| 1. | Solving plan of a practical network application fire wall 一种网络应用层防火墙解决方案
|
| 2. | Design and construct a fire wall with graphical interface for users in linux os 操作系统防火墙图形化用户界面的设计与实现
|
| 3. | The fifth part designs in detail the log document construction of the personal fire wall 第五部分详细设计了个人防火墙的日志文件结构。
|
| 4. | The second part discusses the definition of network security and the concept of the personal fire wall 第二部分讨论了网络安全的定义和个人防火墙的概念。
|
| 5. | Predominating how to use mainstream fire wall and vpn install technique under the complete network environment of actual application 掌握主流防火墙和vpn服务安装技术及在完整网络环境下的实际应用。
|
| 6. | Hardware network information filtering system is a way out by combining the functions of fire wall and content filtering 硬件网络信息过滤系统具有防火墙和内容过滤的双重功效,是解决此类问题的必然选择。
|
| 7. | Finally , the function of the realized personal fire wall is tested , the result is analyzed and some proposals are put forward for further research 最后对实现的个人防火墙进行功能和性能的测试,并分析了结果,并对进一步的研究提了建议。
|
| 8. | The outer ring has four storeys - kitchens on the first floor , granaries on the second , and bedrooms on the third and the fourth . between each " diagram " is a fire wall 外环四层,一层为厨房,二层为谷仓,三四层为卧室卦与卦之间设防火墙。
|
| 9. | Now , there are many safety precautions on the internet , such as fire wall etc . but these are safety measure based on system or net site 现在,国际互联网上的各站点,几乎都有各种各样的安全措施,例如防火墙( firewall ) 、网络加密、加密狗等。
|
| 10. | Install a personal " fire wall " software and be careful while accepting file transfer from unknown senders via email , icq or netmeeting 安装个人防火墙( firewall )软件,以避免因透过电邮、 icq及netmeeting接收或开启不明来历的档案而导致密码被盗用。
|