英语人>网络例句>攻击... 相关的搜索结果
网络例句

攻击...

与 攻击... 相关的网络例句 [注:此内容来源于网络,仅供参考]

This article analyses the actual reality of network security and briefly intruduces a few of aggressive measures which threaten the safety of network. From these we can see, the passive ways such as firewall and anti-virus software to combat network attack can not meet the increasingly needs of network accessing .As a result, an intrusion detection system must be established to differentiate between the legal accessing and inbreaking attack. That is intrusion detection.

本文首先分析了目前的网络安全现状,简单介绍了几种威胁网络安全的攻击手段,从中可以看出通过防火墙和杀毒工具等软件,被动地防御网络攻击已经不能满足日益增加的网络访问量了,因此必须变被动为主动,对到达的网络访问内容进行审核,来判断是合法的访问还是入侵攻击,这种审核就是入侵检测。

If you have them all selected and issue an attack order in a traditional game, they will all attack the specified target, but this is not very desirable… as what you really want is a unilateral attack across the entire base.

如果在别的游戏中你全选他们然后下达攻击指令,他们会攻击一个特定的目标,但是这不是非像我们要的那样对整个基地unilateral的攻击。

Manipulate a method:The time of beginning finishes adding an attribute point for monocycle first, then single shot monocycle underneath of the button can give the monocycle choice the different color and start a game in the single shot confirm, the single shot fight starts a game, beginning after is an attack to the first button of war, the third button is close to the other party, be partition far of time can not attackstone the other party to consequently and first close to in the attack!

操纵方法:开始的时候先给独轮车将属性点加完,然后单击独轮车下边的按钮可以给独轮车选择不同的颜色,在单击confirm开始游戏,单击fight开始游戏,开始之后对战的第一个按钮是攻击,第三个按钮是靠近对方,当间隔远的时候就不能攻击对方因此先靠近在攻击!

In this paper, we research on the integration technology of attack tools, analyze three typical integration approaches and compare them with each other. After that, we put emphasis on the integration of NASL scripts based on Nessus.

本文对攻击工具集成技术进行了研究,分析了三种典型的攻击工具集成方式,通过对它们进行分析和比较,明确了将基于Nessus的NASL攻击脚本集成技术,作为本文的研究重点。

Instead, when you parry an attack, it and the next attack will each hit for 50% damage.

取而代之的是当你招架一次攻击,当前攻击和下一次攻击将会减少50%的伤害。

We prove that these change do not influence the difference resisting capacity from the theory. Compared with the primary algorithm, the transmuta

从理论上我们证明了多项式的修改不影响其抗差分攻击的能力,而且对修改后的算法进行square攻击和统计测试,结果表明新算法的抗square攻击的能力并未降低,但统计性能更好。

Raff expresses, metacafe website is put in flaw of an alternant script, this also is a common process designing error, but Raff can pass this flaw to run JavaScript scenario on Metacafe.com, this explains this flaw is used completely possibly to run baleful program by aggressor.

在Raff的攻击演示中,攻击者首先必须向Metacafe 和Dailymotion网站其中之一发布经过恶意编辑的视频文件然而Metacafe 网站本周二却表示,恶意攻击者突破该网站的内容过滤发布包括恶意代码视频文件的事"几乎不可能"。

With his forces running low on supplies - both ammunition and food - Lettow-Vorbeck was forced to live off the land, although a successful raid upon a Portuguese arms dump near the Mozambique border largely resolved his arms shortage. Lettow-Vorbeck launched fresh raids against Rhodesian forts in 1918, tackling one after another. He was in the midst of planning further large raids when news of the 11 November Armistice reached him.

由于他部队给养的不足――包括弹药和食物,虽然他也成功的攻击了葡萄牙部队在莫桑比克边境的供给站并极大地解决了该问题,但他还是不得不撤离。1918年,福尔贝克采取各个击破的战术对罗得西亚要塞群发起了新一轮的攻击。11月11日,正当他计划进一步攻击时,他从一个英国战俘那里获知了停战协议的消息。

Low-Rate TCP Targeted Denial of Service is such kind of attack. In this thesis, we propose four schemes to deal with this problem. We make RTO unpredictable and keep conservative property. Analysis and experiment will be made to show that our schemes survive the attack.

TCP低速阻断服务攻击(Low-Rate TCP Targeted Denial-of-Service Attack)就是属於这种攻击,在本论文里,我们提出了四种方法来处里这个问题,在不改变保守RTO的前提下,我们让RTO变得不可预测,我们也做了分析和实验来显示我们的方法在遭预这种攻击时可以存活下来。

Ok china has one of the best armys but they are not going to attack usa for a long while because china makes all kinds of things and ship it to usa for money if they attack the usa theyr econemy will fall only when they have millions and millions of dollars they will do it but then i hope im already dead.

中国有最好的军队,但他们不会长时间攻击美国,因为中国制造很多东西,并且把这些东西运到美国去赚钱,如果他们攻击美国,他们的经济就会衰败。只有当他们赚足钱的时候才会攻击美国,但那时我可能已经死了。

第6/100页 首页 < ... 2 3 4 5 6 7 8 9 10 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher