firewalls
美 [ˈfaɪrˌwɔːl]
英 [ˈfaɪər(r)ˌwɔːl] 
- n.【计】防火墙;风火墙;马头墙
- 网络介绍防火墙;防火墙及其常见问题;防火墙运作原理
词形变化
复数:firewalls
英汉解释
n. | 1. 【计】防火墙,一种用于提高信息安全性的计算机程序 2. 风火墙;马头墙,在相邻民居发生火灾的情况下,能起到阻断火源作用的墙 |
英英解释
例句
Web service interactions in the grid must be able to traverse corporate firewalls across the enterprises.
网格中的Web服务交互必须能够跨企业穿越公司防火墙。
With TeamViewer you can remotely control any computer as if you were sitting right in front of it - even through firewalls.
随着TeamViewer您可以远程控制任何一台电脑就好像你坐在它前面的权利-即使是通过防火墙。
In cases like this, business logic needs to be kept behind a secure set of firewalls (often called a DMZ).
在类似这种情况下,需要将业务逻辑置于一组安全防火墙之后(经常称为DMZ)。
You might hear this referred to as "setting up the encryption domain" for the firewalls.
您可能会听到这被称之为防火墙“设置加密域”。
Also it uses a non-standard port, so it is often blocked by client firewalls.
由于使用了非标准的端口,这样客户端防火墙经常会阻止其运行。
Although, it might be that the packets that traceroute uses to trace the route may also be blocked by firewalls.
但是,traceroute用来跟踪路由的数据包也可能被防火墙阻止。
The rule of thumb is to have at least three logical instances of an operating system and similar firewalls, routers, switches, and so on.
根据经验,至少要三个操作系统逻辑实例和类似防火墙、路由器、交换机等。
Some firewalls are nice, and let you idle for up to a day or so; some are gestapo and terminate your session after 5 minutes.
一些防火墙比较友好,允许你的空闲会话时间为一天甚至超过一天;另一些却如盖世太保,5分钟空闲就终止你的会话。
The ideal configuration is to have direct network connectivity between the forests with no firewalls.
理想的配置是在林之间建立直接的网络连接,而不设置防火墙。
Luckily, most modern firewalls automatically update them selves once a week.
幸运的是,大多数现代防火墙每星期都会自动升级。
Electronic money (in the form of digital bits) requires a complex set of codes, passwords, firewalls, etcetera.
电子货币(形式的数位比特)需要一套复杂的代码,密码,防火墙,等等。
Collect information about network switches, routers, firewalls, and any other devices.
收集关于网络交换机、路由器、防火墙和任何其他设备的信息。
Although, they do not perform any transformation, firewalls limit consumer access to only predefined points in the domain boundaries.
尽管,防火墙不去执行任何转换,但是它们限制消费者仅能访问域边界内预先定义的点。
Firewall vendors offer VPNs that are essentially firewalls in combination with a variety of security measures and management tools.
有些防火墙供应商也提供vpn,它们基本上是防火墙与各种安全措施与管理工具的结合。
In Britain officials are pondering plans for banks to erect firewalls between the different parts of their businesses.
英国官员正为银行制订方案,以在英国企业不同部门间设立防火墙。
Firewalls are only a part of the security equation, insuring that traffic only takes place on specified ports between specified addresses.
防火墙只是保证通信仅仅在特定地址之间的指定端口上进行的安全性因素之一。
IBM only performs testing of the out-of-the-box hypervisor edition image on isolated networks, behind multiple firewalls.
IBM只是在多个防火墙后面的隔离网络上执行开箱即用虚拟机监控程序版本映像的测试。
These firewalls act as a security buffer between the corporation's private network and all external networks, including the Internet.
这些防火墙,在公司专用网络与包括因特网在内的所有外部网络之间,起到安全缓冲区的作用。
There are three basic techniques used for firewalls: packet filtering, circuit gateway, and application gateways.
有三种基本技术用于防火墙:包过滤,电路网关,应用网关。
One of the effective ways to prevent risk contagion is to set up firewalls between banking and capital markets.
