 www.ibm.com 1. Azure AppFabric is a message bus, with the goal of making authentication and message passing easier, especially across firewalls. AzureAppFabric是一个消息总线,目标是简化身份验证和消息传递,尤其在跨防火墙的时候使其更容易。 www.infoq.com 2. HTTP can go through most firewalls, providing a larger audience for your content. HTTP能通过大多数防火墙,为您的内容提供更多的用户。 www.ibm.com 3. Corporate security organizations set up firewalls to help prevent improper use of the corporate network. 企业安全组织设立了防火墙以协助防止对企业网络的不正当使用。 www-128.ibm.com 4. Remember that most firewalls don't allow TCP port 901 through their filters. You may have to adjust your rules for this traffic to pass. 注意大部分防火清都不允许通过端口901的TCP链接。你可以调整你的防火墙策略来允许这个链接。 wiki.ubuntu.org.cn 5. This will be different from servlet response time due to network overhead, additional hops through Web servers and firewalls, etc. 由于网络开销、通过Web服务器和防火墙的额外跳点等,它不同于servlet响应时间。 www.ibm.com 6. They could be the firewalls of any building. 它们可能是任何一座楼房的隔火墙。 www.bing.com 7. Bottlenecks through firewalls and other network components could introduce delays that are confirmed by recording servlet response times. 通过防火墙和其他网络组件的瓶颈可能带来被记录servlet响应时间所证实的延迟。 www.ibm.com 8. I finally got tired of my ssh sessions getting disconnected at places where I don't control the firewalls, and figured out how to stop it. 我最终疲于我的ssh连接会话被我不能控制的防火墙断开,并找出了阻止它的方案。 blog.sina.com.cn 9. The reason that some firewalls experience this problem is due to a port conflict. 某些防火墙之所以会遇到此问题,是因为端口冲突。 e-support.hp.com.cn 10. The Indigo connector has a build in support for intermediaries including firewalls, proxies, and application-level gateways. Indigo连接器提供了一个构建(Build)为中介提供支持,包括防火墙、代理和应用程序级网关。 www.infoq.com 1. The office Wi-Fi, however, isn't behind firewalls and never gives me trouble for other tests. 但是,我办公室的无线网络并未加设防火,进行其它测试时也从没出现过问题。 chinese.wsj.com 2. The software exploited poorly protected firewalls to infect virtually any computer connected to the Internet. 这个软件利用保护不力的防火,几乎可影响任何连接互联网的电脑。 cn.wsj.com 3. Routers, gateways, firewalls, and network collisions could all be a source of performance bottlenecks. 路由器、网关、防火墙和网络冲突都可以造成性能瓶颈。 www.ibm.com 4. they have devised sophisticated methods of electronic signatures , encryption , certification , firewalls and the like. 电子签署加密技术认证防火墙等等,都是专家设计的精密保安方法。 www.ichacha.net 5. Everything from routing problems to firewalls (usually firewalls) can stop two users from creating a connection over which to transfer data. 从路由到防火墙都可以阻止两个人建立传输数据的连接。 www.tianya.cn 6. You should also check that your system firewalls do not block interactive content. 你还需要检查一下你的系统防火墙,不要拦截交互内容。 wiki.redsaga.com 7. We have further strengthened our firewalls that separate analysts from commercial activities. 我们进一步强化了分离投资者与商业活动之间的防火墙。 www.bing.com 8. Most major corporations today use special hardware and software called firewalls to control access to their internal computer networks. 今天,大多数大公司都使用被称为防火墙的专门硬件和软件,来控制对其内部计算机网络的访问。 cs.jnu.edu.cn:8080 9. Some firewalls place a greater emphasis on blocking traffic, while others emphasize permitting traffic. 有些防火墙更注重阻档流量,而另一些则关注允许流量通过。 