1.
Chain consists of rules that specify altering of packets just as they are about to leave the firewall.
链由指定正当信息包打算离开防火墙时改变它们的规则所组成。
2.
Encryption Even if intruders manage to break through a firewall, the data on a network can be made safe if it's encrypted.
加密即使入侵者设法突破了防火墙,如果网络上的数据是加密的,就能使其安全。
3.
When communicating with an external, public network like this there may be restrictions on your firewall that limit the communication.
当您与这样一个外部公共网络通信时,您的防火墙上可能有一些限制通信的限制。
4.
Tired of the controls, many Chinese have learned to get around "the Great Firewall, " or GFW, as the system is known.
由于厌恶网络控制,许多中国网民学会了翻越网络防火墙,GFW是此套系统的通称。
5.
Be aware that the customer may be behind a firewall, and may have to configure it in order for you to make your socket connection.
要明白,客户可能位于防火墙的后面,他可能必须对防火墙进行配置,以便您能够建立套接字连接。
6.
A SOCKS proxy is often used to allow users behind a firewall to connect to Internet servers in a limited, controlled manner.
SOCKS代理一般用于使防火墙后面的用户能够以有限的、受控的方式连接到Internet服务器。
7.
So would some sort of relationship with Baidu be one of those "specific things" which might break Facebook through the great firewall?
与百度之间结成某种关系,是否属于可能帮助Facebook突破“防火长城”的“具体事情”之列?
8.
How much quality the first-class firewall has?
一流防火墙有多少成色?
9.
Then, I start and stop the firewall. . . ooops, made a bit of a mistake when I added the rules.
然后,我启动防火墙,但又马上停止了它……哎,我在添加规则时犯了一个小错。
10.
Sending an email. Pitfall: There is an inherent wiener-ness to this approach as you cower behind the safety of your firewall.
发送邮件.诱惑:使用这种方法,你可以安全地躲在你的防火墙后面,你是一个天生的命根子主义者。