firewall
1. Sygate Personal Firewall v5.
5如何升级?
2. COMODO Firewall can not verify digital signatures.
COMODO Firewall不能核对数字签名的问题。
3. COMODO Firewall does not handle long filename properly.
COMODO Firewall不能正确处理长文件名的问题。
4. COMODO Firewall does not terminate active connections properly.
COMODO Firewall不能正确终止活动连接的问题。
5. COMODO Firewall can be terminated when Windows XP is being shutdown.
COMODO Firewall在Win XP关闭时可以被终止的问题。
6. What ports must be open for DCOM over a firewall?
DCOM需要防火墙打开哪些端口?
7. UDP port 1434 might be blocked by a firewall.
UDP端口1434可能被防火墙阻塞。
8. English: The VPN firewall is being deactivated. Please hold...
VPN防火墙正在关闭。请稍后...
9. The Windows Firewall system prevents unauthorized access to computer resources.
Windows防火墙系统可防止对计算机资源进行未经授权的访问。
10. Jetico Personal Firewall v2.0.2.9 Cfan Media wins FREE Web Design Raffle.
一个全面,却又简单易用的网络防护软件,可以确保你的计算机不被任何黑客侵扰。
11. A closed society.Our first industry-specific firewall and VPN system for your company network: EAGLE.
一个安全隔离的系统我们为您提供的第一个应用于企业网络的工业级防火墙和VPN系统
12. Some coder say,COMODO is a firewall with TDI driver!
一些程序员说,它是一款TDI驱动级的防火墙。
13. How much quality the first-class firewall has?
一流防火墙有多少成色?
14. This port does not have to be open on the perimeter network firewall.
不必在外围网络防火墙上打开此端口。
15. You cannot modify the Windows firewall settings of a remote computer over a remote connection.
不能通过远程连接来修改远程计算机的Windows防火墙设置。
16. This can be caused by Firewall or Anti-Virus protection.
中断可能是由防火墙或防病毒保护造成。
17. C.To allow any connection to the firewall.
为了允许到防火墙的任何连接。
18. A.To specify users that should be allowed to connect to the firewall.
为了指定允许连接到防火墙的用户。
19. E.To specify users that should be prevented from connecting to the firewall.
为了指定用户不允许连接防火墙。
20. D.To prevent any user from connecting to the firewall.
为了阻止任何用户直接连接防火墙。
21. Which AntiVir version contains a Firewall?
什么红伞版本包含有防火墙?
22. Reduced damage of additional levels of Firewall starting from level 9.
从水平9开始防火墙的附加水平的减少损坏.
23. From the firewall,initialize and mount the additional file-system you specify for each system.
从防火墙初始化并安装你为每个系统指定的附加文件系统。
24. He did miserably in the early primaries but promised that Florida would be his firewall.
他在早期的初选中很惨,但是他承诺说佛罗里达将是他的底线。
25. He moved the throttle to the firewall.
他把节流阀移动到了防火墙。
26. Firewall is enable. if Firewall is enable, default filtering method is permit.
以上显示:防火墙被启用,缺省过滤方法是允许。
27. The corporate firewall is a double-edged sword.
企业防火墙是一把双刃剑。
28. Traditionally, users usually adopt Firewall as their first line of defence.
传统上,网络用户一般采用防火墙作为安全的第一道防线。
29. As an extra step, you can start the firewall in Sharing preferences.
作为附加的步骤,可以在“共享”预置中启动防火墙。
30. Do you have the ability to open specific ports in the firewall?
你是否能够打开特定的防火墙断口?
31. Your firewall administrator has restricted access to the WWW service.
你的防火墙管理员限制你访问这个站点。
32. I'm behind firewall or proxy.
使用防火墙或者代理服务器。
33. Give the machine permission to rsh to the firewall machine as root.
允许机器作为根目录rsh到防火墙机。
34. What are the risks of allowing programs through a firewall?
允许程序通过防火墙有何风险?
35. Key words:Active defense,Honeypot,network security,Active firewall.
关键词:主动防御;蜜罐;网络安全;主动防火墙.
36. The handling process of detecting state firewall was analysed.
分析了状态检测防火墙的处理过程。
37. Upgrade to the current version of your favorite desktop OS, which will have integral firewall capabilities.
升级到最新版本,你最喜欢的桌面操作系统,其中将有完整的防火墙能力.
