"Mode promiscu"@ca . "Der promiskuitive Modus oder Promiscuous-Modus (aus dem englischen \u201Apromiscuous mode\u2018 entlehnt, etwa f\u00FCr \u201Efreiz\u00FCgiger Modus\u201C) bezeichnet einen bestimmten Empfangsmodus f\u00FCr netzwerktechnische Ger\u00E4te."@de . . . "\u30D7\u30ED\u30DF\u30B9\u30AD\u30E3\u30B9\u30FB\u30E2\u30FC\u30C9\uFF08\u82F1\u8A9E: promiscuous mode\uFF09\u3068\u306F\u3001\u30B3\u30F3\u30D4\u30E5\u30FC\u30BF\u30FB\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u306E\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u30AB\u30FC\u30C9\u304C\u6301\u3064\u52D5\u4F5C\u30E2\u30FC\u30C9\u306E\u4E00\u3064\u3067\u3042\u308B\u3002\u300C\u30D7\u30ED\u30DF\u30B9\u30AD\u30E3\u30B9\u300D\u306F\u300C\u7121\u5DEE\u5225\u306E\u300D\u3068\u3044\u3046\u610F\u5473\u3092\u6301\u3061\u3001\u81EA\u5206\u5B9B\u306E\u30C7\u30FC\u30BF\u30D1\u30B1\u30C3\u30C8\u3067\u306A\u3044\u4FE1\u53F7\u3082\u53D6\u308A\u8FBC\u3093\u3067\u51E6\u7406\u3092\u3059\u308B\u3053\u3068\u3092\u793A\u3059\u3002 \u6A19\u6E96\u306E\u72B6\u614B\u306B\u304A\u3044\u3066\u306F\u3001\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u30AB\u30FC\u30C9\u306F\u81EA\u5206\u5B9B\u306E\u30D1\u30B1\u30C3\u30C8\u3092\u53D7\u4FE1\u3057\u305F\u3068\u304D\u306B\u3060\u3051\u3001\u4E0A\u4F4D\u306E\u30B7\u30B9\u30C6\u30E0\u306B\u305D\u306E\u5185\u5BB9\u3092\u901A\u77E5\u3059\u308B\u3088\u3046\u306B\u306A\u3063\u3066\u3044\u308B\u3002\u4F8B\u3048\u3070\u3001\u30A4\u30FC\u30B5\u30CD\u30C3\u30C8\u7528\u306E\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u30AB\u30FC\u30C9\u3067\u306F\u3001\u81EA\u5206\u306E\u6301\u3064MAC\u30A2\u30C9\u30EC\u30B9\u4EE5\u5916\u3078\u9001\u4FE1\u3055\u308C\u305F\u30D1\u30B1\u30C3\u30C8\u3092\u53D7\u4FE1\u3057\u3066\u3082CPU\u306B\u5BFE\u3057\u5272\u308A\u8FBC\u307F\u3092\u304B\u3051\u305A\u3001\u305D\u308C\u3092\u51E6\u7406\u3057\u306A\u3044\u3002\u305F\u3060\u3057\u3001\u30D6\u30ED\u30FC\u30C9\u30AD\u30E3\u30B9\u30C8\u306A\u3069\u306E\u4F8B\u5916\u306F\u3042\u308B\u3002 \u3057\u304B\u3057\u3001\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u30AB\u30FC\u30C9\u306B\u30D7\u30ED\u30DF\u30B9\u30AD\u30E3\u30B9\u30FB\u30E2\u30FC\u30C9\u3067\u306E\u52D5\u4F5C\u3092\u6307\u793A\u3057\u3066\u304A\u3051\u3070\u3001\u30D1\u30B1\u30C3\u30C8\u306E\u5B9B\u5148\u306B\u95A2\u308F\u3089\u305A\u30D1\u30B1\u30C3\u30C8\u306E\u5230\u7740\u3092\u4E0A\u4F4D\u306E\u30B7\u30B9\u30C6\u30E0\u306B\u77E5\u3089\u305B\u308B\u3088\u3046\u306B\u306A\u308A\u3001\u4E0A\u4F4D\u306E\u30B7\u30B9\u30C6\u30E0\u306F\u81EA\u5206\u5B9B\u306E\u30D1\u30B1\u30C3\u30C8\u4EE5\u5916\u306E\u30C7\u30FC\u30BF\u3082\u5168\u3066\u51E6\u7406\u3059\u308B\u3053\u3068\u304C\u3067\u304D\u308B\u3088\u3046\u306B\u306A\u308B\u3002\u3064\u307E\u308A\u3001\u30D7\u30ED\u30DF\u30B9\u30AD\u30E3\u30B9\u30FB\u30E2\u30FC\u30C9\u3068\u3057\u305F\u5834\u5408\u3001\u305D\u306E\u30CE\u30FC\u30C9\u3078\u5C4A\u3051\u3089\u308C\u308B\u30D1\u30B1\u30C3\u30C8\u5168\u3066\u3092\u7121\u5DEE\u5225\u306B\u53D7\u3051\u5165\u308C\u308B\u3088\u3046\u306B\u306A\u308B\u3002 \u306A\u304A\u3001\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u578B\u306EIDS\u3092\u5C0E\u5165\u3059\u308B\u969B\u306B\u3082\u3001\u30C8\u30E9\u30D5\u30A3\u30C3\u30AF\u3092\u76E3\u8996\u3059\u308B\u305F\u3081\u306B\u30D7\u30ED\u30DF\u30B9\u30AD\u30E3\u30B9\u30FB\u30E2\u30FC\u30C9\u3092\u5229\u7528\u3059\u308B\u3002"@ja . "Modalit\u00E0 promiscua"@it . . . "Promiscuous mode \u0438\u043B\u0438 promisc mode \u2014 \u0442\u0430\u043A \u043D\u0430\u0437\u044B\u0432\u0430\u0435\u043C\u044B\u0439 \u00AB\u043D\u0435\u0440\u0430\u0437\u0431\u043E\u0440\u0447\u0438\u0432\u044B\u0439\u00BB \u0440\u0435\u0436\u0438\u043C, \u0432 \u043A\u043E\u0442\u043E\u0440\u043E\u043C \u0441\u0435\u0442\u0435\u0432\u0430\u044F \u043F\u043B\u0430\u0442\u0430 \u043F\u043E\u0437\u0432\u043E\u043B\u044F\u0435\u0442 \u043F\u0440\u0438\u043D\u0438\u043C\u0430\u0442\u044C \u0432\u0441\u0435 \u043F\u0430\u043A\u0435\u0442\u044B \u043D\u0435\u0437\u0430\u0432\u0438\u0441\u0438\u043C\u043E \u043E\u0442 \u0442\u043E\u0433\u043E, \u043A\u043E\u043C\u0443 \u043E\u043D\u0438 \u0430\u0434\u0440\u0435\u0441\u043E\u0432\u0430\u043D\u044B. \u0412 \u043D\u043E\u0440\u043C\u0430\u043B\u044C\u043D\u043E\u043C \u0441\u043E\u0441\u0442\u043E\u044F\u043D\u0438\u0438 \u043D\u0430 Ethernet-\u0438\u043D\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u0443\u0435\u0442\u0441\u044F \u0444\u0438\u043B\u044C\u0442\u0440\u0430\u0446\u0438\u044F \u043F\u0430\u043A\u0435\u0442\u043E\u0432 \u043A\u0430\u043D\u0430\u043B\u044C\u043D\u043E\u0433\u043E \u0443\u0440\u043E\u0432\u043D\u044F \u0438 \u0435\u0441\u043B\u0438 MAC-\u0430\u0434\u0440\u0435\u0441 \u043D\u0430\u0437\u043D\u0430\u0447\u0435\u043D\u0438\u044F \u0432 \u0437\u0430\u0433\u043E\u043B\u043E\u0432\u043A\u0435 \u043F\u0440\u0438\u043D\u044F\u0442\u043E\u0433\u043E \u043F\u0430\u043A\u0435\u0442\u0430 \u043D\u0435 \u0441\u043E\u0432\u043F\u0430\u0434\u0430\u0435\u0442 \u0441 MAC-\u0430\u0434\u0440\u0435\u0441\u043E\u043C \u0442\u0435\u043A\u0443\u0449\u0435\u0433\u043E \u0441\u0435\u0442\u0435\u0432\u043E\u0433\u043E \u0438\u043D\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 \u0438 \u043D\u0435 \u044F\u0432\u043B\u044F\u0435\u0442\u0441\u044F \u0448\u0438\u0440\u043E\u043A\u043E\u0432\u0435\u0449\u0430\u0442\u0435\u043B\u044C\u043D\u044B\u043C, \u0442\u043E \u043F\u0430\u043A\u0435\u0442 \u043E\u0442\u0431\u0440\u0430\u0441\u044B\u0432\u0430\u0435\u0442\u0441\u044F. \u0412 \u00AB\u043D\u0435\u0440\u0430\u0437\u0431\u043E\u0440\u0447\u0438\u0432\u043E\u043C\u00BB \u0440\u0435\u0436\u0438\u043C\u0435 \u0444\u0438\u043B\u044C\u0442\u0440\u0430\u0446\u0438\u044F \u043D\u0430 \u0441\u0435\u0442\u0435\u0432\u043E\u043C \u0438\u043D\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 \u043E\u0442\u043A\u043B\u044E\u0447\u0430\u0435\u0442\u0441\u044F \u0438 \u0432\u0441\u0435 \u043F\u0430\u043A\u0435\u0442\u044B, \u0432\u043A\u043B\u044E\u0447\u0430\u044F \u043D\u0435\u043F\u0440\u0435\u0434\u043D\u0430\u0437\u043D\u0430\u0447\u0435\u043D\u043D\u044B\u0435 \u0442\u0435\u043A\u0443\u0449\u0435\u043C\u0443 \u0443\u0437\u043B\u0443, \u043F\u0440\u043E\u043F\u0443\u0441\u043A\u0430\u044E\u0442\u0441\u044F \u0432 \u0441\u0438\u0441\u0442\u0435\u043C\u0443."