• Detailed attack Logging - HDIV logs information abut every attack it detects, providing information such as URL, username, IP address, and attack type.

    详细的攻击日志——HDIV记录检测到的每次攻击的信息,信息包括:url用户名IP地址攻击类型

    youdao

  • Traditional intrusion detection methods lack extensibility in face of changing network configurations as well as adaptability in face of unknown attack type.

    传统入侵检测方法面对多变网络结构缺乏扩展性,而且在未知攻击类型面前缺乏适应性

    youdao

  • If Distance is lower than 2500, show a number equal to the extra damage on top of the target for 3 seconds and damage it with Attack Type Hero, Damage Type Fire.

    假如双方距离2500以下,在目标上方显示附加的伤害持续3并且英雄攻击火焰伤害给与伤害。

    youdao

  • This type of attack is only possible if the database or password store is already compromised.

    这种类型攻击可能数据库密码存储已经暴露的情况下进行。

    youdao

  • In another type of attack, the attacker might modify the stylesheet to hide information from users.

    另一种攻击类型中,攻击可能会修改样式表信息隐藏起来不让用户发现。

    youdao

  • The appropriate key(s) will be shaded to indicate the type of attack(s) each technique helps to prevent.

    对于每种技术适当的方块加上底纹表示这种技术有助于防范攻击类型

    youdao

  • While polyinstantiation will not prevent every type of attack, it is a useful addition to your security toolkit that is straightforward to configure.

    尽管实例不能防止所有攻击但它安全工具包一个有用的补充,而且配置十分简单。

    youdao

  • Systems used in this type of attack can be compromised in any number of ways and infected with a worm or virus.

    类型攻击使用系统可能多种方式破坏受到蠕虫病毒感染。

    youdao

  • The best way to prevent this type of attack is to enforce policies that make passwords difficult to guess.

    防止这种类型攻击最佳方法加强策略使口令很难猜中

    youdao

  • This type of attack happens all the time.

    攻击随时都会发生

    youdao

  • What kind of attack is this type of individual likely to carry out?

    这些可能实现哪种类型攻击呢?

    youdao

  • Techniques used to prevent this type of attack include.

    阻止这种类型攻击技术

    youdao

  • The four squares will be shaded as appropriate to represent the type of attack this technique helps to prevent

    四个方块加了适当的底纹代表这种技术有助于防范攻击类型

    youdao

  • If you are concerned about this type of attack, which is easily prevented through code inspections, you can prevent untrusted clients from connecting to the Web container.

    如果担心这种类型攻击(可以通过代码检查轻松地加以防止),则可以阻止任何不受信任的客户端连接web容器。

    youdao

  • Angry, abusive responses... or any type of personal attack.

    愤怒辱骂性回复或者任何形式人身攻击

    youdao

  • The focus of this article is a specific type of code injection attack: the Blind XPath injection.

    本文主要介绍代码注入攻击一种特殊类型XPath

    youdao

  • One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.

    恶意软件一种常见攻击类型所谓缓冲区溢出攻击,会使接受输入程序崩溃,web浏览器地址数据库搜索窗口

    youdao

  • This type of attack was what Albert Gonzalez used to steal 130 million credit card Numbers.

    就是AlbertGonzalez用来盗取1.3亿信用卡攻击

    youdao

  • If the server CPU and memory seem to be running excessively high, the Domino Web logs should be checked for a Denial of Service type of attack.

    如果服务器CPU内存运用率极高,那么应该检查DominoWeb日志是否存在拒绝服务型攻击

    youdao

  • Consider Example 1 (a), which is paraphrased from the Windows exploit, of course, that forms the basis for this type of attack vector.

    考虑示例1 (a),当然改写Windows攻击,它构成此类攻击载体基础

    youdao

  • We know that Twitter's architecture has made it more vulnerable to this type of attack than Google or even Facebook, but in situations like this, communication is key.

    我们知道Twitter构架使得TwitterGoogleFacebook容易遭到攻击但是这种情况下沟通至关重要。

    youdao

  • So I immediately type up the paragraph, see what it looks like on a clean sheet of paper, and then attack that sheet of paper with my pencil again.

    所以我会立刻写好的一段打印出来,看看一张干净的白纸上是什么样子,然后再用铅笔在纸上涂涂改改。

    youdao

  • For example, if you look at the drugs people take for Type 2 diabetes, certain drugs have recently been linked to increased risk of heart attack.

    例如如果留心人们治疗2型糖尿病服用药物某些药物近来加剧心脏病发作的风险联系起来

    youdao

  • In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.

    除了溢出的利用以外,SQL注入一类依赖开发人员测试输入数据疏漏攻击

    youdao

  • In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.

    缓冲溢出攻击黑客利用程序执行期间存储分配中的特定计算机程序漏洞

    youdao

  • A type of statistical analysis used to study high-energy physics and stock market fluctuations could yield a new Angle of attack in the fight against the virus that causes AIDS.

    一种统计方法主要用于研究高能物理股市波动,现在有可能人类对抗艾滋病战役中开辟新的战场。

    youdao

  • In other words, your type a co-workers who are annoyingly ambitious and dutiful are no more likely to have a heart attack than you are.

    话说,那些被有进取心使命感的人包围的同事心脏病可能性比你低。

    youdao

  • So just how prepared are London and other European cities for this type of an attack?

    那么伦敦欧洲其他城市有没有做好准备应对这种类型袭击呢?

    youdao

  • LM Hash is vulnerable to this type of attack because it does not use today's common method of introducing "salt" to the encryption process.

    LMHash容易此类攻击攻破,是因为没有使用现今常用加密过程引入salt”的方式。

    youdao

  • LM Hash is vulnerable to this type of attack because it does not use today's common method of introducing "salt" to the encryption process.

    LMHash容易此类攻击攻破,是因为没有使用现今常用加密过程引入salt”的方式。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定