ICMP
英[]
美[]
- abbr. 网间控制报文协议(Internet Control Messages Protocol);因特网信报控制协议
双语例句
- 1. Next I'll show you two ICMP attacks.
- 接下来我将向您介绍两种ICMP攻击。
youdao
- 2. Define how ICMP packets should be handled.
- 定义如何处理ICMP数据包。
youdao
- 3. ICMP USES the basic support of IP as if it were a higher level protocol.
- ICMP使用IP的基本支持,就好象是更高级别的协议。
youdao
- 4. The ICMP timestamp message type is designed to help alleviate this problem.
- ICMP时间戮记讯息类型被设计来帮助解决此问题。
youdao
- 5. The remote host USES an ICMP timestamp reply message to respond to the request.
- 远端主机使用一个ICMP时间戮记回复讯息以反应请求。
youdao
- 6. ICMP message: ICMP is a protocol designed to report and diagnose network problems.
- ICMP消息:ICMP是用来报告和诊断网络问题的协议。
youdao
- 7. This page explains how ICMP timestamps are used to solve clock synchronization issues.
- 本页解释ICMP时间戮记如何使用来解决时序同步化议题。
youdao
- 8. ICMP provides a service that enables hosts to communicate control information to each other.
- ICMP提供服务,使主机能够彼此交流控制信息。
youdao
- 9. For example, ICMP will send a source quench message when traffic becomes congested at a router.
- 例如,当某一路由器发生通信拥塞时,ICMP会发出一个源抑制信息。
youdao
- 10. Internet Control Message Protocol (ICMP) is an integral part of IP, but it USES some of IP's services.
- 网际控制报文协议(ICMP)是IP的组成部分,但它使用某些IP服务。
youdao
- 11. The parts of ICMP that can be translated are also required to work across a translation solution.
- ICMP可以被转换的部分同样也需要一个转换方案。
youdao
- 12. ICMP is used by IP as well as some higher level protocols, such as Transmission Control protocol (TCP).
- icmp由ip和一些更高级别的协议使用,如传输控制协议(TCP)。
youdao
- 13. Typically, ICMP is used to report errors in datagram processing on a host. Some functions of ICMP include.
- 通常,ICMP用来报告主机上数据报处理中的错误。
youdao
- 14. Making use of Internet Control message Protocol (ICMP) message for the diagnosis carries out low efficiency.
- 程序采用网际控制报文协议(ICMP)方式对网络进行诊断执行效率低。
youdao
- 15. These are not the only message types employed by ICMP, but they should give you an idea what ICMP is used for.
- 以上这些并不是ICMP所使用的全部消息类型,但它们能使您大致了解ICMP的用途。
youdao
- 16. The most common command that generates an ICMP message is ping, used to test if there is connectivity to a certain device.
- 生成ICMP消息的最常见命令是ping,它用来测试是否能连接到某个设备上。
youdao
- 17. Function inet_init also initializes the various inet modules, such as the ARP, ICMP, the IP modules, and the TCP and UDP modules.
- 函数inet _ init也会对各个inet模块进行初始化,例如ARP、ICMP和IP模块,以及TCP和UDP模块。
youdao
- 18. The IP layer, in turn, provides services used by the Internet Control Message Protocol (ICMP) and Transmission Control Protocol (TCP).
- 反过来,ip层又提供由网际控制报文协议(ICMP)和传输控制协议(TCP)使用的服务。
youdao
- 19. This paper expatiate on the theory of network protocol spoofing commonly, the ICMP protocol and its leak are analyzed in details.
- 阐述了网络协议欺骗的一般原理,详细分析了ICMP协议及其存在的漏洞。
youdao
- 20. Examples of protocols are TCP, UDP, ICMP, comma-delimited list of any combination of these three protocols and all (for all protocols).
- 协议示例有tcp、UDP、ICMP、用逗号分隔的任何这三种协议的组合列表以及ALL(用于所有协议)。
youdao
- 21. In the following sections you will find more detailed information about ICMP and TCP as well as some interesting attacks using these protocols.
- 在以下几节中,您将找到关于ICMP和TCP的更详细的信息以及一些使用这些协议的有趣的攻击。
youdao
- 22. For example, you can route the network traffic that supports the virtual network over native IP, HTTP (including through a proxy), DNS and ICMP.
- 例如,您可以通过本地IP、HTTP(包括通过代理)、DNS和icmp来路由支持虚拟网络的网络流量。
youdao
- 23. If problems are encountered during routing, the Internet Control message Protoccol or ICMP sends messages and reports errors to the source host.
- 如果在安排路径的过程中遇到问题,互联网控制信息协议(ICMP)就把信息和错误报告向源主机发送。
youdao
- 24. Once discovery discovers a node (typically through ICMP ping), it will ask the capability daemon (capsd) to determine what services that node supports.
- 一旦discovery发现一个节点(通常通过ICMPping),它会请能力守护程序(capsd)来确定该节点支持什么服务。
youdao
- 25. The ICMP echo request failed because the source address and destination address that are specified in an ICMP echo message are not in the same scope.
- 由于ICM P回送消息中指定的源地址和目标地址不在同一范围内,ICM P回送请求失败。
youdao
- 26. ARP spoofing and ICMP redirection attack are used frequently, both of them can sniff the Ethernet or attack the target by means of denial of service.
- ARP欺骗及ICM P重定向攻击是以太网中常用的攻击手段,两者都可达到监听网络或对目标主机进行拒绝服务攻击的效果。
youdao
- 27. While I won't cover any IP-level attacks in this article, I do want to discuss IP in a little more detail as it is the underlying protocol of ICMP and TCP.
- 尽管我将不在本文中介绍任何IP级别的攻击,但我确实需要稍微详细地讨论IP,因为它是ICMP和TCP的底层协议。
youdao
- 28. There are three kinds of invading and attacking action in this thesis, they are the model of using HTTP, the model of using TCP, and the model of using ICMP.
- 本论文研究的入侵攻击类型主要有三大类,它们分别是:与HTTP协议相关的典型入侵攻击,与TCP协议相关的典型入侵攻击以及与ICMP协议相关的典型入侵攻击。
youdao
- 29. There are three kinds of invading and attacking action in this thesis, they are the model of using HTTP, the model of using TCP, and the model of using ICMP.
- 本论文研究的入侵攻击类型主要有三大类,它们分别是:与HTTP协议相关的典型入侵攻击,与TCP协议相关的典型入侵攻击以及与ICMP协议相关的典型入侵攻击。
youdao
百度翻译
有道翻译