| 1. | Describes how to use the . net framework when performing port operations 描述在执行端口操作时如何使用. net framework 。 |
| 2. | Nvs is based on trojan horse architecture and facing to network attack Nvs采用木马体系结构的客户服务器模式,包含执行端和控制端两部分。 |
| 3. | The report server web service performs end - to - end processing for reports that run on demand 报表服务器web服务对按需运行的报表执行端对端处理。 |
| 4. | It performs end - to - end processing for reports that run on a schedule specifically , it creates report snapshots and runs subscription reports 该服务对按计划运行的报表执行端对端处理(具体来说,它将创建报表快照并运行订阅报表) 。 |
| 5. | By connecting to the account port , the internals of the store component e . g . the customer component can have a local representative of some unknown external entity which implements the port s interface 通过连接account端口, store组件内部部件(例如customer组件)可以有代表执行端口接口的未知外部实体的本地特征。 |
| 6. | And nvs consists of two parts : nvs console and nvs sensor . nvs sensor runs as a trojan horse on an innocent host . an attacker uses nvs console to control nvs sensor to perform vulnerability scanning Nvs执行端内核是以木马形式植入第三方“无辜”主机,而本地攻击者使用nvs控制端控制远程执行端,对目标系统执行网络漏洞扫描。 |
| 7. | When a report is accessed , either through on - demand or push access , the report server either performs end - to - end processing , or returns a report saved in intermediate format that is subsequently rendered in a specific format 在按需访问报表或以推送方式访问报表时,报表服务器或者执行端对端处理,或者返回以中间格式保存并随后以特定格式呈现的报表。 |
| 8. | However , the attacker generally wants to perform a port scan without letting the scanned host know it is being scanned , since operating systems and or tools might log this type of activity and therefore identify a port scan 但是,因为操作系统和或工具可能会记录此类行为并因此察觉端口扫描,所以,攻击者通常想在被扫描主机不知道的情况下执行端口扫描。 |