英语人>网络例句>攻击者 相关的搜索结果
网络例句

攻击者

与 攻击者 相关的网络例句 [注:此内容来源于网络,仅供参考]

He lasts about three and a half years on an average, as compared with a single season of from three to thirty weeks, which is the usual Wall Street life of a first offender.

一般说来他可以熬3年,相对于3个星期到30个星期,那是华尔街的初次攻击者---他们一般只能维持一阵子。

Two nights later, the attackers were all found about an hour's ride from town - butchered.

两个晚上之后,在距离城镇一小时马程的地方发现了所有的攻击者——全部被屠杀了。

The empire collapsed and Ashur and the North were now open to attack.

帝国倒塌了,阿舒尔和北部地区现在开放给攻击者

Did you get a make on the assailant?

你得到攻击者的资料了吗?

Corrupter 腐蚀者- The corruptor attacks air units.

腐蚀者用于攻击空中单位。

This is due to malicious attackers to steal, modify the network transmission of information through the Internet posing as legitimate users of illegal access to the remote host, access to stored on the host of confidential information, or take up network resources and prevent other users and so on.

这是由于怀有恶意的攻击者窃者、修改网络上传输的信息,通过网络冒充合法用户非法进入远程主机,获取存储在主机中的机密信息,或者占用网络资源,阻止其他用户使用等。

The use of such techniques again suggests more organised and capable attackers, rather than the work of simple script kiddies.

使用这样的组合攻击技术又一次验证了攻击者的高组织性和能力,而不仅仅是简单的脚本小子。

Our main contribution is in presenting;(1 )the definition of masqueraded degree for a computer in sometime by the number of masqueraded IP divide the number of the network session;(2) the algorithm for maintaining the queue of masqueraded IP, changing their states and competing the masqueraded IP by sending ARP messages; Using DivertSocket to monitor the packets, and basing Netfilter and IPTables, we design an experimental system IPDM based on this model, and satisfactory results are obtained.

改变其状态和竞争伪装IP;使用监测数据包的DiverSocket,Netfilter和IPTables,我们设计了一个基于此模型的实验IPDM,获得了满意结果。引言扩大了IP伪装的范围,从而增加了攻击者的攻击难度,起到了主动防御的作用。目前解决网络安全问题的主要技术手段有加密技术,基于网络、主机的各种防范措施,以及信息伪装技术等。这些技术在防御网络入侵、保护信息安全方面均有一定的作用。但不能很好

We made no attempt to discern warnings by the same attacker, simply because of the widespread use of spoofing.

我们并没有试图对由同一个攻击者发起的攻击作出识别,原因很简单,因为现在欺骗技术使用太广泛了。

The attackers appeared to be familiar with the server environment, suggesting they were part of the group who originally compromised the honeypots, and that the phishing attempt was fairly well organised.

这些攻击者的动作显示他们对服务器的环境非常熟悉,这也说明他们是前期攻陷这些蜜罐的组织中的成员,而且钓鱼攻击的整个企图也是非常明显且具有组织性的。

第5/42页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
推荐网络例句

Cynanchum Lingtai apricot production in the average weight 65 grams, the brightly-colored fruit, juicy rich, sweet-sour taste, sweet from the nucleolus, when the late Qing Dynasty famous Shaanxi, Gansu provinces, the Qing imperial court Tongzhi tribute for years.

灵台生产的牛心杏平均单果重65克,果实色泽鲜艳,汁多味浓,甜酸适口,离核仁甜,清末时就驰名陕、甘两省,清同治年间曾为朝廷贡品。

Chenopodium album,Solanum nigrum, and Amaranthus retroflexus were very susceptible to the herbicides. Polygonum persicaria and Abutilon theophrasti were relatively less susceptible to the herbicides, and Lycopersicon esculentum was not susceptible to it. The relationship between reduction rates of weed biomass and PPM values of weed leaves 2,4, and 6 days after treatment was established.

供试的6种杂草对该混剂的敏感性存在显著差异:红心藜Chenopodium album、龙葵Solanum nigrum和反枝苋Amaranthus retroflexus对该混剂最敏感,ED90值分别为47.65、71.67和29.17g/hm2;春蓼Polygonum persicaria和苘麻Abutilon theophrasti敏感,ED90值分别为96.91、114.20g/hm2;而番茄不敏感。

However, I have an idea.

不过,我有个主意。