查询词典 IPID
- 与 IPID 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Methods:Phamaco1ogy studies adopt orycto1agus curicu1us athero-sclerosis and musculus remembrance function bindrance model, set modelgroup, void control group, positiye control group, and NLKC high, middle,low dose group. The effects were observed by monitoring the inf1unenceof NLKC on blood and aorta 1 ipid, hemorrheology, l ipid peroxidation (LP0),thromboxanceB: Y 6--keto--prostag1andinF1 Q (6--keto--PGF, Q ), thick-ness and stage of atherosclerosis plaque, pathology of aorta andcoronary artery, and remembrance function.
主要药效学选用家兔动脉粥样硬化模型、小鼠记忆障碍模型等,设立脑力康胶囊不同剂量组、模型组、空白对照组、阳性对照组等,观察脑力康胶囊对血脂、血流变、过氧化脂质、血栓素B2(TXB2)、 6-酮-前列腺素F10(6-keto-PGF10)、主动脉脂质含量、动脉粥样硬化斑块厚度及程度、主动脉及冠状动脉病理形态、增强记忆等方面的影响。
-
So, to test for IPID 's from 2 to 256, the iptables command line is
所以,测试IP的标示位的值从2到256的iptables命令是
-
Don't put a public host in front of your firewall that uses a predictable IPID sequence.
别把公共主机置于使用可预料的IPID序列的防火墙前。
-
The public host will then send an RST packet to the target and increment the IPID.
公共主机接着将发送一个RST包到目标并增加IPID。
-
Objective: To observe oxygen-free-radical clearing ac tivity and anti-l ipid peroxidation of Shengyaling injection in vitro.
目的:观察升压灵注射液清除氧自由基能力和抗脂质过氧化作用。
-
The theory of IPID covert network scanning was introduced, then the design and implementation of IPID covert network scanning under the operation Windows was proposed. In order to improve the efficiency of scanning, the chunk binary algorithm was introduced, then its performance was analyzed and was compared with other algorithm.
介绍了IPID隐蔽网络扫描原理,并在Windows操作系统下,设计和实现IPID隐蔽网络扫描系统原型;为了提高网络扫描效率,提出了&分块二分算法&,并对其进行了性能分析与比较。
-
The results show that the chunk binary algorithm is a good algorithm of IPID covert scanning, and the correctness and speed of IPID covert scanning is decided by setting delay time between getting two IPID.
研究结果表明,&分块二分算法&是适合IPID隐蔽网络扫描的,而是否合理设置两次取IPID序列号之间等待的基本延时,将决定IPID隐蔽网络扫描的正确性和扫描速度。
-
There are two types of NAPT: software NAPT and hardware NAPT. The technique based on IPid, Source-port, TTL, analyzing the traffic packets can recognize whether NAPT had been used or not. It also can distinguish the server from the client by means of software NAPT.
由于存在软件NAPT和硬件NAPT,本文提出多种方法结合的方案,通过对IP数据报中的IPid,Source-port进行统计,根据结果确定是否使用了NAPT技术,并对软件NAPT识别出NAPT服务器主机与NAPT客户端主机。
-
The attacker will then send another SYN|ACK packet to the public host and look at the IPID number to determine if sending an RST packet to the target incremented the IPID.
攻击者接着将发送另一个SYN|ACK包到公共主机查看IPID号来确定是否发送一个RST包到目标增加IPID。
-
To read this off from left to right:"Load the u32 module, and perform the following u32 tests on this packet; grab the 4 bytes starting with byte 2 (bytes 2 and 3 are the Total Length field, and bytes 4 and 5 are the IPID), apply a mask of 0x0000FFFF (which sets the first two bytes to all zeroes, leaving the last two bytes untouched), and see if that value - the IPID - falls between 2 and 256 inclusive; if so, return true, otherwise false."
从左到右读这条命令是:&加裁u32模块,并且在数据包上执行下面的u32测试;从第2个字节开始抓取4个字节,应用0x0000FFFF掩码,然后查看这个值,如果在2到256之间,那么返回真,否则返回假。&
- 推荐网络例句
-
Plunder melds and run with this jewel!
掠夺melds和运行与此宝石!
-
My dream is to be a crazy growing tree and extend at the edge between the city and the forest.
此刻,也许正是在通往天国的路上,我体验着这白色的晕旋。
-
When you click Save, you save the file to the host′s hard disk or server, not to your own machine.
单击"保存"会将文件保存到主持人的硬盘或服务器上,而不是您自己的计算机上。