www.ibm.com 10. Firewalls and switches are better equipped to recognize when packets are coming from IP addresses that could not be valid. 更好的方法是装备防火墙和交换机,从而识别来自无效IP地址的数据包。 www.ibm.com 1. The procedure may involve port scans on servers and firewalls, audits of security fixes, and third-party penetration tests. 此过程可能涉及服务器和防火墙上的端口扫描、安全修复程序审核和第三方渗透测试。 technet.microsoft.com 2. Had today's rescue mechanism and firewalls been created from the outset, the crisis might not have spread so far. 要是欧元创立之初就已经构建了今天的救助机制和防火墙措施,这场危机或许不会波及至如此大的范围。 www.ecocn.org 3. This document describes a protocol for the application-layer traversal of IP network firewalls. 本文档描述了一个应用层上的ip网络防火墙协议。 www.showxiu.com 4. The common security method that can be used for protecting network is safeguard system based on firewalls. 实现网络安全保障最常用的手段是以防火墙为核心的防卫系统。 www.fabiao.net 5. Commonly firewalls are installed at egress points, where your local network connects to the internet. 常见的防火墙是安装在出口点,在您的本地网络连接到互联网。 wenku.baidu.com 6. But investigations into these firewalls have revealed glaring weaknesses. 但以前对这些防火墙的调查已经显示其突出的缺陷。 www.bing.com 7. Firewalls must be in place to protect your company's assets. 必须配备防火墙来保护您公司的资产。 www.ibm.com 8. Personal firewalls run on PC's along with all of the other applications required by the PC user. 个人电脑防火墙跑的同所有其他应用所需的微机用户。 www.52zhishi.cn 9. Because very little data is analyzed and logged, filtering firewalls take less CPU and create less latency in the network. 因为几乎不对数据进行分析和日志记录,所以过滤防火墙在网络中占用较少的CPU且引起的延迟也不长。 www.ibm.com 10. In the network layer, firewalls can be installed to keep good packets and bad packets out. 在网络层,可以安装防火墙保护正常数据包,阻止恶意数据包。 wenku.baidu.com 1. HTTP allows XML to be transferred across firewalls. HTTP允许穿过防火墙传输XML。 msdn2.microsoft.com 2. Firewalls allow for enforcement of the domain encapsulation. 防火墙允许增强对域的封装。 www.ibm.com 3. Basic authentication is not affected by reverse proxying or Web publishing and works regardless of firewalls. 基本身份验证不受反向代理或Web发布的影响,其运作与防火墙无关。 technet.microsoft.com 4. Separate your production networks from your internal network using firewalls. 可以使用防火墙将您的生产网络与内部网络分开。 www-128.ibm.com 5. Moreover, on the back end, Web services run outside corporate firewalls and interact with each other using open messaging protocols. 此外,在后端,Web服务运行在企业防火墙之外并使用开放消息传递协议来彼此交互。 www-128.ibm.com 6. Too many memory accesses slow down the process of high-speed data streams in NP-based firewalls significantly. 基于网络处理器的防火墙中大量的内存访问会影响对高速网络流的处理速度。 www.ceps.com.tw 7. When you are installing the server inside a Windows domain, configure interior firewalls to permit Windows Authentication. 如果在Windows域内部安装服务器,请将内部防火墙配置为允许Windows身份验证。 msdn2.microsoft.com 8. These firewalls, while likely more permissive than the Internet-facing firewalls, can still block numerous forms of attack. 这些防火墙看似比面向Internet的防火墙随意得多,但仍然能够防御许多形式的攻击。 www.ibm.com 9. Many Tor users are stuck behind firewalls that only let them browse the web, and this change will let them reach your Tor relay. 许多Tor用户由于防火墙的阻挡只能浏览Web,这种修改使他们能够连接到你的Tor中继。 tor.ccc.de 10. Even the crankiest firewalls keep at least one of ports 21, 8080, 25, and 110 open. 