• 这个步骤目标是以一种特殊方式格式化有效负载,以便躲避壁垒森严入侵探测系统IDSs)。

    The goal of this step is to format the payload in such a way that it can evade entrenched intrusion-detection systems (IDSs).

    youdao

  • 入侵探测系统(IDSes)现有安全解决方案了解探测不正当活动所需数据库协议结构

    Existing security solutions, such as intrusion detection systems (IDSes), lack the knowledge of database protocols and structures required to detect inappropriate activities.

    youdao

  • 入侵探测系统用来探测计算机系统网络不寻常活动识别出活动不友好或者未经授权以便能够对此入侵作出响应。

    Intrusion-detection systems are used to detect unusual activity in a network of computer systems, to identify that activity as unfriendly or unauthorized and to enable a response to that intrusion.

    youdao

  • 入侵探测系统用来探测计算机系统网络不寻常活动识别出活动不友好或者未经授权以便能够对此入侵作出响应。

    Intrusion-detection systems are used to detect unusual activity in a network of computer systems, to identify that activity as unfriendly or unauthorized and to enable a response to that intrusion.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定