From professional translators, enterprises, web pages and freely available translation repositories.
esta lista comprende entre otros a las utilidades de red ping y traceroute que permiten verificar el estado de un servidor.
among others, this list contains ping and traceroute that are two utilities allowing to check a server state.
quizá el comando más útil para averiguar dónde se está interrumpiendo el sistema de encaminamiento sea traceroute (8) .
perhaps the most useful command for trying to figure out where routing is breaking down is the traceroute (8) command.
otras herramientas útiles como ping, traceroute, y nslookup. las funciones adicionales incluyen la generación de reportes en formatos html, textos, y delimitados por comas y una interfaz configurable.
other useful tools are included, such as ping, traceroute, and nslookup. additional features include report generation in html, text, and comma delimited formats and a customizable interface.
debe usar siempre el servidor más cercano a vd. antes de que empiece a bajarse cualquier versión, es conveniente que use ping y traceroute para poder determinar en qué servidor se encuentra la réplica más próxima a vd, y si ésta funciona correctamente.
you should always use the site closest to you. before you begin fetching a release or snapshot, you may wish to use ping and traceroute to determine which mirror site is nearest to you and whether that nearest mirror is performing adequately.
la solucion debe estar en capacidad de rechazar accesos o modificaciones indebidas y registrar parametros importantes como direccion ip del dispositivo que intento accesar, traceroute del dispositivo que intento accesar, usuario por el cual intento accesar, intentos fallidos por el usuario que intento accesar, hora a la cual intento accesar, descripcion del porque no pudo accesar, entre algunas de las mas importantes
the solution should be able to refuse accesses or undue modifications and record important parameters such as ip address of the device that attempted to access, traceroute of the device that attempted to access, user whereby it was attempted to access, failed attempts by the user who tried to access, time when it was attempted to access, description of the reason why it could not be accessed, among some of the most important ones