即使是最严密的防火墙也要打开端口21、8080、25和110中的一个。 www.ibm.com 1. Do HTML5 Web Sockets handle firewalls and proxy server issues better than Comet? HTML5WebSockets是否能比Comet更好的处理防火墙与代理服务器问题呢? www.infoq.com 2. I wish the commission had insisted on the separation of institutions and not just firewalls inside them. 我希望该委员会坚持机构分离,而不是仅仅在机构内部设置防火墙。 www.ftchinese.com 3. It is the place that you can determine what files can pass through your firewalls. 在这里,您可以决定哪些文件可以穿过防火墙。 www.ibm.com 4. Setting up multi-level firewalls is one example of building a defense mechanism layer. 建立多级防火墙是构建防御机制层的一个例子。 www.ibm.com 5. Using a non-standard port also means that any firewalls need to be reconfigured if external access is needed. 使用非标准端口还意味着如果需要外部访问,就需要重新配置所有的防火墙。 www-128.ibm.com 6. Firewalls operate at the ground level of most secure locations, and OpenBSD's implementation of packet filtering is top notch. 防火墙从底层对大多数安全单元进行操作,并且OpenBSD的包过滤实现是非常优秀的。 www.ibm.com 7. Globus Toolkit addresses this and allows for setting up GSI and other Globus communication to coexist with existing firewalls. GlobusToolkit解决了这个问题,并允许设置GSI或其他Globus通信与现有的防火墙共存。 www-128.ibm.com 8. NAT firewalls like to time out idle sessions to keep their state tables clean and their memory footprint low. NAT防火墙喜欢对空闲的会话进行超时处理,以确保它们状态表的干净和内存的低占用率。 blog.sina.com.cn 9. A common technique is to setup a demilitarized zone (DMZ) using two firewalls. 常用的技术是使用两个防火墙来建立一个非武装区域(DMZ)。 www.ibm.com 10. Firewalls block data and requests depending on the type of application being accessed. 防火墙数据块的请求要求根据应用程序的类型被访问。 wenwen.soso.com 1. Never mind firewalls and company policies blocking access to dodgy websites . 不用担心防火墙和公司禁止访问无聊网站的政策。 www.ftchinese.com 2. It allows the creation of customized rules for firewalls that govern packet filtering. 它允许为防火墙建立可定制化的规则来控制信息包过滤。 www-128.ibm.com 3. Filtering firewalls are more or less transparent to the user. 过滤防火墙对于用户或多或少是透明的。 www.ibm.com 4. Firewalls, server configuration, and network issues are where you want IT people to focus. 防火墙,服务器配置和网络问题是你希望IT人的焦点。 www.b2c-seo.com 5. There are now probably more than a billion entries, counting all the DNS names hidden behind firewalls. 现在可能超过十亿个入口,数一数防火墙后面所有DNS域名。 www.bing.com 6. Installing and configuring routers, switches, firewalls, and load balancers. 安装和配置路由器,开关,防火墙和负载平衡器。 www.job956.com 7. Defending the network when intrusion detection and firewalls fail. 当攻击检测和防火墙失败时的网络防御。 www.flukenetworks.com.cn 8. Young Syrians have long traded proxy servers allowing them to bypass the firewalls and access the sites. 叙利亚年轻人长期借助代理服务绕过防火墙去访问这些网站。 www.ecocn.org 9. Install personal firewalls for the client machines. 为客户端机器安装个人防火墙。 www.ibm.com 10. It enables connections to remote computers across firewalls. 它允许通过防火墙连接到远程计算机。 support.microsoft.com 1. Most personal firewalls pop-up windows to notify the user about unknown network traffic. 大多数个人防火墙弹起窗口通知用户网络流量约不明。 www.52zhishi.cn 2. This stops ACK forgeries from passing through SYN-blocking firewalls. 这将停止从应答伪造通过同步阻塞防火墙。 renheshi.com 3. Companies are spending a lot of money on firewalls and filtering products, but in the end, users will always find a way around these. 