scan vt. (-nn-) 1.細看,細察;審視。 2.〔口語〕大略一閱;瀏覽。 3.按韻節(jié)念,按句調(diào)讀,標出(詩)的格律(指劃分音步)。 4.【電視】掃描;掃掠;搜索。 vi. 1.(詩)符合格律,讀起來抑揚頓挫。 2.【無線電】掃描。 This line does not scan. 這一行不合韻律。 n. 1.細看;細察。 2.掃視,瀏覽。 3.【電視】掃描;掃掠。 4.眼界;視野。
tool n. 1.工具,用具,器具;【機械工程】刀具;工具母機 (=machine tool)。 2.爪牙,傀儡,走狗;〔美俚〕扒手。 3.【裝釘】壓印機。 4.〔pl.〕〔美俚〕刀叉(等)。 Books are the tools of a scholar. 書籍是學者的工具。 tool steel 工具鋼。 a broad tool (石工的)寬刃鑿。 an edge(d) tool 刀。 literary tools 文具。 a poor tool不行的工人。 throw down one's tools=down tools 罷工。 vt.,vi. 1.用工具加工,用工具制造,用鑿刀修整(石頭);【裝訂】壓印。 2.〔英口〕開車;乘車;〔美俚〕閑逛,閑蕩。 Let me tool you down to the station. 我用車送你上車站吧。 blind tooling 【印刷】(硬封面上的)本色壓印。
Systems management server 2003 service pack 1 scan tools 系統(tǒng)管理工具移動設備
St data scan tool data 診斷工具數(shù)據(jù)
Using tools like these and other scanning tools should not be the only thing you do to ensure security 使用這些工具和其他一些掃描工具并不是你唯一可以保證安全性的辦法。
And the function of gathering vulnerability information is often provided by network vulnerability scanning tools 而對目標系統(tǒng)漏洞信息的獲取,目前主要是通過網(wǎng)絡漏洞掃描工具實現(xiàn)的。
Network - based scanning tools send network traffic to various network hosts and devices with the goal of gathering information that will indicate whether those system have vulnerabilities that can be exploited 網(wǎng)絡化掃描工具向很多網(wǎng)絡主機發(fā)送網(wǎng)絡流量,并且設置取得表示這些系統(tǒng)是否有可用的漏洞的信息的門。
The scan tool mode of operation allows the prescribed transfer of data within the scope of the european on - board diagnosis ( e - obd ) from and to exhaust gas influencing control units from all vehicle manufacturers 掃描工具的運作模式,允許指定的數(shù)據(jù)轉(zhuǎn)移內(nèi)部的范疇歐洲對車載診斷(電子的obd ) ,并以尾氣影響控制單元,從各汽車制造商。
We ll cover vulnerability detection tools in more detail in later columns , but it is worth mentioning now that two kinds of scanning tools have proven effective in helping to find and remove buffer overflow problems 這個系統(tǒng)正在保護一個通用服務器場,該服務器場正在使用公認為不安全的cots作為其操作系統(tǒng)。 sitar用冗余和多樣性實現(xiàn)容錯。
Host - based scanning tools are run on each host to scan for a wide range of system problems including : unauthorized software , unauthorized weak passwords , dormant viruses , and inappropriate access permissions 主機型掃描工具在沒個主機上運行以便掃描一個很寬范圍的系統(tǒng)問題,包括:未授權軟件,未授權的弱密碼,隱匿的病毒及不正當?shù)拇嫒≡S可。
While better techniques exist , this is still a highly effective way to narrow a large program of tens or hundreds of thousands of lines into just a few hundred " potential problems . " in a later column , we ll show you a quick - and - dirty scanning tool based on this approach , and give you an idea of how it was built 服務策略指明應該將請求轉(zhuǎn)發(fā)到哪個(哪些)服務器,以及如何裁決來自這個(這些)服務器的結(jié)果以做出最終響應。策略還定義了外部攻擊觸發(fā)器的標準,代理服務器生成這一標準并將其傳遞到自適應重配置模塊( arm ) 。