防止风险蔓延的有效方式之一,就是在银行业和资本市场之间建立防火墙。
You'll find honeypots, firewalls, IDS, and several network utilities to help you map your heterogeneous network better.
您会发现“粘蜜罐”、防火墙、IDS以及一些网络工具可帮助您更好地映射异构网络。
Only qualified commercial banks are allowed to participate in non-banking activities, and have strict firewalls separating them.
在中国,只有合格的商业银行才能获准从事非银行业活动,并在两者之间建立了严格的防火墙。
Firewalls can also offer peace of mind to the company by restricting WWW access to personnel making outgoing connections to the Internet.
防火墙通过限制(本公司)人员向外接到互联网进行www访问,也让公司相安无事。
Most new computers come with a built-in firewall. Firewalls are a necessary part of safe web surfing.
大部分新电脑内嵌有防火墙。防火墙是上网安全保障的必要部分。
The specifics of configuring firewalls will not be covered here, since firewall configuration is specific to the each firewall vendor.
这里将不讨论配置防火墙的细节,因为防火墙配置是特定于每个防火墙厂商的。
Register edition of " Remote Control King" controlled client will not be killing antivirus software, you can pass through network firewalls.
注册版“远控王”的受控端不会被杀毒软件查杀,可以穿越网络防火墙。
Firewalls in this picture emulate the traditional demilitarized zone (DMZ) setup for corporate firewalls between the intranet and Internet.
本图中的防火墙仿效用于公司内部网与互联网之间防火墙的传统非军事区(DMZ)设置。
You could also consider r? e configuring the firewalls to allow packets from the relocatable address and the stationary address.
你也可以考虑重新配置防火墙,接受来自可再定位地址和固定地址的数据包。
The article first introduces the principles of setting up the firewalls, then the standards of selecting firewalls.
通过介绍防火墙的部署原则,从防火墙部署的位置详细阐述了防火墙的选择标准。
The IBM project, while groundbreaking, will not make it easier for companies to access Second Life from behind their own firewalls.
IBM项目的启动,将不会简化各公司通过他们自有的防火墙去访问SL。
If the amount of data in a hidden field becomes very large, some proxies and firewalls will prevent access to the page that contains them.
如果隐藏域中的数据量过大,某些代理和防火墙将阻止对包含这些数据的页的访问。
Security consists of more than just firewalls at the edge of your network protecting you from the "outside. "
安全性不仅仅是在网络边界上保护系统不受“外部”攻击的防火墙。
NOTE: Some personal firewalls block the operation of the local HTTP service, so you may have to adjust your firewall settings.
注意:某些个人防火墙会阻塞本地HTTP服务的操作,因此务必调整好防火墙的设置。
A front-end server was frequently located in a perimeter network between the external and internal firewalls.
前端服务器通常位于外部和内部防火墙之间的外围网络中。
Some hosts are behind firewalls or other similar layers of software that prohibit or hinder incoming connections.
某些主机可能有防火墙或是其他类似的软体层保护,禁止或阻碍外来的连线动作。
Security consists of more than just some firewalls at the edge of your network protecting you from the outside.
安全性不仅仅涉及到在网络边缘保护您不受外部攻击的防火墙。
To thwart this activity, state-of-the-art firewalls control inbound and outbound communications.
到阻碍这次活动,艺术级的防火墙控制入站和出省的通讯。
So providing server redundancy will not help unless power supplies, networks, firewalls etc. are all provided with redundant capacity.
因此提供服务器冗余性并不能带来帮助,除非电力供应、网络、防火墙等都以冗余容量被提供。
While these users are technically literate, network services setup and firewalls are not a normal part of their knowledgebase.
虽然这些用户懂得相关技术,但网络服务设置和防火墙可能并不属于他们的知识库中的一部分。
Also note that the HTTP DELETE, PUT, TRACE, and OPTIONS methods are not frequently used and are often blocked by firewalls.
另请注意,HTTPDELETE、PUT、TRACE和OPTIONS方法使用并不频繁,而且经常被防火墙阻止。