@ru . . "Promiscue modus (Engels: promiscuous mode) is een configuratie van een netwerkkaart die het mogelijk maakt om alle binnenkomende frames te verwerken in plaats van enkel de frames die aan de netwerkkaart geadresseerd zijn. Elk frame bevat een hardware adres (MAC-adres). Wanneer een netwerkkaart een frame ontvangt, wordt het frame gedropt tenzij het bestemmings MAC-adres uit het frame overeenkomt met het MAC adres van de netwerkkaart. In promiscue modus daarentegen worden alle frames geaccepteerd, waardoor een computer ook frames kan verwerken die bedoeld zijn voor andere network devices."@nl . "4518"^^ . . "Tryb promiscuous (ang. promiscuous mode \u2013 tryb nas\u0142uchiwania, tryb mieszany) \u2013 tryb pracy interfejsu sieciowego (np. ethernetowej karty sieciowej), polegaj\u0105cy na odbieraniu ca\u0142ego ruchu docieraj\u0105cego do karty sieciowej, nie tylko skierowanego na adres MAC karty sieciowej.Aby przestawi\u0107 kart\u0119 sieciow\u0105 w tryb promiscuous w systemie Linux nale\u017Cy wyda\u0107 w terminalu polecenie: ifconfig promisc"@pl . . . . . "\u6DF7\u6742\u6A21\u5F0F\uFF08\u82F1\u8A9E\uFF1Apromiscuous mode\uFF09\u662F\u7535\u8111\u7F51\u7EDC\u4E2D\u7684\u672F\u8BED\u3002\u662F\u6307\u4E00\u53F0\u673A\u5668\u7684\u7F51\u5361\u80FD\u591F\u63A5\u6536\u6240\u6709\u7ECF\u8FC7\u5B83\u7684\u6570\u636E\u6D41\uFF0C\u800C\u4E0D\u8BBA\u5176\u76EE\u7684\u5730\u5740\u662F\u5426\u662F\u5B83\u3002 \u4E00\u822C\u8BA1\u7B97\u673A\u7F51\u5361\u90FD\u5DE5\u4F5C\u5728\u975E\u6DF7\u6742\u6A21\u5F0F\u4E0B\uFF0C\u6B64\u65F6\u7F51\u5361\u53EA\u63A5\u53D7\u6765\u81EA\u7F51\u7EDC\u7AEF\u53E3\u7684\u76EE\u7684\u5730\u5740\u6307\u5411\u81EA\u5DF1\u7684\u6570\u636E\u3002\u5F53\u7F51\u5361\u5DE5\u4F5C\u5728\u6DF7\u6742\u6A21\u5F0F\u4E0B\u65F6\uFF0C\u7F51\u5361\u5C06\u6765\u81EA\u63A5\u53E3\u7684\u6240\u6709\u6570\u636E\u90FD\u6355\u83B7\u5E76\u4EA4\u7ED9\u76F8\u5E94\u7684\u9A71\u52A8\u7A0B\u5E8F\u3002\u7F51\u5361\u7684\u6DF7\u6742\u6A21\u5F0F\u4E00\u822C\u5728\u7F51\u7EDC\u7BA1\u7406\u5458\u5206\u6790\u7F51\u7EDC\u6570\u636E\u4F5C\u4E3A\u7F51\u7EDC\u6545\u969C\u8BCA\u65AD\u624B\u6BB5\u65F6\u7528\u5230\uFF0C\u540C\u65F6\u8FD9\u4E2A\u6A21\u5F0F\u4E5F\u88AB\u7F51\u7EDC\u9ED1\u5BA2\u5229\u7528\u6765\u4F5C\u4E3A\u7F51\u7EDC\u6570\u636E\u7A83\u542C\u7684\u5165\u53E3\u3002\u5728Linux\u64CD\u4F5C\u7CFB\u7EDF\u4E2D\u8BBE\u7F6E\u7F51\u5361\u6DF7\u6742\u6A21\u5F0F\u65F6\u9700\u8981\u7BA1\u7406\u5458\u6743\u9650\u3002\u5728Windows\u64CD\u4F5C\u7CFB\u7EDF\u548CLinux\u64CD\u4F5C\u7CFB\u7EDF\u4E2D\u90FD\u6709\u4F7F\u7528\u6DF7\u6742\u6A21\u5F0F\u7684\u6293\u5305\u5DE5\u5177\uFF0C\u6BD4\u5982\u8457\u540D\u7684\u5F00\u6E90\u8F6F\u4EF6Wireshark\u3002"@zh . "Promiskuitn\u00ED re\u017Eim"@cs . . . "357817"^^ . . . . . . . . "Promiscuous mode"@en . . "La modalit\u00E0 promiscua \u00E8 una in cui l'interfaccia di rete cablata o wireless fa passare all'unit\u00E0 centrale (CPU) tutto il traffico che pu\u00F2 osservare in rete. Nella modalit\u00E0 non promiscua, invece, l'interfaccia di rete lascia passare alla CPU soltanto i messaggi che contengono, nel campo del destinatario, l'indirizzo dell'interfaccia, scartando tutti gli altri messaggi che non le sono destinati. Questa modalit\u00E0 normalmente \u00E8 utilizzata durante le operazioni di sniffing dei pacchetti, consentendo di ricevere una quantit\u00E0 enorme di pacchetti senza interruzioni. Questa modalit\u00E0 \u00E8 utile sia per la virtualizzazione hardware che per le reti bridged. Nelle reti Ethernet IEEE 802, Token Ring IEEE 802.11 e anche in FDDI, ogni trama (frame) contiene un indirizzo di destinazione Media Access Control (MAC address).Durante la No Mode, quindi quando non si \u00E8 in modalit\u00E0 promiscua, un'interfaccia di rete (NIC) riceve solo i propri frame, mentre in modalit\u00E0 promiscua, la scheda permette al computer di leggere tutti i frame, anche quelli destinati ad altri computer. Monitor Mode \u00E8 invece una modalit\u00E0 che permette di ricevere pacchetti anche non essendo connessi a una rete WiFi. In alcuni chip, per avere la modalit\u00E0 promiscua funzionante, occorre abilitare la Monitor Mode. Molti sistemi operativi richiedono i privilegi di superutente per attivare la modalit\u00E0 promiscua.Un non-nodo di routing in modalit\u00E0 promiscua pu\u00F2 in genere solo monitorare il traffico, da e verso altri nodi all'interno del dominio stesso di trasmissione (per Ethernet e IEEE 802.11) o ad anello (per Token Ring o FDDI). La modalit\u00E0 promiscua \u00E8 spesso usata per diagnosticare i problemi di connettivit\u00E0 di rete, ci sono programmi che fanno uso di questa funzione per mostrare all'utente tutti i dati che vengono trasferiti attraverso la rete. Alcuni protocolli di trasferimento dati, come FTP e Telnet possono visualizzare questi dati, quindi agli utenti \u00E8 consigliato di stare alla larga da certi protocolli insicuri come Telnet e utilizzare protocolli sicuri come SSH."@it . . "Modo promiscuo"@es . . . . . "Em redes de computadores, o modo prom\u00EDscuo (ou comunica\u00E7\u00E3o prom\u00EDscua) \u00E9 um modo para um controlador de interface de rede com fio (NIC) ou um (WNIC) que faz com que o controlador repasse todo o tr\u00E1fego que recebe para a unidade central de processamento (CPU), em vez de passar apenas os quadros (frames) que o controlador est\u00E1 especificamente programado para receber. Esse modo \u00E9 normalmente usado para an\u00E1lise de pacotes que ocorrem em um roteador ou em um computador conectado a uma rede cabeada ou fazendo parte de uma LAN sem fio. As interfaces s\u00E3o colocadas no modo prom\u00EDscuo por pontes de software frequentemente usadas com a ."