虽然公司在这些防火墙和过滤产品上花了不少钱,但是用户最终还是能找到规避的办法。 www.bing.com 4. Include the locations of firewalls and perimeter networks. 包括防火墙和外围网络的位置。 technet.microsoft.com 5. Firewalls offer the most security for Internet connectivity. 防火墙为Internet连接提供最高的安全性。 technet.microsoft.com 6. Good personal firewalls make personal computers hard to find and harder to attack. 好的私人的防火墙努力做个人计算机发现并且更困难攻击。 bbs.translators.com.cn 7. Because the questions are all the intrusions based on the content, the traditional firewalls have no effect on them. 由于上述问题都属于基于内容的攻击形式,传统的防火墙对此无能为力。 www.fabiao.net 8. There's also information on buffer overflows, firewalls, intrusion detection, and lots more. 还有有关缓冲区溢出、防火墙、入侵检测等更多内容。 www.ibm.com 9. Firewalls play a key role for adding these extra layers of security protection. 在增加这些额外层次的安全保护当中,防火墙扮演着重要的角色。 www.ibm.com 10. In some cases, firewalls between Client Security servers should be disabled. 在某些情况下,应禁用ClientSecurity服务器之间的防火墙。 technet.microsoft.com 1. A world protected by firewalls, passwords and the most advanced security systems. 它由防火墙、密码和最尖端的安全系统层层保护。 www.hotdic.com 2. Some third-party firewalls or proxy servers apply their own message header size limits. 某些第三方防火墙或代理服务器应用其自身的邮件头大小限制。 technet.microsoft.com 3. It also allows configuration of stateful firewalls. 它还允许配置有状态的防火墙。 www.ibm.com 4. Yet these measures are essentially firewalls. 这些措施本质上还是防火墙而已。 www.bing.com 5. Because voice traffic is sensitive to delays, traditional firewalls that inspect packets can't be used. 由于语音数据对延迟敏感,传统防火墙使用的数据包检测技术不适用了。 dream4ever.org 6. The ability of RAT servers to initiate connections can also allow some of them to evade firewalls. RAT病毒服务器这种激活连接的能力,也能让它们中的一些可以入侵防火墙。 blog.donews.com 7. Some Firewalls or mail servers strip away any message they don't recognize. 有些防火墙或者邮件服务器去掉所有他们不能识别的信息。 www.bing.com 8. MSN is sensitive when it comes to firewalls and port forwarding. MSN对防火墙和端口转发非常敏感。 www.bing.com 9. This section describes how HTML5 Web Sockets work with load-balancing routers and firewalls. 这一节描述了HTML5WebSocket是如何与负载平衡路由器和防火墙一起工作的。 www.infoq.com 10. Firewalls need to allow a non-standard port (other than 80) for client sockets to connect back to the server. 防火墙需要允许客户端套接字通过非标准端口(非80端口)连接到服务器。 www.ibm.com 1. We cannot retreat behind a Maginot Line of firewalls. 我们没有办法的退回到防火墙的马其诺防线之后。 dongxi.net 2. We'll describe the solution below, but first let's talk about firewalls. 我们将在后面描述解决方案,但首先让我们讨论一下防火墙。 www.ibm.com 3. We are the authorised distributor and training centre for major i-security products such as firewalls, IDS and authentication devices. 我们是权威的组织机构和培训中心,为一些主要的安全产品如防火墙、IDS及入侵检测验证提供服务。 www.lietou.com 4. For added security, you should limit traffic across firewalls to only the floating IP address that is passed between the LVS directors. 为了更加安全,您应该限制穿过防火墙的通信量,只允许浮动IP地址在LVS控制器之间传递。 www.ibm.com 5. Personal firewalls are normally designed to protect only the PC upon which they are installed. 旨在保护个人防火墙通常只在个人电脑所安装的。 www.52zhishi.cn 6. See Resources for more details about firewalls. 有关防火墙的更多信息,请参看参考资料。 www.ibm.com 7. Determining the type of packet filters and firewalls in use. 