这是避免暴力破解的一个好方法。
当然了,弱密码的确容易招致暴力破解攻击。
Passwords that are too weak of course invite brute-force attacks.
密码算法暴力破解是密码学的一个重要分支。
Brute force attack on cryptographic algorithm is an important branch of cryptology.
事实上,蒙特卡罗技术要比暴力破解技术快得多。
In fact, Monte Carlo techniques are much faster than brute force.
暴力破解ssh是非常缓慢和耗时的,通过设计。
Brute forcing SSH is very slow and time consuming, by design.
换句话说,这些安全体系可能很容易被暴力破解。
In other words, those secure systems can be very easily brute forced.
深蓝及其后继者打败卡斯帕罗夫所用的是暴力破解技术。
Deep Blue and its successors beat Mr Kasparov using the "brute force" technique.
这对于防止可能的暴力破解攻击并采取相应对策是很重要的。
This is important to maintain an overview of possible brute force attacks and to implement necessary steps to prevent these (e. g. block attackers IP).
RAR密码破解绿色版软件 很好用不过是个暴力破解!
SAD! -Green RAR password cracking software is a good use of violence but to break! SAD!
加密算法的安全性在很大程度上取决于暴力破解的不可行性。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
通过阻塞特定IP的HTTP请求处理,可以防止暴力破解口令攻击。
The blocking of processing HTTP requests for particular IPs prevents brute force password attacks.
这一问题的提示可以被暴力破解,但还有一个更聪明的方法来解决它。
The question hints that this one can be brute forced, but that there is also a more clever way to solve it.
这些类型的算法被用来尝试组合为一个给定的问题,测试了所有防止暴力破解找到最好的。
These type of Algorithms are used to try to find the best combination for a given problem and prevents bruteforce test with all possibilities.
密码熵预测给定的密码将是多么困难裂纹通过猜测,暴力破解、字典攻击或其他常见的方法。
Password entropy predicts how difficult a given password would be to crack through guessing, brute force cracking, dictionary attacks or other common methods.
另一方面,用流行歌词或诗歌不是个好主意,因为黑客采用“暴力破解”的手段猜测密码时,会首先试用它们。
On the other hand, it's not a good idea to use popular song lyrics or pieces of poetry because it's more likely hackers will try those first in any effort to "brute force" guess the password.
密码学作为信息安全的基础和核心,也越来越受到人们的关注,而暴力破解对称密码算法,是密码学研究的一个重要方向。
As the basis and core of information security, cryptography also attracts more and more attention. Brute force attack on symmetric cipher algorithms is an important direction of cryptography.
虽然这些数字看似非常巨大,但SHA - 1破坏性攻击的速度仍然较暴力破解攻击快10万倍,这意味着前者确实具有可行性。
Although these Numbers seem to be very large, but the speed of SHA-1 destructive attack is still 100 thousand times faster than brute force attacks, which means that the former is indeed feasible.
我们的所有工作完全依赖志愿者们的自发参与,因为我们的这项工程试图通过暴力破解来检验每一种可能的钥匙以得到我们想要的密码。
We depend heavily (entirely) on the participation of people like yourself, as we intend to solve this project via the use of brute force, trying every possible key there is.
然而,我们发现,长度约为20个字符左右、相对较“弱”的密码也已经能够使得针对单一账户的暴力破解变得不现实:只要有“三振出局”的规范即可。 (译者注:原文的“threestrikes”typerule 指的应该是连续三次输入错误密码就会暂时锁死账户,具体可参考此处。)
However, we find that relatively weak passwords, about 20 bits or so, are sufficient to make brute-force attacks on a single account unrealistic so long as a “three strikes” type rule is in place.
然而,我们发现,长度约为20个字符左右、相对较“弱”的密码也已经能够使得针对单一账户的暴力破解变得不现实:只要有“三振出局”的规范即可。 (译者注:原文的“threestrikes”typerule 指的应该是连续三次输入错误密码就会暂时锁死账户,具体可参考此处。)
However, we find that relatively weak passwords, about 20 bits or so, are sufficient to make brute-force attacks on a single account unrealistic so long as a “three strikes” type rule is in place.
应用推荐