Examples of using Network packets in English and their translations into Slovak
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Official/political
-
Computer
-
Programming
The powerful tool to intercept the network packets.
Speed network packets for specific applications, helping to reduce latency.
Malicious apps may monitor, redirect or modify network packets without your knowledge."</string>
That's because network packets used for file transfers or database backups are assigned a"best effort" priority.
The program is able to completely filter and transmit traffic,without losing network packets during the exchange.
It deals with how the network packets will travel from one part of the network to the other.
This fix resolves an issue in which LBFODynamic Teaming mode may drop network packets in Windows Server 2012 R2.
DSCP markings on network packets tell the service provider how that network packet is prioritized.
For reducing data loss and enhancing noise immunity, all Full HD 1080P AV signal is encoded into anddecoded from Network Packets during data transmission.
That's because the network packets used for file transfers or database backups by default are assigned"best effort" as a priority and network congestion won't have as large impact.
Description: WinPcap- software to intercept the network packets before their obtaining by the network card.
The security update addresses the vulnerability by modifying the way that the Windows Secure Channel(SChannel) and the Cryptography API: Next Generation(CNG)components handle encrypted network packets.
Additionally, you can help prevent all kinds ofman-in-the-middle attacks by requiring digital signatures on all network packets by means of IPSec authentication headers.
NetDMA This feature provides services for offloading the memory copy operation that is performed by the networking subsystem to a dedicated direct memory access(DMA)engine when receiving network packets.
Furthermore, all types of man-in-the-middle attacks can be madeextremely difficult by requiring digital signatures on all network packets by way of IPsec Authentication Headers.
Also, you can make all types of man-in-the-middle attacksextremely difficult if you require digital signatures on all network packets by means of IPsec authentication headers.
Network packet dissection library-- shared library.
Network packet capture library-- shared library.
Network packet capture library-- shared library.
Free PCAP Reader is a display application for network packet captures.
In the Christian Trinity Broadcasting Network packet from the satellite Eutelsat Hot Bird 13B(13°E) there have been changes in software offer.
It enables the encryption of the content of a data object, file, network packet or application so that it is secure and not viewable by unauthorized users or hackers.
It enables the encryption of the content of a data object, file, network packet or application, so that it is secure and unviewable by unauthorized users.
A network packet traverses several chains between the time it is received by a network interface and the time it is accepted by the host or forwarded to another host.
In your own interest, it is appropriate to disclose the network packet radio and the Internet to cast dimension.
Allocations from SQL Server processes that are greater than 8 KB, such as those required for large query plans,send and receive buffers if the network packet size configuration option is close to 8 KB, and so on.
Since Norton Security touches each network packet originating from any app that accesses Internet, iOS equally attributes the total data usage by any app to Norton Security as well.
Since Norton Security touches each network packet originating from any app that accesses Internet, iOS equally attributes the total data usage by any app to Norton Security as well.
That is why it is you mustuse tools such as Performance Monitor and a network packet capture program, either from Microsoft or from a third-party vendor, in to determine the true root cause of these events.
If there are consistent short periods of errors recorded in theevent log you should also use a network packet capture program to capture all network traffic during the issue and examine it, in addition to the disk subsystem.