Examples of using The proxy in English and their translations into Chinese
{-}
-
Political
-
Ecclesiastic
-
Programming
The Proxy Settings.
(iii) Evaluating the proxy data.
Select the Proxy report and press OK.
What do you need the proxy for?
The proxy returns the response to the client.
People also translate
One final thing about the proxy.
The proxy server you're using is a frequent tool for criminal behavior.
This requirement fits well with the proxy pattern.
Representatives of the proxy regimes also participated in the working groups.
This prevents remote hosts from connecting to the proxy display.
Using the Proxy Crawl API you can scrape any website/platform on the web.
You have to install the Proxy Switchy program!
We could now start to think about decommissioning the proxy in CODE.
Using the Proxy Crawl API you can scrape any website/platform on the web.
These groups were also attended by the representatives of the proxy regimes.
At 0420 hours the proxy militia fired three 81-mm mortar shells at outlying areas of Haddatha.
If the proxy server is also a cache server, it looks in its local cache of previously downloaded web pages.
Swift is composed of three major parts: the proxy, storage servers, and consistency servers.
P If you are the proxy administrator, please put the required file(s)inthe code i(confdir)/i/templates/code directory.
For these reasons, most of the proxy server is used to connect INTERNET(Internet) and INTRANET(LAN).
You decrypt inside the proxy, examine the contents, and then re-encrypt for the rest of the journey.
If you want to have Android bypass the proxy for any addresses, enter them in the“Bypass proxy for” box, separated by commas.
Because you want to use the proxy method instead of the copy method to communicate, you need to inherit from MarshalByRefObject.
Between 1715 and 1800 hours the proxy militia at Ayn al-Tughrah and Rum hill fired several 81-mm and 120-mm mortar shells at outlying areas of Jba'.
To accomplish this, the proxy server and the background processes, including replication services, need to be able to map logical names to physical locations.
Load balancer modules attach to the proxy_pass handler to provide the ability to choose an upstream server when more than one upstream server is eligible.
At 1735 hours Israeli forces and the proxy militia fired several 155-mm artillery shells at outlying areas of Yuhmur from the Zafatah and Shurayfah positions.