38. You can install ISA Server 2004 as the firewall for your local network.
可以将ISA Server 2004安装为本地网络的防火墙。
39. The firewall is tamper-resistant because it is independent of the host's operating system.
因为防火墙独立于主机的操作系统,所以它是防篡改的。
40. Before you are allowed to continue, you must login in to the firewall by entering your username and password.
在你继续访问前,必须用你的用户名和密码登录防火墙。
41. These connections usually fail in scenarios where the novice is behind a firewall.
在初学者位于防火墙之后的情况下,这些连接通常会失败。
42. After defining access,the next step is to place a firewall between the LAN and the Internet.
在定义了访问之后,下一步就是在局域网和Internet网之间设置一道防火墙。
43. Please try again after checking the network configuration or firewall settings.
在检查网络及防火墙设置之后重新尝试连接。
44. In this case, visitors may wish to disable the personal firewall to allow access to the ODS.
在这种情况下,访问者应停用个人防火墙的功能,以便允许接入ODS。
45. A more effective firewall is going to block the right traffic.
在这种系统中,一个更有效的防火墙可以正确的拦截数据资料。
46. Before picking a firewall, companies need to adopt security policies.
在选择防火墙之前,公司需要选择安全政策。
47. Open lots of holes in the firewall.
在防火墙上打开很多的口子。
48. To poke a hole for port 22 in the firewall.
在防火墙为端口22打开缺口。
49. Setting this registry value on every domain controller inside the firewall does not affect performance.
在防火墙内的每个域控制器上都设置此注册表值并不影响性能。
50. Inside of the firewall the only permit destination for traffic from the interior or exterior route is the bastion host.
在防火墙内部,对于来自内外部路由器的通信量来说,唯一允许到达的目的地是bastion主机。
51. English: The Inter-Zone firewall is being deactivated. Please hold...
地区间防火墙正在关闭,请稍后。
52. If you are behind a firewall consult FAQ 3.2.
如果你在防火墙之后,参考《常见疑问3.2》。
53. If you have firewall software installed you may need to set some environment variables to use ppm correctly.
如果已经安装了防火墙软件,那么可能需要设置一些环境变量才能正确使用ppm。
54. If you are behind a firewall, odds are that you have no control over where HTTP requests are processed.
如果您位于防火墙的后面,就很可能无法控制在何处处理HTTP请求。
55. Passive mode is sometimes required, if there is a firewall between your server and the FTP server.
如果您的服务器和FTP服务器之间存在防火墙,有时就需要使用被动模式。
56. If you have firewall software running on your computer, check the settings to make sure cookies are allowed.
如果您的计算机上有防火墙软件在运行,检查设置,核实设置允许cookies存在。
57. If there is a firewall, ensure that the SMTP Command Filters on the firewall do not filter the AUTH NTLM command.
如果有防火墙,请确保防火墙上的SMTP命令筛选器不筛选AUTH NTLM命令。
58. If the local interface works, but the external interface doesn't, the trouble lies with your firewall.
如果本地的接口工作了,但是外部的接口不能工作,这个故障出现在你的防火墙上。
59. If you are trying to use SOAP through a firewall, you might need to use a SOCKS proxy.
如果试图穿过防火墙使用SOAP,可能需要使用SOCKS代理。
60. They must go back on the HTTP response flow or to an endpoint outside the firewall.
它们必须在HTTP响应流中或者防火墙外的端点中返回。
61. They are all inside the firewall and are as secure as any other system on a company? S network.
它们都位于防火墙之内,与公司网络中的其他系统一样安全。
62. It protects internal network together with firewall and antivirus tools.
它和防火墙技术、防病毒技术一起构筑起了网络的安全防线.
63. It can have a second life as a firewall for your small business or home office.
它完全可以胜任小型商业或家庭办公室的网络防火墙工作。
64. On virtually every count, it is important to pick some kind of network firewall.
实际上从各个方面考虑,选择某种网络防火墙是很重要的。
65. It is not necessary for network already configured with firewall.
对于已经配置有防火墙的网络,就不必要了。
66. For Advanced Users - Adaptive Firewall Rules.
对于高级用户-有适用的规则。
67. The recording of user requests made to the firewall.
对用户向防火墙的请求的记录。
68. Configuring the Windows Firewall to allow remote debugging may allow other users to gain remote access.
将Windows防火墙配置为允许远程调试可能会使其他用户获得远程访问权限。
69. The personal firewall will be enabled on this connection to protect your home network.
将在这个连接上启用个人火墙以保护您的家庭网络。
70. After the port is added to the ACL, add it to the Windows Firewall exceptions list.
将端口添加到ACL之后,将其添加到Windows防火墙例外列表中。
71. Firewall as a system service after registration to solve the problem.
将防火墙做为系统服务注册后,解决了该问题。
72. Thanks to a firewall, network administrators found the system breached.
幸好有了防火墙,网络管理员发现系统遭到了破坏。
73. You will definitely have a harder time behind a router or a firewall.
当你在一个路由器或者防火墙之后你会很难受。
74. When you are finished with your work on the Internet, you should logout your computer from the Firewall.
当你完成了你在互联网上的工作后,要将你的电脑从防火墙上登出。
75. When dad finished up loading wed is covered we used no firewall.
当我完成上传时,我们发现我们没有使用防火墙
76. When dad finished uploading we discovered we used no firewall.
当我完成上传时,我们发现我们没有使用防火??
77. When dad finished uploading we discoered we used no firewall.
当我完成上传时,我们发现我们没有使用防火墙,
78. When dad finished uploading we discovered that we used no firewall.
当我完成上载时,我们发现我们没有使用防火墙,
79. When prompted for the gateway machine, enter the IP address of the firewall.
当提示输入网关机时,输入防火墙的ip地址。
80. So in many cases, the firewall and the router can be the same machine.
很多时候,防火墙和路由器可能位于同一机器。