确定所用的包过滤程序或防火墙的类型 blog.sina.com.cn 8. MS81: MQIPT -- An additional product that works in conjunction with MQ to tunnel connections through firewalls via SSL or HTTP(S). MS81:MQIPT——与MQ协同工作的附加产品,其采用SSL或HTTP(S)来通过防火墙建立连接隧道。 www.ibm.com 9. Firewalls and VPN solutions: is the market burning out? 防火墙与VPN解决方案:气数殆尽的市场吗? www.giichinese.com.cn 10. The importance of firewalls in protecting servers from direct Internet access. 防火墙在防止对服务器进行直接Internet访问方面的重要性。 technet.microsoft.com 1. Others want to move components off their extranets and place them behind their firewalls because of an acquisition or merger. 另一些则由于收购或者合并,希望把外网上的组件移到防火墙之内。 www.ibm.com 2. It is my understanding that only with proper firewalls between them can banks and capital markets function as two engines of growth. 在我看来,只有在两者之间保持适当的防火墙,银行与资本市场才能各自发挥出增长引擎的作用。 www.ftchinese.com 3. NOTE: The targeted server is located between two firewalls. 注意:目标服务器位于两个防火墙之间。 www.ibm.com 4. Items such as firewalls or security application components require verification before supporting live data. 诸如防火墙或安全应用程序组件等项目需要在经过验证后才能支持实时数据。 www.ibm.com 5. You may have firewalls blocking the ports. 您的防火墙可能会阻塞端口。 www.ibm.com 6. If a hidden field becomes too large, some proxies and firewalls will prevent the page from being posted. 如果隐藏字段太大,一些代理和防火墙将阻止发送此页。 msdn2.microsoft.com 7. Even though it is more secure, NTLM may not work with firewalls that examine and modify traffic. 虽然NTLM更安全,但其可能无法与检查和修改通信的防火墙一起使用。 technet.microsoft.com 8. Review the OWASP Best Practices: Use of Web Application Firewalls document. 检视OWASP的最佳实践:仔细阅读Web应用防火墙文档。 www.infoq.com 9. Chinese firewalls keep Playboy's website at bay. 花花公子的网站被中国防火屏蔽了。 cn.wsj.com 10. You can put firewalls in place to increase security. 您可以将防火墙放在适当的位置以增强安全性。 www.ibm.com 1. In addition, firewalls are no defence against internal hackers. 另外,防火墙不能防御内部的黑客侵袭。 blog.hjenglish.com 2. rule editing in legacy firewalls. 规则编辑遗留下来的防火墙。 wenwen.soso.com 3. It'sbest to have a security expert configure your hardware firewalls toharden your network as much as possible. 最好有一位安全专家配置你的硬件防火墙,以尽可能的强化你的网络。 www.bing.com 4. In general, this environment does not include network devices such as load-balancers, routers, or firewalls. 一般来说,这种环境不包括诸如负载平衡器、路由器或防火墙这样的设备。 www.ibm.com 5. Enables FTP's "passive" mode. This is required to allow FTP to work from behind firewalls. 启用FTP“被动方式”。从防火墙后面的机器用FTP这是必需的。 translations.launchpad.net 6. Traditional security measures such as DMZs and firewalls fall short when addressing the security needs required for mashup development. 传统安全措施(比如DMZ和防火墙)在提供mashup开发需要的安全保障方面往往力不从心。 www.ibm.com 7. Administrators might want their firewalls to stop unauthorized sources from accessing their Linux systems by using telnet, for example. 管理员可能想让他们的防火墙能够阻止未经授权的源访问其Linux系统,例如通过Telnet。 www.ibm.com 8. This is a very bad problem facing to many common users, and has to be resolved if we want to keep firewalls run safely and efficiently. 这是摆在广大用户面前的一个突出问题,而要想不断保持防火墙安全地有效地工作,就必须把它管理和维护好才可。 www.fabiao.net 9. Firewalls act like security guards at a big building. 防火墙扮演一座大建筑物的安全警卫的角色。 