@pt . . . . . . . "Em redes de computadores, o modo prom\u00EDscuo (ou comunica\u00E7\u00E3o prom\u00EDscua) \u00E9 um modo para um controlador de interface de rede com fio (NIC) ou um (WNIC) que faz com que o controlador repasse todo o tr\u00E1fego que recebe para a unidade central de processamento (CPU), em vez de passar apenas os quadros (frames) que o controlador est\u00E1 especificamente programado para receber. Esse modo \u00E9 normalmente usado para an\u00E1lise de pacotes que ocorrem em um roteador ou em um computador conectado a uma rede cabeada ou fazendo parte de uma LAN sem fio. As interfaces s\u00E3o colocadas no modo prom\u00EDscuo por pontes de software frequentemente usadas com a . Nas redes IEEE 802, como Ethernet ou IEEE 802.11, cada quadro inclui um endere\u00E7o MAC de destino. No modo n\u00E3o prom\u00EDscuo, quando uma NIC recebe um quadro, ela o descarta, a menos que o quadro seja endere\u00E7ado ao endere\u00E7o MAC dessa NIC ou seja um quadro de broadcast ou multicast. No modo prom\u00EDscuo, no entanto, a NIC permite a passagem de todos os quadros, permitindo que o computador leia os quadros destinados a outras m\u00E1quinas ou dispositivos de rede. Muitos sistemas operacionais exigem privil\u00E9gios de superusu\u00E1rio para ativar o modo prom\u00EDscuo. Um n\u00F3 sem roteamento no modo prom\u00EDscuo geralmente apenas monitora o tr\u00E1fego de e para outros n\u00F3s no mesmo dom\u00EDnio de broadcast (para Ethernet e IEEE 802.11) ou anel (para token ring). Os computadores conectados ao mesmo hub Ethernet atendem a esse requisito, e \u00E9 por isso que os comutadores de rede s\u00E3o usados \u200B\u200Bpara combater o uso mal-intencionado do modo prom\u00EDscuo. Um roteador pode monitorar todo o tr\u00E1fego que ele rotear. O modo prom\u00EDscuo \u00E9 frequentemente usado para diagnosticar problemas de conectividade de rede. Existem programas que usam esse recurso para mostrar ao usu\u00E1rio todos os dados que est\u00E3o sendo transferidos pela rede. Alguns protocolos como FTP e Telnet transferem dados e senhas em texto n\u00E3o criptografado, sem criptografia, e os scanners de rede podem ver esses dados. Portanto, os usu\u00E1rios de computador s\u00E3o incentivados a ficar longe de protocolos inseguros como o telnet e a usar protocolos mais seguros, como o SSH."@pt . . . . . "In computer networking, promiscuous mode is a mode for a wired network interface controller (NIC) or wireless network interface controller (WNIC) that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is specifically programmed to receive. This mode is normally used for packet sniffing that takes place on a router or on a computer connected to a wired network or one being part of a wireless LAN. Interfaces are placed into promiscuous mode by software bridges often used with hardware virtualization."@en . . "Promiskuitiver Modus"@de . . "Promiscuous mode (traduit de temps en temps en \u00AB mode promiscuit\u00E9 \u00BB), en informatique, se r\u00E9f\u00E8re \u00E0 une configuration de la carte r\u00E9seau, qui permet \u00E0 celle-ci d'accepter tous les paquets qu'elle re\u00E7oit, m\u00EAme si ceux-ci ne lui sont pas adress\u00E9s. Ce mode est une fonctionnalit\u00E9 g\u00E9n\u00E9ralement utilis\u00E9e pour \u00E9couter le trafic r\u00E9seau. La plupart des syst\u00E8mes d'exploitation requi\u00E8rent que l'utilisateur dispose de privil\u00E8ges avanc\u00E9s pour qu'il puisse activer le mode promiscuit\u00E9."@fr . . . "Promiscuous mode (traduit de temps en temps en \u00AB mode promiscuit\u00E9 \u00BB), en informatique, se r\u00E9f\u00E8re \u00E0 une configuration de la carte r\u00E9seau, qui permet \u00E0 celle-ci d'accepter tous les paquets qu'elle re\u00E7oit, m\u00EAme si ceux-ci ne lui sont pas adress\u00E9s. Ce mode est une fonctionnalit\u00E9 g\u00E9n\u00E9ralement utilis\u00E9e pour \u00E9couter le trafic r\u00E9seau. Chaque paquet r\u00E9seau envoy\u00E9 inclut l'adresse (adresse MAC) de la carte r\u00E9seau destinataire. Quand une carte r\u00E9seau voit passer un paquet, elle v\u00E9rifie si elle est la destinataire du paquet ; si elle ne l'est pas, elle ne tient pas compte du paquet ; mais en mode promiscuous, elle traite le paquet dans tous les cas, permettant ainsi \u00E0 l'ordinateur de pouvoir lire tous les paquets. Un n\u0153ud de r\u00E9seau qui ne fait pas de routage et qui est en mode promiscuous peut g\u00E9n\u00E9ralement seulement voir le trafic r\u00E9seau vers et en provenance des autres n\u0153uds \u00E0 l'int\u00E9rieur du m\u00EAme domaine de collision (pour Ethernet et Wi-Fi) ou anneau (pour Token-Ring ou FDDI). L'exemple typique est un ensemble d'ordinateurs connect\u00E9s au m\u00EAme concentrateur. Les commutateurs r\u00E9seau sont utilis\u00E9s pour combattre l'usage du mode promiscuous. La plupart des syst\u00E8mes d'exploitation requi\u00E8rent que l'utilisateur dispose de privil\u00E8ges avanc\u00E9s pour qu'il puisse activer le mode promiscuit\u00E9. Le mode promiscuous est souvent employ\u00E9 pour diagnostiquer des probl\u00E8mes de connectivit\u00E9 r\u00E9seau. Il existe des programmes (sniffeurs ou outils de statistiques) qui utilisent ce mode pour d\u00E9coder et montrer tout le trafic du r\u00E9seau \u00E0 l'administrateur qui les ex\u00E9cute. Par exemple, des protocoles comme ftp ou telnet transmettent toutes les donn\u00E9es (mot de passe, commandes, contenus) en clair (sans chiffrement) et donc les programmes d'\u00E9coute peuvent tr\u00E8s facilement les reproduire \u00E0 l'\u00E9cran. Pour \u00E9viter cela, on peut utiliser le chiffrement des applications (ssh au lieu de telnet par exemple) ou de tout ce qui transite sur le r\u00E9seau (IPsec)."