Examples of using Network protocol in English and their translations into Russian
{-}
-
Official
-
Colloquial
service that uses TCP/IP as its network protocol and is associated with a specific Transmission Control Protocol(TCP)
For WAS activation to work, the network protocol that is specified in the URI must be enabled on the server
Click this button to add a network protocol that you want to be available for use by DCOM on this computer.
In DCOM Protocols and endpoints, click the entry to specify the network protocol that is used to communicate with a remote commit coordinator.
a Uniform Resource Identifier(URI) address that identifies the network protocol that WAS uses to activate the application.
a Uniform Resource Identifier(URI) address that identifies the network protocol that WAS uses to activate the application.
LonTalk is used as a network protocol enabling data transfer using any medium and network topology.
Monitoring of V5.2 interface operation and the product as a whole is performed using SNMP network protocol.
kernel modules use different regular expression libraries) to identify the network protocol.
It was discovered that Wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for PCP,
by influencing software and hardware vendors to seriously consider the need for computing platforms to support more than one network protocol stack simultaneously.
A pleasant peculiarity of creating programs in MQL4 is that a programmer need not necessarily have special knowledge about the interaction of the client terminal with an operating system, of network protocol characteristics, or of a compiler structure.
the transaction scripting language, the P2P network protocol and the‘Northbound' client,
It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for DCERPC,
It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for CIP Safety, IWARP_MPA, NetBIOS, Profinet I/O
It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors/file parsers for IxVeriWave,
by using the TCP/IP networking protocol.
Testing of network protocols.
Pd uses FUDI as a networking protocol.
Establishment of satellite-based Internet and other networking protocols.