In particular, this tutorial does not go into any depth about how to use Wireshark once it has been configured correctly.

  • 特别指出,本教程并未对正确配置后如何使用Wiresharkn进行深入探讨。
  • 来源:互联网摘选更新时间:2025-01-20 13:30:36

  • 重点词汇
  • go into进入;从事;进入(某种状态);调查;
  • onceadv.一次;每一次;每隔…一次;曾经;
  • wireshark网络抓包工具;网络协议分析器;网络嗅探;网络协议检测程序
  • thispron.这,这个;这事,这人;这时;下面所说的事;
  • inprep. 在里面;在(某范围或空间内的)某一点;在(某物的形体或范围)中;在…内;在…中;进入
  • has been已经;
  • correctlyadv.正确地,得体地;实事求是;
  • howadv.怎样;健康状况如何;到何种地步;以任何方式;
  • itpron.它;他;正好是所需的;事实[情况];
  • toprep. 向,朝着;到;关于;属于;
  • particularadj.特定的;特殊的;格外的;挑剔的;
  • tutorialn.个别辅导时间;教程,辅导材料;使用说明书;辅导课;
  • 相关例句
1、

Under Wireshark of open source environment develop again for a plug-in to analyze network management protocol assumedly.

在Wireshark开源环境下,编写插件进行二次开发,模拟解析网管协议。

互联网摘选

2、

After running this command you can load the fixed packet capture file back in to Wireshark and then you should see the decrypted packets as expected.

运行完这条命令之后,您可以重新把修正过的数据包获取文件加载到Wireshark,然后您就会看到预期的已解密数据包。

互联网摘选

3、

And example by the most commonly used in real-time interactive software QQ, using wireshark software to capture packets, then detailed analysis of the application data.

并以实时交互中最常用的软件QQ为例,用wireshark软件捕获数据包,详细分析了其应用数据。

互联网摘选

4、

After this, the Tomcat welcome page should appear in the browser and lots of rows of data should appear in Wireshark.

之后浏览器上就会出现Tomcat的欢迎页面,并且在Wireshark中会出现多行数据。

互联网摘选

5、

Wireshark must have access to the private key associated with the server certificate.

Wireshark必须获得与服务器证书关联的私钥。

互联网摘选

6、

With tools like Wireshark, you can go even deeper and get more detailed information on a much wider range of protocols and content.

通过使用诸如Wireshark的工具,您可以更一地步地了解更大范围的协议和内容的更多详细信息。

互联网摘选

7、

Wireshark also supports a huge array of protocol decoders, enabling you to examine in minute detail the contents of the packets and conversations.

Wireshark也支持大量的协议解码器,这使您能够检查每分钟内数据包和会话的详细内容。

互联网摘选

8、

Now that you have Tomcat configured, you need to configure Wireshark.

您已经完成了Tomcat的配置,现在需要配置Wireshark。

互联网摘选

9、

This confirms that you have carried out all the cryptographic manipulation steps and Wireshark configuration steps correctly.

这表明您已经正确完成了所有加密操作步骤和Wireshark配置步骤。

互联网摘选

10、

In this tutorial you have learned how to capture and read a secure HTTP communication between two systems. You have seen how to generate the required cryptographic artifacts and then how to configure Tomcat and Wireshark to use them correctly.

在本教程中,您学习了如何捕获和读取两个系统间的安全HTTP通信,了解了如何生成一个必需的密码工件以及如何配置Wireshark和Tomcat来正确使用它们。

互联网摘选

11、

Once you have Wireshark configured correctly, you are ready to record a conversation.

一旦您已经正确配置Wireshark,您就可以开始记录会话了。

互联网摘选

12、

By wireshark P2P and non P2P software to capture one minute of pure data flow analysis of flow characteristics and node characteristics, and characteristics as the input parameters of the neural network with BP algorithm simulation to verify the validity of the parameters in the recognition process.

通过wireshark软件捕获P2P和非P2P一分钟的纯净数据流分析其流量特征和节点特征,并将这些特征作为神经网络的输入参数,结合BP算法进行仿真,验证参数在识别过程中的有效性。

互联网摘选

13、

This can be checked in the "About" window of Wireshark.

这点可以在Wireshark的“About”窗口核实。

互联网摘选

14、

Convert. Base64-decode only supports the line-break-chars parameter as a type-hint for striping from the encoded payload.

convert.base64-decode只支持line-break-chars参数作为从编码载荷中剥离的类型提示。

互联网摘选

15、

View state information is stored using base64 encoding and is included in the page during rendering, increasing the size of the page.

视图状态信息是使用Base64编码存储的,并在呈现期间包括在页中,这会增加页大小。

互联网摘选

16、

In RAW mode, retrieving binary data without specifying the BINARY BASE64 option will result in an error.

在RAW模式下,如果不指定BINARYBASE64选项就检索二进制数据,将导致错误。

互联网摘选

17、

In case of a binary non-optimized format, the attachment content will be sent in the payload itself, as a base64 encoded string.

如果采用未经二进制优化的格式,则附件内容将通过负载本身作为base64编码的字符串发送。

互联网摘选

18、

When encryption is used, a separate padding effect occurs from the base64 encoding used for the encrypted data.

在使用加密时,加密数据所使用的base64编码中出现了单独的填充(padding)效果。

互联网摘选

19、

Note: When your site is accessed the password is encoded weakly using Base64 and can be easily intercepted and decoded.

“注:”当你的站点被访问,密码编码的非常弱,使用的是Base64,就能非常容易地被截取和破译。

互联网摘选

20、

Basic authentication is made up of an Authentication header that contains the base64-encoded user name and password separated by a colon.

基本身份验证由包含经过base64编码的用户名和密码(二者用冒号分开)的身份验证标头组成。

互联网摘选

  • 今日热词
  • 热门搜索

美加网英语词典(dict.tjqzz.com)为您提供在线翻译英语词典单词大全英译汉汉译英等英语服务!可按单词字数词义分类查询。支持lj:关键词格式查询例句。

用户反馈
请选择反馈类型(可多选):
您的联系方式:(如需回复请填写联系方式)
反馈内容:
提交成功 小编会尽快处理
回到顶部
点击反馈