@fr . . . . . . . "Promiscue modus (Engels: promiscuous mode) is een configuratie van een netwerkkaart die het mogelijk maakt om alle binnenkomende frames te verwerken in plaats van enkel de frames die aan de netwerkkaart geadresseerd zijn. Elk frame bevat een hardware adres (MAC-adres). Wanneer een netwerkkaart een frame ontvangt, wordt het frame gedropt tenzij het bestemmings MAC-adres uit het frame overeenkomt met het MAC adres van de netwerkkaart. In promiscue modus daarentegen worden alle frames geaccepteerd, waardoor een computer ook frames kan verwerken die bedoeld zijn voor andere network devices."@nl . . . . . "En inform\u00E0tica, el mode promiscu \u00E9s aquell en el qual un ordinador que es connecta a una xarxa compartida, tant la basada en cable de coure com la basada en tecnologia sense fils, captura tot el tr\u00E0nsit que circula.Aquest mode est\u00E0 molt relacionat amb els , que es basen en aquest mode per realitzar la seva tasca."@ca . . "\uCEF4\uD4E8\uD130 \uB124\uD2B8\uC6CC\uD0B9\uC5D0\uC11C \uBB34\uCC28\uBCC4 \uBAA8\uB4DC(Promiscuous mode)\uB294 \uCEE8\uD2B8\uB864\uB7EC\uAC00 \uC218\uC2E0\uD558\uB294 \uBAA8\uB4E0 \uD2B8\uB798\uD53D\uC744 \uD504\uB808\uC784\uB9CC \uC804\uB2EC\uD558\uB294 \uB300\uC2E0 \uC911\uC559 \uCC98\uB9AC \uC7A5\uCE58 (CPU)\uB85C \uC804\uB2EC\uD558\uB3C4\uB85D\uD558\uB294 \uC720\uC120 NIC ( \uB124\uD2B8\uC6CC\uD06C \uC778\uD130\uD398\uC774\uC2A4 \uCEE8\uD2B8\uB864\uB7EC ) \uB610\uB294 WNIC (\uBB34\uC120 \uB124\uD2B8\uC6CC\uD06C \uC778\uD130\uD398\uC774\uC2A4 \uCEE8\uD2B8\uB864\uB7EC ) \uC6A9 \uBAA8\uB4DC\uC774\uB2E4. \uBAA8\uB4E0 \uD2B8\uB798\uB9AD \uD504\uB808\uC784\uC740 \uCEE8\uD2B8\uB864\uB7EC\uAC00 \uC218\uC2E0\uD558\uB3C4\uB85D \uD2B9\uBCC4\uD788 \uD504\uB85C\uADF8\uB798\uBC0D\uB418\uC5B4 \uC788\uB2E4. \uC774 \uBAA8\uB4DC\uB294 \uC77C\uBC18\uC801\uC73C\uB85C \uB77C\uC6B0\uD130 \uB610\uB294 \uC720\uC120 \uB124\uD2B8\uC6CC\uD06C\uC5D0 \uC5F0\uACB0\uB41C \uCEF4\uD4E8\uD130 \uB610\uB294 \uBB34\uC120 LAN\uC758 \uC77C\uBD80\uC778 \uCEF4\uD4E8\uD130\uC5D0\uC11C \uBC1C\uC0DD\uD558\uB294 \uD328\uD0B7 \uC2A4\uB2C8\uD551\uC5D0 \uC0AC\uC6A9\uB41C\uB2E4. \uC778\uD130\uD398\uC774\uC2A4\uB294 \uD558\uB4DC\uC6E8\uC5B4 \uAC00\uC0C1\uD654\uC640 \uD568\uAED8 \uC790\uC8FC \uC0AC\uC6A9\uB418\uB294 \uC18C\uD504\uD2B8\uC6E8\uC5B4 \uBE0C\uB9AC\uC9C0\uC5D0 \uC758\uD574 \uBB34\uCC28\uBCC4 \uBAA8\uB4DC\uB85C \uC124\uC815\uB41C\uB2E4. \uC774\uB354\uB137 \uB610\uB294 IEEE 802.11\uACFC \uAC19\uC740 IEEE 802 \uB124\uD2B8\uC6CC\uD06C\uC5D0\uC11C \uAC01 \uD504\uB808\uC784\uC5D0\uB294 \uB300\uC0C1 MAC \uC8FC\uC18C\uAC00 \uD3EC\uD568\uB41C\uB2E4. non-promiscuous \uBAA8\uB4DC\uC5D0\uC11C\uB294 NIC\uC774 \uD504\uB808\uC784\uC744 \uC218\uC2E0\uD560 \uB54C \uD504\uB808\uC784\uC774 \uD574\uB2F9 NIC\uC758 MAC \uC8FC\uC18C\uB85C \uC9C0\uC815\uB418\uAC70\uB098 \uBE0C\uB85C\uB4DC \uCE90\uC2A4\uD2B8 \uB610\uB294 \uBA40\uD2F0 \uCE90\uC2A4\uD2B8 \uC8FC\uC18C \uC9C0\uC815 \uD504\uB808\uC784\uC774 \uC544\uB2CC \uACBD\uC6B0 \uD504\uB808\uC784\uC744 \uC0AD\uC81C\uD55C\uB2E4. \uADF8\uB7EC\uB098 \uBB34\uCC28\uBCC4 \uBAA8\uB4DC\uC5D0\uC11C NIC\uB294 \uBAA8\uB4E0 \uD504\uB808\uC784\uC744 \uD5C8\uC6A9\uD558\uBBC0\uB85C \uCEF4\uD4E8\uD130\uAC00 \uB2E4\uB978 \uCEF4\uD4E8\uD130 \uB610\uB294 \uB124\uD2B8\uC6CC\uD06C \uC7A5\uCE58\uC6A9\uC73C\uB85C \uC758\uB3C4\uB41C \uD504\uB808\uC784\uC744 \uC77D\uC744 \uC218 \uC788\uB2E4. \uB9CE\uC740 \uC6B4\uC601 \uCCB4\uC81C\uC5D0\uC11C \uBB34\uCC28\uBCC4 \uBAA8\uB4DC\uB97C \uD65C\uC131\uD654\uD558\uB824\uBA74 \uC288\uD37C\uC720\uC800 \uAD8C\uD55C\uC774 \uD544\uC694\uD558\uB2E4. \uBB34\uCC28\uBCC4 \uBAA8\uB4DC\uC758 \uBE44 \uB77C\uC6B0\uD305 \uB178\uB4DC\uB294 \uC77C\uBC18\uC801\uC73C\uB85C \uB3D9\uC77C\uD55C \uBE0C\uB85C\uB4DC \uCE90\uC2A4\uD2B8 \uB3C4\uBA54\uC778(\uC774\uB354\uB137 \uBC0F IEEE 802.11\uC758 \uACBD\uC6B0) \uB610\uB294 \uB9C1 (\uD1A0\uD070 \uB9C1\uC758 \uACBD\uC6B0) \uB0B4\uC758 \uB2E4\uB978 \uB178\uB4DC\uC640 \uC8FC\uACE0\uBC1B\uB294 \uD2B8\uB798\uD53D \uB9CC \uBAA8\uB2C8\uD130\uB9C1 \uD560 \uC218 \uC788\uB2E4. \uB3D9\uC77C\uD55C \uC774\uB354\uB137 \uD5C8\uBE0C\uC5D0 \uC5F0\uACB0\uB41C \uCEF4\uD4E8\uD130\uB294 \uC774 \uC694\uAD6C \uC0AC\uD56D\uC744 \uCDA9\uC871\uD558\uBBC0\uB85C \uBB34\uCC28\uBCC4 \uBAA8\uB4DC\uC758 \uC545\uC758\uC801\uC778 \uC0AC\uC6A9\uC744 \uBC29\uC9C0\uD558\uAE30 \uC704\uD574 \uB124\uD2B8\uC6CC\uD06C \uC2A4\uC704\uCE58\uAC00 \uC0AC\uC6A9\uB41C\uB2E4. \uB77C\uC6B0\uD130\uB294 \uB77C\uC6B0\uD305\uD558\uB294 \uBAA8\uB4E0 \uD2B8\uB798\uD53D\uC744 \uBAA8\uB2C8\uD130\uB9C1 \uD560 \uC218 \uC788\uB2E4. \uBB34\uCC28\uBCC4 \uBAA8\uB4DC\uB294 \uC885\uC885 \uB124\uD2B8\uC6CC\uD06C \uC5F0\uACB0 \uBB38\uC81C\uB97C \uC9C4\uB2E8\uD558\uB294 \uB370 \uC0AC\uC6A9\uB41C\uB2E4. \uC774 \uAE30\uB2A5\uC744 \uC0AC\uC6A9\uD558\uC5EC \uB124\uD2B8\uC6CC\uD06C\uB97C \uD1B5\uD574 \uC804\uC1A1\uB418\uB294 \uBAA8\uB4E0 \uB370\uC774\uD130\uB97C \uC0AC\uC6A9\uC790\uC5D0\uAC8C \uBCF4\uC5EC\uC8FC\uB294 \uD504\uB85C\uADF8\uB7A8\uC774 \uC788\uB2E4. FTP \uBC0F Telnet\uACFC \uAC19\uC740 \uC77C\uBD80 \uD504\uB85C\uD1A0\uCF5C\uC740 \uC554\uD638\uD654\uC5C6\uC774 \uC77C\uBC18 \uD14D\uC2A4\uD2B8\uB85C \uB370\uC774\uD130\uC640 \uC554\uD638\uB97C \uC804\uC1A1\uD558\uBA70 \uB124\uD2B8\uC6CC\uD06C \uC2A4\uCE90\uB108\uB294 \uC774 \uB370\uC774\uD130\uB97C \uBCFC \uC218 \uC788\uB2E4. \uB530\uB77C\uC11C \uCEF4\uD4E8\uD130 \uC0AC\uC6A9\uC790\uB294 \uD154\uB137\uACFC \uAC19\uC740 \uC548\uC804\uD558\uC9C0 \uC54A\uC740 \uD504\uB85C\uD1A0\uCF5C\uC5D0\uC11C \uB300\uC2E0 SSH\uC640 \uAC19\uC740 \uB354 \uC548\uC804\uD55C \uD504\uB85C\uD1A0\uCF5C\uC744 \uC0AC\uC6A9\uD558\uB294 \uAC83\uC774 \uC88B\uB2E4."