Приклади вживання Network traffic Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Secure network traffic.
EaseMon now logs all incoming and outgoing internet and network traffic data.
How to investigate logs, network traffic, wireless attacks, and web attacks.
Network traffic reports provide valuable insights into preventing such attacks.
Using firewalls to control network traffic flow.
Люди також перекладають
Network Traffic Monitor measures data traffic consumed by your EDGE/3G/HEDGE/GPRS and Wi-Fi.
The most common reason forsubnetting IP networks is to control network traffic.
M18 Informational technologies of network traffic control for cyber attacks counteraction(Number of comments: 35).
A computer that manages one or more printers,and a network server is a computer that manages network traffic.
Dispersion analysis network traffic for intrusion detection and prevention in telecommunication systems and networks. .
For example, you could set up a Raspberry Pi in such a way that all network traffic was routed through your device.
Avoiding network traffic A major advantage of stored procedures is that they can run directly within the database engine.
However, as the Morris worm and Mydoom showed, the network traffic and other unintended effects can often cause major disruption.
We have more than 10 Internetconnection points with a good level of redundancy, over which the network traffic is evenly distributed.
Analysis of wireless network traffic is similar to that on wired networks, however there may be the added consideration of wireless security measures.
The program is not only able to steal any information stored in digital form,including network traffic, screenshots, and passwords.
Rivet has built a list of the top 1,000 applications and network traffic configurations and can prioritize traffic on six different settings of importance.
A print server is a computer that manages one or more printer,and a network server is a computer that manages network traffic.
I liked the network forensics portion to identify unusual network traffic and possible attacks through investigation of cap files.
No communication isallowed into an instance unless a firewall resource permits the network traffic, even between instances on the same network. .
More demanding attack techniques include intercepting the network traffic of employee devices that are used remotely or in a public place.
People often“tether” their computers to their smartphones, sending their computer's network traffic over the device's cellular data connection.
However, with the introduction of new worms such as Morris worm and Mydoom, network traffic and other accidental effects can frequently cause major disruption to the system.
Router(router)- used to combine several LAN workgroups, allows you to filter network traffic by analyzing network(IP) addresses;
With these tools, website pages, email attachments,and other network traffic can be reconstructed only if they are transmitted or received unencrypted.
Except support of IPv6 the NetFlow version 9 alsoallows to receive a number of additional parameters about network traffic, which are unavailable when using version 5 of this protocol.
Analysis System Network- enhances protection in real time,analyzing network traffic to help block the use of previously known vulnerabilities of networks; .
Server-based processing UsingAccess in a client/server configuration helps reduce network traffic by processing database queries on the server before sending results to the client.
Server-based processing UsingAccess in a client/server configuration helps reduce network traffic by processing database queries on the server before sending results to the client.