• 这些可能成为入侵者而且由于他们内部,他们访问网络更方便

    These people are all possible intruders, and since they are on the inside, they have better access to the network.

    youdao

  • WEP理论上认为会使网络很安全实际上略微减缓入侵者的入侵速度。

    In theory, WEP is supposed to make your network secure; in practice, it will only slow down intruders a little bit.

    youdao

  • 并不一定反击能力我们知道正如入侵者可以破坏一个公司网络一样反过来完全有可能发生

    It doesn't have to be an offensive capability, but it's perfectly possible, as we know, just as an intruder can screw up a company's network, the reverse can happen.

    youdao

  • 虽然公司最大努力阻止入侵者入侵网络敏感数据,但是超过70%数据泄露雇员造成的。

    Despite companies' best efforts to keep intruders out of networks and sensitive systems, more than 70 percent of data breaches are carried out by employees.

    youdao

  • 追踪用户ID不能使我们抓住或者阻止恶意入侵者而且这样导致网络瘫痪

    Tracking user IDs will not enable us to catch or stop bad guys, and it will render the Internet impossible to use.

    youdao

  • 然而进入网络电脑报告潜在入侵者熊猫互联网安全2008报告。

    It doesn't, however, report new computers on the network as possible intruders, as Panda Internet Security 2008 does.

    youdao

  • 黑客网络系统常见非法入侵者

    Hackers are common illegal intruders in network systems.

    youdao

  • 任何对该节点的攻击或者与该节点不适当无线连接意味着入侵者深入网络内部。

    Any hacking or improper wireless connectivity to it means that the intruder is deeply in the network.

    youdao

  • 删除网络使用者用于对付垃圾广告入侵者惧怕的杀敌武器

    The "delete" key may still be Internet user's greatest weapon against these inbox invaders.

    youdao

  • 比如说,对付个正试图检索私人数据客户数据库入侵者和对付一个正试图瘫痪网络入侵者很可能采取极不同的斗法。

    For example, an intruder who is trying to retrieve proprietary data or customer databases probably should be combated much differently from an intruder who is trying to shut down a network.

    youdao

  • 无线访问内部所有用户公开的,入侵者不受信任的用户可以很容易进入无线网络访问各种资源

    Because a wireless access point is public to all inside user, intruder and distrustful user can enter wireless network to access all kinds of source easily.

    youdao

  • 目标系统进行端口扫描网络系统入侵者进入目标系统的一步

    Scanning a port of the target system is the first step that network intruders will do before entering the system.

    youdao

  • 目标系统进行端口扫描,是网络系统入侵者进入目标系统一步

    The first step that network system intruders enter the target system is the port scanning of the system.

    youdao

  • 无线传感器网络中,通过进攻入侵者寻找入侵轨迹来实现栅栏覆盖控制比较有效方法

    Searching the attacking locomotion trajectory is a valid method for the barrier-coverage control in wireless sensor networks.

    youdao

  • 用于网络入侵检测系统IDS)的特征变量)数量太多太少都会降低IDS识别入侵者正确率

    Using too many or too too few characters(variable) in Intrusion Detection System(IDS) leads to reduce recognizing correctness of IDS.

    youdao

  • 提出并实现了一个基于网络入侵检测入侵者定位系统

    This paper presented an intruder locating system based on network intrusion detection, which can trace back the indirect attack in controlled network environment.

    youdao

  • 文章介绍了计算机网络系统IP安全概况和入侵者IP层采用入侵手段,以及防止这种入侵所采取措施

    This paper introduces IP layer security of computer system, incidences often use invading method to IP layer. In order to prevent the invading, should take the measure.

    youdao

  • 文章介绍了计算机网络系统IP安全概况和入侵者IP层采用入侵手段,以及防止这种入侵所采取措施

    This paper introduces IP layer security of computer system, incidences often use invading method to IP layer. In order to prevent the invading, should take the measure.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定