您要查找的是不是:
- firewall rule database 防火墙规则库
- For Advanced Users - Adaptive Firewall Rules. 对于高级用户-有适用的规则。
- Analyzing IP packet classification and according to characteristics in firewall rule and network data flow, we put forward to improving way of finding in the Linux firewall rule. 分析了常见的IP分类算法,并根据防火墙规则的特点和网络数据流的特性,提出了Linux防火墙规则查找的改进算法。
- The daemon that monitors the firewall log intercepts these denied attempts and can then grant access by injecting a new firewall rule to open the needed port. 监控防火墙日志的端口监控程序截获这些被拒绝的尝试后,就能添加一条新的防火墙规则,开启所需的端口,从而授予访问权。
- Application of OBDD to Design Rule Database of Firewall 有序二叉决策图在防火墙规则库设计中的应用
- Firewall rules can use the ipf (8) tools to dynamically set up and delete. 防火墙规则可以使用 ipf(8) 工具来动态地设置和删除。
- By using the rule database and the filter program, the flexibility and applicability were improved.The architecture is suitable for many kinds of sample program. 该体系结构通过规则库和过滤程序的使用,提高了其灵活性和适应性,使得它可以适于更多类型的样本程序。
- Through expert system to establish connections among database?manufacturing database and rule database, reached parameter drive design on network platform, finally, combined with CAM module for CIMS . 通过准专家系统链接数据库、工艺库、规则库,实现了网络环境下的参数化驱动设计,并结合CAM模块,一定程度上达到了CIMS。
- Here, the gathering of firewall rules is defined by the depiction of packets filtering rules with the Backus-Naur Form. 随着防火墙的不断运行,管理员添加的过滤规则会越来越多,从而影响到匹配的效率和时间。
- For reducing the spaces of rule database and facilitating users to query,the minimal prediction set is used and mined using maximum frequent item sets which are found by a set-enumeration tree. 为缩减关联规则存储空间和方便查询关联规则,提出一种前件为单一项目的最小预测集算法。
- If MX records reference the firewall IP address, configure firewall rules to direct SMTP traffic to the Edge Transport server. 如果MX记录引用防火墙IP地址,则将防火墙规则配置为将SMTP通信定向到边缘传输服务器。
- This is the kind of fancy stuff that really highlights the importance of having a well-tested, reliable script manage the firewall rules for you. 这是件奇妙的事,它真正体现了让经过精心测试的、可靠的脚本来为您管理防火墙规则的重要性。
- And since the script shields me from the task of editing firewall rules by hand, it eliminates a major source of errors. 由于这个脚本可以让我不必手工编辑防火墙规则,这就消除了出错的主要根源。
- In order to avoid such vulnerabilities,firewall administrators have to determine an appropriate position in the firewall rule set to be inserted,and identify all the rules conflicting with the new rule in advance. 为避免漏洞产生;管理员必须正确地确定新规则插入的位置;找出与新规则相冲突的所有规则.
- We update the rules database every month, so that customers know that they are receiving the latest authoritative information about how to best deploy and run Exchange Server. 我们每个月都对规则数据库进行更新,因此客户知道他们收到的是最新的有关如何以最佳方式部署并运行Exchange Server的权威性信息。
- Current misuse detection systems are of little use for new attacks and they cannot automatically update their rule databases. 摘要无法检测到未知攻击以及不能自动更新知识库是现有误用检测系统的两大缺点。
- Firewalls are good and fun, but what do you do when you need to make rapid, complex changes to your firewall rules? 防火墙非常有趣,但在需要对防火墙规则进行快速且复杂的更改时,您会做些什么?
- Model of flexible workflow based on adaptive rule database 一个基于自适应规则库的柔性工作流模型
- The Ching court began to feel its rule threatened. 清廷开始感到自己的统治受到了威胁。
- But this does not rule out unofficial discussions. 但这并不排除进行非正式的讨论。