www.bing.com 10. Firewalls are good and fun, but what do you do when you need to make rapid, complex changes to your firewall rules? 防火墙非常有趣,但在需要对防火墙规则进行快速且复杂的更改时,您会做些什么? www-128.ibm.com 1. In "Valley of Darkness" , how many firewalls did Felix Gaeta build to protect his ad hoc network? 在“黑暗之谷”中,费利克斯·盖塔建了多少防火墙来包含他那个特别的网络? bbs.flyine.net 2. There are also many abstracted commonalities as defined by general IT standards, such as network firewalls and security. 还有许多一般IT标准定义的抽象共性,例如,网络防火墙和安全性。 www-128.ibm.com 3. Firewalls and routers can also time out and disconnect a client session. 防火墙和路由器也可能会超时,并断开客户机会话。 www.ibm.com 4. And while you might think that your firewalls are secure, they will prove no match for any computer virus that humanity can create. 你或许会想:“我的防火墙很安全啊…”,但事实终将证明它并不是人造电脑病毒的对手。 www.bing.com 5. The measures such as firewalls, antivirus software and logining permission are taken to free of unlawful entry and use. 使用防火墙、防毒软件、登陆权限管理等措施,确保系统免被非法侵入和使用。 www.1x1y.com.cn 6. For example, DIIOP access used by custom Java applications cannot traverse traditional firewalls where only HTTP traffic is permitted. 例如,常规Java应用程序使用的DIIOP访问方法不能穿越传统的防火墙,因为这些防火墙只允许HTTP传输。 www.ibm.com 7. Sometimes it means putting up firewalls because it's dangerous to mingle. 这有时会意味要竖起一道墙,因为混合交融是很危险的。 www.bing.com 8. Such firewalls can remember previous decisions taken regarding packet filtering and make new decisions based on them. 这类防火墙会记得先前关于信息包过滤所做的决定,并根据它们做出新的决定。 www.ibm.com 9. Finally, we should make every effort to further encryption and try to build more firewalls in order to lock the hackers out. 最后,我们应当努力进一步发展加密技术,建立防火墙阻止黑客的袭击。 www.oxford.com.cn 10. Larger LANS also contain a wide variety of network devices such as switches, firewalls, routers, load balancers, sensors and so on. 较大的局域网还包含多种网络设备,如交换机,防火墙,路由器,负载均衡器,传感器等。 q.sohu.com 1. There are two kinds of firewalls: software and hardware appliances. 防火墙分两种:软件防火墙和硬件防火墙。 www.bing.com 2. Firewalls are integral to securing the SQL Server installation. 防火墙是保护SQLServer安装所不可或缺的。 msdn2.microsoft.com 3. Then, how many firewalls do we have now? 那我们现在有几道防火墙呢? www.chinadaily.com.cn 4. It should enterpris techniqu somehow be caught by IDSes, IPSes and firewalls and it's not. 它应被入侵检测系统,入入侵系统检测侵预防系统和防火墙捕获的,但是没有。 www.cto360.com 5. What kinds of security (firewalls, encryptions , passwords, etc. ) will be required and what is it expected to do? 需要考虑安全方面(防火墙,加密、密码等)是否需要,如何做?怎么能被测试? dictsearch.appspot.com 6. Last year Mr. Zuckerberg went to China, where Facebook has also fallen afoul of local authorities' firewalls. 去年,扎克伯格游览了中国。在中国,Facebook也受到了当局的屏蔽。 chinese.wsj.com 7. Construction Technology of As-cast Concrete Formwork of Firewalls of a Converting Plant 换流站防火墙清水混凝土模板施工技术 ilib.cn 8. Enhancing security (application firewalls) and acceleration (TCP and HTTP optimizations) 增强安全性(应用防火墙)并提高速度(TCP和UDP优化) www.ibm.com 9. An Attempt to Discuss Technique of Network Firewalls 试论网络防火墙技术 service.ilib.cn 10. Information technology--Security requirements for packet filter firewalls 信息技术包过滤防火墙安全技术要求 www.zftrans.com 1. Regression Test of the Class Member