快好知 kuaihz


firewall造句
121) A firewall provides an essential security blanket for your computer network. 122) In these buildings, people used fire-resisting rolling shutter to replace the firewall as the partition facility to satisfy large space requirement. 123) Information on the characteristics of network security technology and the network firewall security classification and the main technical characteristics. 124) The trace-driven simulations demonstrate that MTH has a better performance than the original hash table algorithm, which suits the high-speed state inspection firewall well. 125) Install firewall program for computer, prevent individual account information to suffer hacker filch. 126) The paper introduces basic functions, concept and working principle of firewall, and realizes firewall to listen remote port, local port and IP address. 127) Such as the use of parallel computing, hardware redundancy, fail to deal with, and information encryption and firewall technology to meet this demand. 128) That solution combines the computer technology, such as access control, database security, and firewall etc with security requirement of banking business in the financial information system well. 129) But last week's summit deal—concocting a jerry-built firewall and asking the banks to boost their capital ratios by June next year—was not up to scratch. 130) You can also control, with some granularity, how the firewall handles Internet Control Message Protocol (ICMP) packets. 131) I bet you have firewall installed in computer A. Please check it. 132) Distributed firewall is a host-resident secure system, which intensifies the operating system...The article discusses its architecture, technological characteristics and advantages. 133) A stateful inspection firewall also monitors the state of the connection and compiles the information in a state table ensuring that the source and destination of each packet is valid. 134) On the firewall structure, the firewall system of C/S structure is provided. The firewall system is composed of main routine and administration client. 135) In the meantime, it is searched and destroy at present the relatively popular firewall product on market, make a hacker OK inbreak easily user computer.