@ko . "\uCEF4\uD4E8\uD130 \uB124\uD2B8\uC6CC\uD0B9\uC5D0\uC11C \uBB34\uCC28\uBCC4 \uBAA8\uB4DC(Promiscuous mode)\uB294 \uCEE8\uD2B8\uB864\uB7EC\uAC00 \uC218\uC2E0\uD558\uB294 \uBAA8\uB4E0 \uD2B8\uB798\uD53D\uC744 \uD504\uB808\uC784\uB9CC \uC804\uB2EC\uD558\uB294 \uB300\uC2E0 \uC911\uC559 \uCC98\uB9AC \uC7A5\uCE58 (CPU)\uB85C \uC804\uB2EC\uD558\uB3C4\uB85D\uD558\uB294 \uC720\uC120 NIC ( \uB124\uD2B8\uC6CC\uD06C \uC778\uD130\uD398\uC774\uC2A4 \uCEE8\uD2B8\uB864\uB7EC ) \uB610\uB294 WNIC (\uBB34\uC120 \uB124\uD2B8\uC6CC\uD06C \uC778\uD130\uD398\uC774\uC2A4 \uCEE8\uD2B8\uB864\uB7EC ) \uC6A9 \uBAA8\uB4DC\uC774\uB2E4. \uBAA8\uB4E0 \uD2B8\uB798\uB9AD \uD504\uB808\uC784\uC740 \uCEE8\uD2B8\uB864\uB7EC\uAC00 \uC218\uC2E0\uD558\uB3C4\uB85D \uD2B9\uBCC4\uD788 \uD504\uB85C\uADF8\uB798\uBC0D\uB418\uC5B4 \uC788\uB2E4. \uC774 \uBAA8\uB4DC\uB294 \uC77C\uBC18\uC801\uC73C\uB85C \uB77C\uC6B0\uD130 \uB610\uB294 \uC720\uC120 \uB124\uD2B8\uC6CC\uD06C\uC5D0 \uC5F0\uACB0\uB41C \uCEF4\uD4E8\uD130 \uB610\uB294 \uBB34\uC120 LAN\uC758 \uC77C\uBD80\uC778 \uCEF4\uD4E8\uD130\uC5D0\uC11C \uBC1C\uC0DD\uD558\uB294 \uD328\uD0B7 \uC2A4\uB2C8\uD551\uC5D0 \uC0AC\uC6A9\uB41C\uB2E4. \uC778\uD130\uD398\uC774\uC2A4\uB294 \uD558\uB4DC\uC6E8\uC5B4 \uAC00\uC0C1\uD654\uC640 \uD568\uAED8 \uC790\uC8FC \uC0AC\uC6A9\uB418\uB294 \uC18C\uD504\uD2B8\uC6E8\uC5B4 \uBE0C\uB9AC\uC9C0\uC5D0 \uC758\uD574 \uBB34\uCC28\uBCC4 \uBAA8\uB4DC\uB85C \uC124\uC815\uB41C\uB2E4. \uC774\uB354\uB137 \uB610\uB294 IEEE 802.11\uACFC \uAC19\uC740 IEEE 802 \uB124\uD2B8\uC6CC\uD06C\uC5D0\uC11C \uAC01 \uD504\uB808\uC784\uC5D0\uB294 \uB300\uC0C1 MAC \uC8FC\uC18C\uAC00 \uD3EC\uD568\uB41C\uB2E4. non-promiscuous \uBAA8\uB4DC\uC5D0\uC11C\uB294 NIC\uC774 \uD504\uB808\uC784\uC744 \uC218\uC2E0\uD560 \uB54C \uD504\uB808\uC784\uC774 \uD574\uB2F9 NIC\uC758 MAC \uC8FC\uC18C\uB85C \uC9C0\uC815\uB418\uAC70\uB098 \uBE0C\uB85C\uB4DC \uCE90\uC2A4\uD2B8 \uB610\uB294 \uBA40\uD2F0 \uCE90\uC2A4\uD2B8 \uC8FC\uC18C \uC9C0\uC815 \uD504\uB808\uC784\uC774 \uC544\uB2CC \uACBD\uC6B0 \uD504\uB808\uC784\uC744 \uC0AD\uC81C\uD55C\uB2E4. \uADF8\uB7EC\uB098 \uBB34\uCC28\uBCC4 \uBAA8\uB4DC\uC5D0\uC11C NIC\uB294 \uBAA8\uB4E0 \uD504\uB808\uC784\uC744 \uD5C8\uC6A9\uD558\uBBC0\uB85C \uCEF4\uD4E8\uD130\uAC00 \uB2E4\uB978 \uCEF4\uD4E8\uD130 \uB610\uB294 \uB124\uD2B8\uC6CC\uD06C \uC7A5\uCE58\uC6A9\uC73C\uB85C \uC758\uB3C4\uB41C \uD504\uB808\uC784\uC744 \uC77D\uC744 \uC218 \uC788\uB2E4."@ko . . "Tryb promiscuous (ang. promiscuous mode \u2013 tryb nas\u0142uchiwania, tryb mieszany) \u2013 tryb pracy interfejsu sieciowego (np. ethernetowej karty sieciowej), polegaj\u0105cy na odbieraniu ca\u0142ego ruchu docieraj\u0105cego do karty sieciowej, nie tylko skierowanego na adres MAC karty sieciowej.Aby przestawi\u0107 kart\u0119 sieciow\u0105 w tryb promiscuous w systemie Linux nale\u017Cy wyda\u0107 w terminalu polecenie: ifconfig promisc"@pl . . . . . "Promiskuitn\u00ED re\u017Eim (anglicky promiscuous mode nebo zkr\u00E1cen\u011B promisc mode) je v informatice ozna\u010Den\u00ED pro speci\u00E1ln\u00ED re\u017Eim dr\u00E1tov\u00E9 s\u00ED\u0165ov\u00E9 karty (NIC) nebo bezdr\u00E1tov\u00E9 s\u00ED\u0165ov\u00E9 karty (WNIC), kter\u00FD v po\u010D\u00EDta\u010Dov\u00FDch s\u00EDt\u00EDch umo\u017E\u0148uje zachyt\u00E1vat i s\u00ED\u0165ovou komunikaci, kter\u00E1 nen\u00ED p\u0159\u00EDmo ur\u010Dena pro dan\u00E9 za\u0159\u00EDzen\u00ED nebo po\u010D\u00EDta\u010D (tzv. packet sniffing). Re\u017Eim pou\u017E\u00EDvaj\u00ED analyz\u00E1tory paket\u016F pro zachyt\u00E1v\u00E1n\u00ED se na routerech, ale i na po\u010D\u00EDta\u010D\u00EDch p\u0159ipojen\u00FDch k switchi nebo pro bezdr\u00E1tov\u00FDch s\u00EDt\u00EDch nebo softwarov\u00FDch switch\u00EDch hardwarov\u00E9 virtualizace."@cs . . "Promiscue modus"@nl . "Promiscuous mode"@fr . . . "Promiscuous mode"@ru . . "Der promiskuitive Modus oder Promiscuous-Modus (aus dem englischen \u201Apromiscuous mode\u2018 entlehnt, etwa f\u00FCr \u201Efreiz\u00FCgiger Modus\u201C) bezeichnet einen bestimmten Empfangsmodus f\u00FCr netzwerktechnische Ger\u00E4te."@de . . . . . . "La modalit\u00E0 promiscua \u00E8 una in cui l'interfaccia di rete cablata o wireless fa passare all'unit\u00E0 centrale (CPU) tutto il traffico che pu\u00F2 osservare in rete. Nella modalit\u00E0 non promiscua, invece, l'interfaccia di rete lascia passare alla CPU soltanto i messaggi che contengono, nel campo del destinatario, l'indirizzo dell'interfaccia, scartando tutti gli altri messaggi che non le sono destinati."@it . "\u30D7\u30ED\u30DF\u30B9\u30AD\u30E3\u30B9\u30FB\u30E2\u30FC\u30C9"@ja . . . . . . . . . . . . "Promiscuous mode"@pl . "Modo prom\u00EDscuo"@pt . "\u30D7\u30ED\u30DF\u30B9\u30AD\u30E3\u30B9\u30FB\u30E2\u30FC\u30C9\uFF08\u82F1\u8A9E: promiscuous mode\uFF09\u3068\u306F\u3001\u30B3\u30F3\u30D4\u30E5\u30FC\u30BF\u30FB\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u306E\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u30AB\u30FC\u30C9\u304C\u6301\u3064\u52D5\u4F5C\u30E2\u30FC\u30C9\u306E\u4E00\u3064\u3067\u3042\u308B\u3002\u300C\u30D7\u30ED\u30DF\u30B9\u30AD\u30E3\u30B9\u300D\u306F\u300C\u7121\u5DEE\u5225\u306E\u300D\u3068\u3044\u3046\u610F\u5473\u3092\u6301\u3061\u3001\u81EA\u5206\u5B9B\u306E\u30C7\u30FC\u30BF\u30D1\u30B1\u30C3\u30C8\u3067\u306A\u3044\u4FE1\u53F7\u3082\u53D6\u308A\u8FBC\u3093\u3067\u51E6\u7406\u3092\u3059\u308B\u3053\u3068\u3092\u793A\u3059\u3002 \u6A19\u6E96\u306E\u72B6\u614B\u306B\u304A\u3044\u3066\u306F\u3001\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u30AB\u30FC\u30C9\u306F\u81EA\u5206\u5B9B\u306E\u30D1\u30B1\u30C3\u30C8\u3092\u53D7\u4FE1\u3057\u305F\u3068\u304D\u306B\u3060\u3051\u3001\u4E0A\u4F4D\u306E\u30B7\u30B9\u30C6\u30E0\u306B\u305D\u306E\u5185\u5BB9\u3092\u901A\u77E5\u3059\u308B\u3088\u3046\u306B\u306A\u3063\u3066\u3044\u308B\u3002\u4F8B\u3048\u3070\u3001\u30A4\u30FC\u30B5\u30CD\u30C3\u30C8\u7528\u306E\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u30AB\u30FC\u30C9\u3067\u306F\u3001\u81EA\u5206\u306E\u6301\u3064MAC\u30A2\u30C9\u30EC\u30B9\u4EE5\u5916\u3078\u9001\u4FE1\u3055\u308C\u305F\u30D1\u30B1\u30C3\u30C8\u3092\u53D7\u4FE1\u3057\u3066\u3082CPU\u306B\u5BFE\u3057\u5272\u308A\u8FBC\u307F\u3092\u304B\u3051\u305A\u3001\u305D\u308C\u3092\u51E6\u7406\u3057\u306A\u3044\u3002\u305F\u3060\u3057\u3001\u30D6\u30ED\u30FC\u30C9\u30AD\u30E3\u30B9\u30C8\u306A\u3069\u306E\u4F8B\u5916\u306F\u3042\u308B\u3002 \u3057\u304B\u3057\u3001\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u30AB\u30FC\u30C9\u306B\u30D7\u30ED\u30DF\u30B9\u30AD\u30E3\u30B9\u30FB\u30E2\u30FC\u30C9\u3067\u306E\u52D5\u4F5C\u3092\u6307\u793A\u3057\u3066\u304A\u3051\u3070\u3001\u30D1\u30B1\u30C3\u30C8\u306E\u5B9B\u5148\u306B\u95A2\u308F\u3089\u305A\u30D1\u30B1\u30C3\u30C8\u306E\u5230\u7740\u3092\u4E0A\u4F4D\u306E\u30B7\u30B9\u30C6\u30E0\u306B\u77E5\u3089\u305B\u308B\u3088\u3046\u306B\u306A\u308A\u3001\u4E0A\u4F4D\u306E\u30B7\u30B9\u30C6\u30E0\u306F\u81EA\u5206\u5B9B\u306E\u30D1\u30B1\u30C3\u30C8\u4EE5\u5916\u306E\u30C7\u30FC\u30BF\u3082\u5168\u3066\u51E6\u7406\u3059\u308B\u3053\u3068\u304C\u3067\u304D\u308B\u3088\u3046\u306B\u306A\u308B\u3002\u3064\u307E\u308A\u3001\u30D7\u30ED\u30DF\u30B9\u30AD\u30E3\u30B9\u30FB\u30E2\u30FC\u30C9\u3068\u3057\u305F\u5834\u5408\u3001\u305D\u306E\u30CE\u30FC\u30C9\u3078\u5C4A\u3051\u3089\u308C\u308B\u30D1\u30B1\u30C3\u30C8\u5168\u3066\u3092\u7121\u5DEE\u5225\u306B\u53D7\u3051\u5165\u308C\u308B\u3088\u3046\u306B\u306A\u308B\u3002 \u3053\u306E\u8A2D\u5B9A\u306F\u3001\u4E3B\u306B\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u306E\u7BA1\u7406\u30FB\u76E3\u8996\u3092\u76EE\u7684\u3068\u3057\u3066\u4F7F\u7528\u3055\u308C\u308B\u306E\u3060\u304C\u3001\u60AA\u610F\u3042\u308B\u8005\u306B\u3068\u3063\u3066\u306F\u76D7\u8074\u306E\u624B\u6BB5\u3068\u306A\u308B\u3002\u3053\u306E\u305F\u3081\u3001\u30AA\u30DA\u30EC\u30FC\u30C6\u30A3\u30F3\u30B0\u30B7\u30B9\u30C6\u30E0\u306A\u3069\u306E\u4E0A\u4F4D\u306E\u30B7\u30B9\u30C6\u30E0\u3067\u30D7\u30ED\u30DF\u30B9\u30AD\u30E3\u30B9\u30FB\u30E2\u30FC\u30C9\u306B\u3059\u308B\u624B\u6BB5\u306F\u4E00\u822C\u306B\u516C\u958B\u3055\u308C\u3066\u3044\u306A\u304B\u3063\u305F\u308A\u3001\u7279\u6A29\u3092\u6301\u3064\u30E6\u30FC\u30B6\u30FC\u3057\u304B\u3067\u304D\u306A\u3044\u5834\u5408\u304C\u591A\u3044\u3002 \u306A\u304A\u3001\u30CD\u30C3\u30C8\u30EF\u30FC\u30AF\u578B\u306EIDS\u3092\u5C0E\u5165\u3059\u308B\u969B\u306B\u3082\u3001\u30C8\u30E9\u30D5\u30A3\u30C3\u30AF\u3092\u76E3\u8996\u3059\u308B\u305F\u3081\u306B\u30D7\u30ED\u30DF\u30B9\u30AD\u30E3\u30B9\u30FB\u30E2\u30FC\u30C9\u3092\u5229\u7528\u3059\u308B\u3002"@ja . . . "Promiskuitn\u00ED re\u017Eim (anglicky promiscuous mode nebo zkr\u00E1cen\u011B promisc mode) je v informatice ozna\u010Den\u00ED pro speci\u00E1ln\u00ED re\u017Eim dr\u00E1tov\u00E9 s\u00ED\u0165ov\u00E9 karty (NIC) nebo bezdr\u00E1tov\u00E9 s\u00ED\u0165ov\u00E9 karty (WNIC), kter\u00FD v po\u010D\u00EDta\u010Dov\u00FDch s\u00EDt\u00EDch umo\u017E\u0148uje zachyt\u00E1vat i s\u00ED\u0165ovou komunikaci, kter\u00E1 nen\u00ED p\u0159\u00EDmo ur\u010Dena pro dan\u00E9 za\u0159\u00EDzen\u00ED nebo po\u010D\u00EDta\u010D (tzv. packet sniffing). Re\u017Eim pou\u017E\u00EDvaj\u00ED analyz\u00E1tory paket\u016F pro zachyt\u00E1v\u00E1n\u00ED se na routerech, ale i na po\u010D\u00EDta\u010D\u00EDch p\u0159ipojen\u00FDch k switchi nebo pro bezdr\u00E1tov\u00FDch s\u00EDt\u00EDch nebo softwarov\u00FDch switch\u00EDch hardwarov\u00E9 virtualizace."@cs . . . . . . . . "En inform\u00E0tica, el mode promiscu \u00E9s aquell en el qual un ordinador que es connecta a una xarxa compartida, tant la basada en cable de coure com la basada en tecnologia sense fils, captura tot el tr\u00E0nsit que circula.Aquest mode est\u00E0 molt relacionat amb els , que es basen en aquest mode per realitzar la seva tasca."@ca . . . . "En inform\u00E1tica, el modo promiscuo es aquel en el que una computadora conectada a una red compartida, tanto la basada en cable de cobre como la basada en tecnolog\u00EDa inal\u00E1mbrica, captura todo el tr\u00E1fico que circula por ella. Este modo est\u00E1 muy relacionado con los sniffers que se basan en este modo para realizar su tarea."@es . . "Promiscuous mode \u0438\u043B\u0438 promisc mode \u2014 \u0442\u0430\u043A \u043D\u0430\u0437\u044B\u0432\u0430\u0435\u043C\u044B\u0439 \u00AB\u043D\u0435\u0440\u0430\u0437\u0431\u043E\u0440\u0447\u0438\u0432\u044B\u0439\u00BB \u0440\u0435\u0436\u0438\u043C, \u0432 \u043A\u043E\u0442\u043E\u0440\u043E\u043C \u0441\u0435\u0442\u0435\u0432\u0430\u044F \u043F\u043B\u0430\u0442\u0430 \u043F\u043E\u0437\u0432\u043E\u043B\u044F\u0435\u0442 \u043F\u0440\u0438\u043D\u0438\u043C\u0430\u0442\u044C \u0432\u0441\u0435 \u043F\u0430\u043A\u0435\u0442\u044B \u043D\u0435\u0437\u0430\u0432\u0438\u0441\u0438\u043C\u043E \u043E\u0442 \u0442\u043E\u0433\u043E, \u043A\u043E\u043C\u0443 \u043E\u043D\u0438 \u0430\u0434\u0440\u0435\u0441\u043E\u0432\u0430\u043D\u044B. \u0412 \u043D\u043E\u0440\u043C\u0430\u043B\u044C\u043D\u043E\u043C \u0441\u043E\u0441\u0442\u043E\u044F\u043D\u0438\u0438 \u043D\u0430 Ethernet-\u0438\u043D\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u0443\u0435\u0442\u0441\u044F \u0444\u0438\u043B\u044C\u0442\u0440\u0430\u0446\u0438\u044F \u043F\u0430\u043A\u0435\u0442\u043E\u0432 \u043A\u0430\u043D\u0430\u043B\u044C\u043D\u043E\u0433\u043E \u0443\u0440\u043E\u0432\u043D\u044F \u0438 \u0435\u0441\u043B\u0438 MAC-\u0430\u0434\u0440\u0435\u0441 \u043D\u0430\u0437\u043D\u0430\u0447\u0435\u043D\u0438\u044F \u0432 \u0437\u0430\u0433\u043E\u043B\u043E\u0432\u043A\u0435 \u043F\u0440\u0438\u043D\u044F\u0442\u043E\u0433\u043E \u043F\u0430\u043A\u0435\u0442\u0430 \u043D\u0435 \u0441\u043E\u0432\u043F\u0430\u0434\u0430\u0435\u0442 \u0441 MAC-\u0430\u0434\u0440\u0435\u0441\u043E\u043C \u0442\u0435\u043A\u0443\u0449\u0435\u0433\u043E \u0441\u0435\u0442\u0435\u0432\u043E\u0433\u043E \u0438\u043D\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 \u0438 \u043D\u0435 \u044F\u0432\u043B\u044F\u0435\u0442\u0441\u044F \u0448\u0438\u0440\u043E\u043A\u043E\u0432\u0435\u0449\u0430\u0442\u0435\u043B\u044C\u043D\u044B\u043C, \u0442\u043E \u043F\u0430\u043A\u0435\u0442 \u043E\u0442\u0431\u0440\u0430\u0441\u044B\u0432\u0430\u0435\u0442\u0441\u044F. \u0412 \u00AB\u043D\u0435\u0440\u0430\u0437\u0431\u043E\u0440\u0447\u0438\u0432\u043E\u043C\u00BB \u0440\u0435\u0436\u0438\u043C\u0435 \u0444\u0438\u043B\u044C\u0442\u0440\u0430\u0446\u0438\u044F \u043D\u0430 \u0441\u0435\u0442\u0435\u0432\u043E\u043C \u0438\u043D\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 \u043E\u0442\u043A\u043B\u044E\u0447\u0430\u0435\u0442\u0441\u044F \u0438 \u0432\u0441\u0435 \u043F\u0430\u043A\u0435\u0442\u044B, \u0432\u043A\u043B\u044E\u0447\u0430\u044F \u043D\u0435\u043F\u0440\u0435\u0434\u043D\u0430\u0437\u043D\u0430\u0447\u0435\u043D\u043D\u044B\u0435 \u0442\u0435\u043A\u0443\u0449\u0435\u043C\u0443 \u0443\u0437\u043B\u0443, \u043F\u0440\u043E\u043F\u0443\u0441\u043A\u0430\u044E\u0442\u0441\u044F \u0432 \u0441\u0438\u0441\u0442\u0435\u043C\u0443. \u0411\u043E\u043B\u044C\u0448\u0438\u043D\u0441\u0442\u0432\u043E \u043E\u043F\u0435\u0440\u0430\u0446\u0438\u043E\u043D\u043D\u044B\u0445 \u0441\u0438\u0441\u0442\u0435\u043C \u0442\u0440\u0435\u0431\u0443\u044E\u0442 \u043F\u0440\u0430\u0432 \u0430\u0434\u043C\u0438\u043D\u0438\u0441\u0442\u0440\u0430\u0442\u043E\u0440\u0430 \u0434\u043B\u044F \u0432\u043A\u043B\u044E\u0447\u0435\u043D\u0438\u044F \u00AB\u043D\u0435\u0440\u0430\u0437\u0431\u043E\u0440\u0447\u0438\u0432\u043E\u0433\u043E\u00BB \u0440\u0435\u0436\u0438\u043C\u0430. \u0414\u0430\u043D\u043D\u044B\u0439 \u0440\u0435\u0436\u0438\u043C \u043F\u043E\u0437\u0432\u043E\u043B\u044F\u0435\u0442 \u043C\u043E\u043D\u0438\u0442\u043E\u0440\u0438\u0442\u044C \u0442\u0440\u0430\u0444\u0438\u043A \u0442\u043E\u043B\u044C\u043A\u043E \u0432 \u0434\u0430\u043D\u043D\u043E\u043C \u043A\u043E\u043B\u043B\u0438\u0437\u0438\u043E\u043D\u043D\u043E\u043C \u0434\u043E\u043C\u0435\u043D\u0435 (\u0434\u043B\u044F Ethernet \u0438\u043B\u0438 \u0431\u0435\u0441\u043F\u0440\u043E\u0432\u043E\u0434\u043D\u044B\u0445 \u0441\u0435\u0442\u0435\u0439) \u0438\u043B\u0438 \u043A\u043E\u043B\u044C\u0446\u0435 (\u0434\u043B\u044F \u0441\u0435\u0442\u0435\u0439 Token ring \u0438\u043B\u0438 FDDI), \u043F\u043E\u0442\u043E\u043C\u0443 \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u043D\u0438\u0435 \u0441\u0435\u0442\u0435\u0432\u044B\u0445 \u043A\u043E\u043D\u0446\u0435\u043D\u0442\u0440\u0430\u0442\u043E\u0440\u043E\u0432 \u044F\u0432\u043B\u044F\u0435\u0442\u0441\u044F \u043C\u0435\u043D\u0435\u0435 \u0431\u0435\u0437\u043E\u043F\u0430\u0441\u043D\u044B\u043C \u0440\u0435\u0448\u0435\u043D\u0438\u0435\u043C, \u0447\u0435\u043C \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u043D\u0438\u0435 \u043A\u043E\u043C\u043C\u0443\u0442\u0430\u0442\u043E\u0440\u043E\u0432, \u0442\u0430\u043A \u043A\u0430\u043A \u043F\u043E\u0441\u043B\u0435\u0434\u043D\u0438\u0435 \u0432 \u043D\u043E\u0440\u043C\u0430\u043B\u044C\u043D\u043E\u043C \u0440\u0435\u0436\u0438\u043C\u0435 \u0440\u0430\u0431\u043E\u0442\u044B \u043D\u0435 \u043F\u0435\u0440\u0435\u0434\u0430\u044E\u0442 \u0442\u0440\u0430\u0444\u0438\u043A \u0432\u0441\u0435\u043C \u0432\u043D\u0435 \u0437\u0430\u0432\u0438\u0441\u0438\u043C\u043E\u0441\u0442\u0438 \u043E\u0442 \u0430\u0434\u0440\u0435\u0441\u0430 \u043D\u0430\u0437\u043D\u0430\u0447\u0435\u043D\u0438\u044F. \u041E\u0434\u043D\u0430\u043A\u043E, \u0435\u0441\u0442\u044C \u0441\u043B\u0443\u0447\u0430\u0439, \u043F\u0440\u0438 \u043A\u043E\u0442\u043E\u0440\u043E\u043C \u043A\u043E\u043C\u043C\u0443\u0442\u0430\u0442\u043E\u0440\u044B \u0432\u0441\u0451 \u0440\u0430\u0432\u043D\u043E \u0441\u0440\u0430\u0431\u0430\u0442\u044B\u0432\u0430\u044E\u0442 \u0432 \u043E\u0442\u043D\u043E\u0448\u0435\u043D\u0438\u0438 \u043D\u0435 \u0448\u0438\u0440\u043E\u043A\u043E\u0432\u0435\u0449\u0430\u0442\u0435\u043B\u044C\u043D\u044B\u0445 \u0444\u0440\u044D\u0439\u043C\u043E\u0432 \u0442\u0430\u043A \u0436\u0435, \u043A\u0430\u043A \u043A\u043E\u043D\u0446\u0435\u043D\u0442\u0440\u0430\u0442\u043E\u0440\u044B. \u041D\u0430\u043F\u0440\u0438\u043C\u0435\u0440, \u043F\u0440\u0438 \u043E\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0438 MAC-\u0430\u0434\u0440\u0435\u0441\u0430 \u043F\u043E\u043B\u0443\u0447\u0430\u0442\u0435\u043B\u044F \u0432 \u0442\u0430\u0431\u043B\u0438\u0446\u0435 \u043A\u043E\u043C\u043C\u0443\u0442\u0430\u0446\u0438\u0438. \u0412 \u0442\u0430\u043A\u043E\u043C \u0441\u043B\u0443\u0447\u0430\u0435, \u043F\u0440\u043E\u0438\u0437\u0432\u043E\u0434\u0438\u0442\u0441\u044F \u043E\u0442\u043F\u0440\u0430\u0432\u043A\u0430 \u043D\u0430 \u0432\u0441\u0435 \u043F\u043E\u0440\u0442\u044B \u043A\u043E\u043C\u043C\u0443\u0442\u0430\u0442\u043E\u0440\u0430 \u0441\u0440\u0430\u0437\u0443, \u043F\u043E\u0440\u0442 \u0441 \u043A\u043E\u0442\u043E\u0440\u043E\u0433\u043E \u043F\u0440\u0438\u0434\u0451\u0442 \u043E\u0442\u0432\u0435\u0442 \u043D\u0430 \u044D\u0442\u043E\u0442 \u0444\u0440\u044D\u0439\u043C (\u0441 \u0441\u043E\u043E\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044E\u0449\u0438\u043C \u0430\u0434\u0440\u0435\u0441\u043E\u043C \u043E\u0442\u043F\u0440\u0430\u0432\u0438\u0442\u0435\u043B\u044F) \u0432\u043D\u043E\u0441\u0438\u0442\u0441\u044F \u0432 \u0442\u0430\u0431\u043B\u0438\u0446\u0443 \u043A\u043E\u043C\u043C\u0443\u0442\u0430\u0446\u0438\u0438, \u043F\u043E\u0441\u043B\u0435 \u0447\u0435\u0433\u043E, \u043A\u043E\u043C\u043C\u0443\u0442\u0430\u0442\u043E\u0440 \u043E\u0442\u043F\u0440\u0430\u0432\u043B\u044F\u0435\u0442 \u0444\u0440\u044D\u0439\u043C\u044B \u0443\u0436\u0435 \u0432 \u0441\u043E\u043E\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0438\u0438 \u0441 \u0437\u0430\u043F\u0438\u0441\u044C\u044E \u0432 \u0442\u0430\u0431\u043B\u0438\u0446\u0435 \u2014 \u043A\u043E\u043D\u043A\u0440\u0435\u0442\u043D\u043E \u043D\u0430 \u043F\u043E\u0440\u0442 \u0441 \u043F\u0440\u0438\u043F\u0438\u0441\u0430\u043D\u043D\u044B\u043C MAC-\u0430\u0434\u0440\u0435\u0441\u043E\u043C \u0434\u043B\u044F \u044D\u0442\u043E\u0433\u043E \u043F\u043E\u043B\u0443\u0447\u0430\u0442\u0435\u043B\u044F. \u00AB\u041D\u0435\u0440\u0430\u0437\u0431\u043E\u0440\u0447\u0438\u0432\u044B\u0439\u00BB \u0440\u0435\u0436\u0438\u043C \u0447\u0430\u0441\u0442\u043E \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u0443\u0435\u0442\u0441\u044F \u0441\u043D\u0438\u0444\u0444\u0435\u0440\u0430\u043C\u0438 \u2014 \u0441\u043F\u0435\u0446\u0438\u0430\u043B\u0438\u0437\u0438\u0440\u043E\u0432\u0430\u043D\u043D\u044B\u043C\u0438 \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043C\u0430\u043C\u0438, \u043F\u043E\u0437\u0432\u043E\u043B\u044F\u044E\u0449\u0438\u043C\u0438 \u043E\u0442\u043E\u0431\u0440\u0430\u0436\u0430\u0442\u044C \u0438 \u0430\u043D\u0430\u043B\u0438\u0437\u0438\u0440\u043E\u0432\u0430\u0442\u044C \u0441\u0435\u0442\u0435\u0432\u043E\u0439 \u0442\u0440\u0430\u0444\u0438\u043A \u0434\u043B\u044F \u0434\u0438\u0430\u0433\u043D\u043E\u0441\u0442\u0438\u043A\u0438 \u0441\u0435\u0442\u0435\u0432\u044B\u0445 \u043D\u0435\u043F\u043E\u043B\u0430\u0434\u043E\u043A. \u0422\u0430\u043A\u0438\u0435 \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043C\u044B \u043F\u043E\u0437\u0432\u043E\u043B\u044F\u044E\u0442 \u043B\u0435\u0433\u043A\u043E \u043F\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u044B\u0432\u0430\u0442\u044C \u043F\u0430\u0440\u043E\u043B\u0438 \u0438 \u043A\u043E\u043D\u0444\u0438\u0434\u0435\u043D\u0446\u0438\u0430\u043B\u044C\u043D\u044B\u0435 \u0434\u0430\u043D\u043D\u044B\u0435, \u043F\u0435\u0440\u0435\u0434\u0430\u0432\u0430\u0435\u043C\u044B\u0435 \u043F\u043E \u0441\u0435\u0442\u0438 \u0432 \u043D\u0435\u0437\u0430\u0449\u0438\u0449\u0451\u043D\u043D\u043E\u043C \u0432\u0438\u0434\u0435. \u0427\u0442\u043E\u0431\u044B \u0438\u0437\u0431\u0435\u0436\u0430\u0442\u044C \u044D\u0442\u043E\u0433\u043E, \u0440\u0435\u043A\u043E\u043C\u0435\u043D\u0434\u0443\u0435\u0442\u0441\u044F \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u044C \u0437\u0430\u0449\u0438\u0449\u0435\u043D\u043D\u044B\u0435 \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B\u044B, \u0432 \u0442\u043E\u043C \u0447\u0438\u0441\u043B\u0435 SSL \u0438 \u0440\u0430\u0437\u043B\u0438\u0447\u043D\u044B\u0435 \u0432\u0430\u0440\u0438\u0430\u043D\u0442\u044B VPN/IPSec."@ru . . "1119303517"^^ . . "In computer networking, promiscuous mode is a mode for a wired network interface controller (NIC) or wireless network interface controller (WNIC) that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is specifically programmed to receive. This mode is normally used for packet sniffing that takes place on a router or on a computer connected to a wired network or one being part of a wireless LAN. Interfaces are placed into promiscuous mode by software bridges often used with hardware virtualization. In IEEE 802 networks such as Ethernet or IEEE 802.11, each frame includes a destination MAC address. In non-promiscuous mode, when a NIC receives a frame, it drops it unless the frame is addressed to that NIC's MAC address or is a broadcast or multicast addressed frame. In promiscuous mode, however, the NIC allows all frames through, thus allowing the computer to read frames intended for other machines or network devices. Many operating systems require superuser privileges to enable promiscuous mode. A non-routing node in promiscuous mode can generally only monitor traffic to and from other nodes within the same broadcast domain (for Ethernet and IEEE 802.11) or ring (for Token Ring). Computers attached to the same Ethernet hub satisfy this requirement, which is why network switches are used to combat malicious use of promiscuous mode. A router may monitor all traffic that it routes. Promiscuous mode is often used to diagnose network connectivity issues. There are programs that make use of this feature to show the user all the data being transferred over the network. Some protocols like FTP and Telnet transfer data and passwords in clear text, without encryption, and network scanners can see this data. Therefore, computer users are encouraged to stay away from insecure protocols like telnet and use more secure ones such as SSH."@en . . . "En inform\u00E1tica, el modo promiscuo es aquel en el que una computadora conectada a una red compartida, tanto la basada en cable de cobre como la basada en tecnolog\u00EDa inal\u00E1mbrica, captura todo el tr\u00E1fico que circula por ella. Este modo est\u00E1 muy relacionado con los sniffers que se basan en este modo para realizar su tarea."@es . . "\u6DF7\u6742\u6A21\u5F0F"@zh . . . "\uBB34\uCC28\uBCC4 \uBAA8\uB4DC"@ko . "\u6DF7\u6742\u6A21\u5F0F\uFF08\u82F1\u8A9E\uFF1Apromiscuous mode\uFF09\u662F\u7535\u8111\u7F51\u7EDC\u4E2D\u7684\u672F\u8BED\u3002\u662F\u6307\u4E00\u53F0\u673A\u5668\u7684\u7F51\u5361\u80FD\u591F\u63A5\u6536\u6240\u6709\u7ECF\u8FC7\u5B83\u7684\u6570\u636E\u6D41\uFF0C\u800C\u4E0D\u8BBA\u5176\u76EE\u7684\u5730\u5740\u662F\u5426\u662F\u5B83\u3002 \u4E00\u822C\u8BA1\u7B97\u673A\u7F51\u5361\u90FD\u5DE5\u4F5C\u5728\u975E\u6DF7\u6742\u6A21\u5F0F\u4E0B\uFF0C\u6B64\u65F6\u7F51\u5361\u53EA\u63A5\u53D7\u6765\u81EA\u7F51\u7EDC\u7AEF\u53E3\u7684\u76EE\u7684\u5730\u5740\u6307\u5411\u81EA\u5DF1\u7684\u6570\u636E\u3002\u5F53\u7F51\u5361\u5DE5\u4F5C\u5728\u6DF7\u6742\u6A21\u5F0F\u4E0B\u65F6\uFF0C\u7F51\u5361\u5C06\u6765\u81EA\u63A5\u53E3\u7684\u6240\u6709\u6570\u636E\u90FD\u6355\u83B7\u5E76\u4EA4\u7ED9\u76F8\u5E94\u7684\u9A71\u52A8\u7A0B\u5E8F\u3002\u7F51\u5361\u7684\u6DF7\u6742\u6A21\u5F0F\u4E00\u822C\u5728\u7F51\u7EDC\u7BA1\u7406\u5458\u5206\u6790\u7F51\u7EDC\u6570\u636E\u4F5C\u4E3A\u7F51\u7EDC\u6545\u969C\u8BCA\u65AD\u624B\u6BB5\u65F6\u7528\u5230\uFF0C\u540C\u65F6\u8FD9\u4E2A\u6A21\u5F0F\u4E5F\u88AB\u7F51\u7EDC\u9ED1\u5BA2\u5229\u7528\u6765\u4F5C\u4E3A\u7F51\u7EDC\u6570\u636E\u7A83\u542C\u7684\u5165\u53E3\u3002\u5728Linux\u64CD\u4F5C\u7CFB\u7EDF\u4E2D\u8BBE\u7F6E\u7F51\u5361\u6DF7\u6742\u6A21\u5F0F\u65F6\u9700\u8981\u7BA1\u7406\u5458\u6743\u9650\u3002\u5728Windows\u64CD\u4F5C\u7CFB\u7EDF\u548CLinux\u64CD\u4F5C\u7CFB\u7EDF\u4E2D\u90FD\u6709\u4F7F\u7528\u6DF7\u6742\u6A21\u5F0F\u7684\u6293\u5305\u5DE5\u5177\uFF0C\u6BD4\u5982\u8457\u540D\u7684\u5F00\u6E90\u8F6F\u4EF6Wireshark\u3002"@zh . .