2. The kinematic analysis and dimensional syn-thesis Problems of robots are studied.
本文研究了机器人执行机构运动分析和尺度综合问题。
来自互联网
3. Currently the evolvement of the basin is probably in late syn-rift phase of the second event.
现今盆地的演化可能处于第二次伸展减薄—热事件的同裂谷相的晚期。
来自互联网
4. And obviously this process, the syn-fuel process, is coming back in vogue with the energy crisis around now.
很明显这个过程,合成燃料的过程,随着能源危机的到来,变得又时髦起来了。
来自互联网
5. Growth took place under conditions of high supersaturation suggesting that rim growth marks the onset of decompression and the transition from pre-eruptive to syn-eruptive conditions.
6. When a new TCP connection comes in from a client by means of a packet with the SYN bit set, the server creates an entry for the half-open connection and responds with a SYN-ACK packet.
7. Enough SYN requests to the system, and an attacker can use all the connections on a system so that nothing else can get through.
只要针对系统的SYN请求足够多,攻击者就能够使用系统上的所有连接,从而阻止任何东西通过。
来自互联网
8. The server allocates resources for the connections upon receipt of the SYN, then under a flood of SYN packets, eventually runs out and is unable to service new requests.
9. In response, the scanned host returns a packet with the SYN and ack flags set if the port is open.
如果该端口是打开的,则被扫描主机返回设置了syn和ack标志的包进行响应。
来自互联网
10. To accomplish this, the attacker sends a TCP packet with the SYN flag set to the target host, just like when opening a regular TCP connection.
要实现这一点,攻击者向目标主机发送设置了SYN标志的tcp包,就象打开常规tCP连接时一样。
来自互联网
11. The problem that can occur with TCP is when a rogue client forges an IP packet with a bogus source address, then floods a server with TCP SYN packets.
23. tcp_input() executes at the s/w interrupt, and picks up the SYN packet from ipintrq, processes it, and places the partially completed socket connection in an incomplete socket queue.
25. The SYN cookie feature recognizes this condition and starts using an elegant method that preserves space in the queue (see the Resources section for full details).