Anyone listening in on the traffic can know this as well ( as evidenced because we are using Wireshark captures).

  • 任何在网络上侦听的人当然也知道这两个数(这点很明显,因为我们是通过Wireshark获取它们的,别人也可以)。
  • 来源:互联网摘选更新时间:2025-01-20 13:30:36

  • 重点词汇
  • asadv. 同样地,一样地;例如;
  • theart.这个;指已提到或易领会到的人或事物;指独一无二的、正常的或不言而喻的人或事物;用以泛指;与形容词连用,指事物或统称的人;用于姓氏的复数形式前,指家庭或夫妇;(指特定用途的事物)足够,恰好;每,一;当前的,本,此;(重读,表示所指的为知名或重要的人或事物)
  • wireshark网络抓包工具;网络协议分析器;网络嗅探;网络协议检测程序
  • becauseconj. 因为,由于;
  • anyonepron.任何人;任何一个;谁;
  • listeningadj.收听的,收听无线电广播的;助听用的;
  • thispron.这,这个;这事,这人;这时;下面所说的事;
  • as well也, 还有;
  • 相关例句
1、

At times like this, you can turn to a tool like Wireshark, which captures all the network traffic in your system and lets you read it.

这时,您可以借助像Wireshark这样的工具,它可以捕获您系统中的所有网络流量,并使您能够进行读取。

互联网摘选

2、

Wireshark relies on capturing the entire SSL conversation.

Wireshark依赖于捕获完整的SSL会话。

互联网摘选

3、

This tutorial will work through these steps in this order and then, using a browser connecting to the Tomcat server, we will capture a request and response and examine it in Wireshark.

本教程将会按这个顺序执行这些步骤,然后使用浏览器连接Tomcat服务器,我们将获得一个请求和响应,然后就能在Wireshark中进行检查。

互联网摘选

4、

With the help of Wireshark, my favorite network tool, and a slightly modified debug build of Firefox, we can see exactly what's going on.

在我最喜爱的网络工具Wireshark以及略微修改的Firefox调试版的帮助下,我们可以对正在发生的事情看个究竟。

互联网摘选

5、

You are then free to use Wireshark as you normally would to analyse the HTTP conversation and proceed with your problem investigation.

然后您就可以像平时一样随意使用Wireshark分析HTTP会话并继续调查问题。

互联网摘选

6、

Wireshark supports such a wide variety of protocols and filters that you can get detailed information.

Wireshark支持广泛的协议和过滤器,您可以用它们获得详细的信息。

互联网摘选

7、

If your configuration was successful you will see some text indicating that Wireshark successfully loaded the private key.

如果您配置成功,您将会看到有文本提示您Wireshark已成功加载私钥。

互联网摘选

8、

In particular, this tutorial does not go into any depth about how to use Wireshark once it has been configured correctly.

特别指出,本教程并未对正确配置后如何使用Wiresharkn进行深入探讨。

互联网摘选

9、

Under Wireshark of open source environment develop again for a plug-in to analyze network management protocol assumedly.

在Wireshark开源环境下,编写插件进行二次开发,模拟解析网管协议。

互联网摘选

10、

After running this command you can load the fixed packet capture file back in to Wireshark and then you should see the decrypted packets as expected.

运行完这条命令之后,您可以重新把修正过的数据包获取文件加载到Wireshark,然后您就会看到预期的已解密数据包。

互联网摘选

11、

And example by the most commonly used in real-time interactive software QQ, using wireshark software to capture packets, then detailed analysis of the application data.

并以实时交互中最常用的软件QQ为例,用wireshark软件捕获数据包,详细分析了其应用数据。

互联网摘选

12、

After this, the Tomcat welcome page should appear in the browser and lots of rows of data should appear in Wireshark.

之后浏览器上就会出现Tomcat的欢迎页面,并且在Wireshark中会出现多行数据。

互联网摘选

13、

Wireshark must have access to the private key associated with the server certificate.

Wireshark必须获得与服务器证书关联的私钥。

互联网摘选

14、

With tools like Wireshark, you can go even deeper and get more detailed information on a much wider range of protocols and content.

通过使用诸如Wireshark的工具,您可以更一地步地了解更大范围的协议和内容的更多详细信息。

互联网摘选

15、

Wireshark also supports a huge array of protocol decoders, enabling you to examine in minute detail the contents of the packets and conversations.

Wireshark也支持大量的协议解码器,这使您能够检查每分钟内数据包和会话的详细内容。

互联网摘选

16、

Now that you have Tomcat configured, you need to configure Wireshark.

您已经完成了Tomcat的配置,现在需要配置Wireshark。

互联网摘选

17、

This confirms that you have carried out all the cryptographic manipulation steps and Wireshark configuration steps correctly.

这表明您已经正确完成了所有加密操作步骤和Wireshark配置步骤。

互联网摘选

18、

In this tutorial you have learned how to capture and read a secure HTTP communication between two systems. You have seen how to generate the required cryptographic artifacts and then how to configure Tomcat and Wireshark to use them correctly.

在本教程中,您学习了如何捕获和读取两个系统间的安全HTTP通信,了解了如何生成一个必需的密码工件以及如何配置Wireshark和Tomcat来正确使用它们。

互联网摘选

19、

Once you have Wireshark configured correctly, you are ready to record a conversation.

一旦您已经正确配置Wireshark,您就可以开始记录会话了。

互联网摘选

20、

By wireshark P2P and non P2P software to capture one minute of pure data flow analysis of flow characteristics and node characteristics, and characteristics as the input parameters of the neural network with BP algorithm simulation to verify the validity of the parameters in the recognition process.

通过wireshark软件捕获P2P和非P2P一分钟的纯净数据流分析其流量特征和节点特征,并将这些特征作为神经网络的输入参数,结合BP算法进行仿真,验证参数在识别过程中的有效性。

互联网摘选

  • 今日热词
  • 热门搜索

美加网英语词典(dict.tjqzz.com)为您提供在线翻译英语词典单词大全英译汉汉译英等英语服务!可按单词字数词义分类查询。支持lj:关键词格式查询例句。

用户反馈
请选择反馈类型(可多选):
您的联系方式:(如需回复请填写联系方式)
反馈内容:
提交成功 小编会尽快处理
回到顶部
点击反馈