- 1. The syn-gas, or the syn-fuel process.
- 合成气或合成燃料技术。
来自互联网
- 2. The first setting enables TCP SYN cookies.
- 第一个设置启用TCPSYNcookie。
来自互联网
- 3. TCP SYN Scanning is also known as half open scanning.
- TCPSYN扫描也称为半开扫描。
来自互联网
- 4. Description: TCP SYN scanning is a variant of port scanning.
- 描述:TCPSYN扫描是端口扫描的变体。
来自互联网
- 5. Syn: Set in case the sequence Numbers need to be synchronized.
- SYN:在需要同步序列号的情况下设置。
来自互联网
- 6. This means a TCP packet with the SYN flag set is sent to the server.
- 这意味着向服务器发送一个设置了SYN标志的tcp包。
来自互联网
- 7. This paper presents a novel scheme for filtering SYN flooding attacks.
- 本文提出了一种新的过滤syn洪水攻击的方法。
来自互联网
- 8. The server answers with a packet where both the SYN and ACK flags are set.
- 服务器以设置了 SYN和ACK 标志的包应答。
来自互联网
- 9. Peccati Syn was one of the twelve original Grand Admirals of the Imperial Navy.
- 佩卡蒂·西恩曾是帝国海军的初代十二元帅之一。
来自互联网
- 10. The function tcp_output is called, which outputs the SYN packet onto the network.
- 调用函数tcp _ output,将SY n包输出到网络。
来自互联网
- 11. The kinematic analysis and dimensional syn-thesis Problems of robots are studied.
- 本文研究了机器人执行机构运动分析和尺度综合问题。
来自互联网
- 12. Together, our data suggest an early role for SYN and inflammation in PD pathogenesis.
- 总之,我们的数据提示:SYN和炎症在PD病理发生早期起作用。
来自互联网
- 13. The outbound SYN packet from each host creates the necessary NAT state for its own NATs.
- 从各自的主机外出的SYN包,为他们自己的NAT产生可能的NAT状态。
来自互联网
- 14. In response, the scanned host returns a packet with the SYN and ack flags set if the port is open.
- 如果该端口是打开的,则被扫描主机返回设置了syn和ack标志的包进行响应。
来自互联网
- 15. Currently the evolvement of the basin is probably in late syn-rift phase of the second event.
- 现今盆地的演化可能处于第二次伸展减薄—热事件的同裂谷相的晚期。
来自互联网
- 16. A client initiates a connection to a host (and a specific port) by sending a syn synchronize packet.
- 客户机通过发送syn同步数据包发起到一个主机(和特定端口)的连接。
来自互联网
- 17. Conclusion Good prevention and treatment effect of niacin on fat embolism syn - drone is suggested.
- 结论说明烟酸注射液对脂肪栓塞综合征有较好的防治作用。
来自互联网
- 18. And obviously this process, the syn-fuel process, is coming back in vogue with the energy crisis around now.
- 很明显这个过程,合成燃料的过程,随着能源危机的到来,变得又时髦起来了。
来自互联网
- 19. The improved strategy can defense both common port-scanning and the secret scanning with the symbol of SYN.
- 这种改进方案不仅能有效防御常规的端口扫描,也能有效防御syn隐蔽扫描。
来自互联网
- 20. Two principal respects are embodied in the computer-aided optimum syn - thesis or design for planar linkages.
- 计算机辅助机构最优综合或优化设计问题主要包括两个方面。
来自互联网
- 21. You can see that the attacker will only have to send a few SYN packets every ten seconds or so to disable a specific port.
- 您会发现,攻击者只要每十秒钟左右发送几个syn包就可以禁用特定端口。
来自互联网
- 22. Enough SYN requests to the system, and an attacker can use all the connections on a system so that nothing else can get through.
- 只要针对系统的SYN请求足够多,攻击者就能够使用系统上的所有连接,从而阻止任何东西通过。
来自互联网
- 23. You can specify which incoming TCP packets to scan and discard those that don't match the flags ack, FIN, PSH, RST, SYN, or URG.
- 可以指定应该扫描哪些到达的TCP数据包,丢弃不与ack、FIN、P SH、RST、syn或urg标志匹配的数据包。
来自互联网
- 24. In this system the azimuth rate platform without azimuth stabilized loop, coordinate-resolver and azimuth syn chronzer is adopted.
- 在该系统中使用的速率方位平台没有方位稳定回路、方位坐标分解器及同步器。
来自互联网
- 25. Syn, however, did not forget his roots, naming his flagship after a word used by the Sacred Way's clergymen when addressing laypeople.
- 但西恩并没有忘记自己最初的信仰,他根据神圣之道的神职人员称呼普通信徒的词语命名自己的旗舰。
来自互联网
- 26. The tcp_input () routine on the client side processes the SYN ACK packet, and calls tcp_output () to send an ACK packet back to the server.
- 客户端上的 tcp_input ()例程处理SYNACK包,并调用 tcp_output ()将 ACK 包发回到服务器。
来自互联网
- 27. Syngas can also be converted into other things. The "syn" is short for "synthesis" and syngas was once an important industrial raw material.
- 合成气也可以转化为其他物质。合成气单词syngas的前缀“syn”就是“synthesis”合成的缩写。
来自互联网
- 28. When the client issues connect, the tcp_output function is called at the protocol layer, which outputs the SYN packet onto the interface.
- 当客户端发布connect时,在协议层调用tcp _ out put函数,将SY n包输出到接口。
来自互联网
- 29. To accomplish this, the attacker sends a TCP packet with the SYN flag set to the target host, just like when opening a regular TCP connection.
- 要实现这一点,攻击者向目标主机发送设置了SYN标志的tcp包,就象打开常规tCP连接时一样。
来自互联网
- 30. To accomplish this, the attacker sends a TCP packet with the SYN flag set to the target host, just like when opening a regular TCP connection.
- 要实现这一点,攻击者向目标主机发送设置了SYN标志的tcp包,就象打开常规tCP连接时一样。
来自互联网