Firewalls for the Object-Oriented Java Language 面向对象Java语言的类成员防火墙回归测试 www.ilib.cn 2. Adoption of Application Level Protocols Analysis on Stateful Inspection Firewalls 应用层协议分析在状态检测防火墙中的应用 www.ilib.cn 3. The Principle, Implementing and Application of Distributed Firewalls 分布式防火墙的原理、实现及应用 service.ilib.cn 4. Positioning Your RPC Proxy Server and Firewalls in a Corporate Environment 在公司环境中放置RPC代理服务器和防火墙 technet.microsoft.com 5. A Framework Model Integrating Network Intrusion Detection Systems and Firewalls 网络入侵检测系统和防火墙集成的框架模型 ilib.cn 6. Application of distributed firewalls technology in network security 分布式防火墙在网络安全中的技术应用 gamemulti.com 7. The Application of Distributed Firewalls Technology 分布式防火墙技术及应用 www.ilib.cn 8. New load-balanced algorithm to increase firewalls'cluster efficiency 提高防火墙集群效率的分散式均衡算法及实现 www.ilib.cn 9. Application of Distributed Firewalls in Security of Intranet and Internet 分布式防火墙对内网的安全保护 www.ilib.cn 10. Good market for networks'security and firewalls becomes the main force 网络安全大市场防火墙成主力军 www.ilib.cn 1. Security measures built into the server reduce the need to implement additional firewalls 服务器内建立的安全措施可以减少实现其他防火墙的需要 msdn2.microsoft.com 2. Study on Firewalls and Network Intrusion Detection Linkage Systems 防火墙与网络入侵检测联动系统研究 ilib.cn 3. Three firewalls have been added to the topology 在这个网络布局中添加了三个防火墙 www-128.ibm.com 4. System security (e. g. , firewalls, access control) 系统安全(如,防火墙、访问控制) www.exam8.com 5. Research in Policy Issue of Distributed Firewalls Based SOAP 基于SOAP的分布式防火墙策略发布研究 www.ilib.cn 6. Configure firewalls to accept SSH connections only from know network segments 配置防火墙以接受仅来自已知网段的SSH连接 www.ibm.com 7. Application of New Comb-Type Firewalls for Cables 新型梳形电缆防火墙的应用 service.ilib.cn 8. He always had the most paranoid firewalls to protect his data 他总是用一种偏执狂类型的防火墙来保护他的数据 dict.ebigear.com 9. we ' re building firewalls on all the computers 我们在所有的计算机上都建了防火墙 www.ichacha.net 10. Design of alarm system of firewalls using mobile communications 利用移动通信对防火墙报警系统的设计 www.ilib.cn 1. Support for media streams to traverse firewalls 对媒体流通过防火墙的支持 technet.microsoft.com 2. A Study of Firewalls Systems Based on State Inspection 基于状态检测的防火墙系统研究 www.ilib.cn 3. Test your firewalls for behavior problems 测试防火墙行为问题 blog.csdn.net 4. On the Compound Firewalls Designing 复合防火墙设计初探 scholar.ilib.cn 5. A Research of Distributed Firewalls 分布式防火墙研究 www.ilib.cn 6. Load balancing applied in firewalls 负载均衡机制在防火墙中的应用 www.ilib.cn 7. Stateful Inspection Firewalls Based on Protocol Analysis 基于协议分析的状态检测防火墙 www.ilib.cn 8. RTMPT which is encapsulated within HTTP requests to traverse firewalls 封装在HTTP请求中可以穿越防火墙的RTMPT www.infoq.com 9. Stateful inspection firewalls based on special protocol stack 基于专用协议栈的状态检测防火墙 www.ilib.cn 10. A Method of Building Firewalls Based on Modular Design Technology 一种基于模块化设计思想构建防火墙的方法 www.ilib.cn 1. Research on the Path MTU Discovery Problem Based on Firewalls 基于防火墙的路径MTU发现问题研究 www.ilib.cn 2. Remote calls across firewalls using SOAP or the TcpChannel class 跨越使用SOAP或TcpChannel类的防火墙的远程调用 msdn2.microsoft.com |
随便看 |
|
英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。