下面我们就来看看通过什么样的手段来更有效的防范攻击。
Let's take a look at more effective to prevent attacks by what means.
如果那不可能——比如当块之间使用网络通信时——那么使用加密等机制来防范攻击者。
If that's not possible — such as when the pieces communicate using a network — use mechanisms such as encryption to counter attackers.
本文主要目的就是揭示协议中的漏洞,如何利用漏洞来进行攻击以及怎样去防范攻击。
The main purpose in the paper is exposing holes in protocols, using them to attack network and giving schemes for defending attacks.
随后,本文研究了现阶段流行的针对DNS系统的几种典型攻击手段,提出了几种防范攻击和提高DNS系统健壮性的方案或方法。
Besides that, we investigate several kinds of popular DNS attack methods, and proposed some defence schemes to resist these attacks and improve the robustness of the DNS system.
鉴于存储器是数据最主要的驻留场所,因此,防范攻击首要的是对处理器的片外存储器进行保护,其关键技术手段包括存储器的机密性和完整性保护。
Since memory is the primary place to store the data, the most effective way to against attack is the protection of off-chip memory, i. e. confidentiality protection and integrity protection.
对于每种技术,适当的方块将加上底纹,表示这种技术有助于防范的攻击类型。
The appropriate key(s) will be shaded to indicate the type of attack(s) each technique helps to prevent.
但最近的攻击案件表明,对于安全问题的防范学校方面必须做的更多。
But the latest attack shows justhow much more China'sschools have to do.
防范DoS攻击需要很不一样的技术,这超出了应用服务器所能提供的范围。
Preventing DoS attacks requires very different techniques that go well beyond what an application server can provide.
防范DoS攻击需要不同的技术,这超出了应用服务器所能提供的范围。
Preventing DoS attacks require different techniques that go well beyond what an application server can provide.
这四个方块加了适当的底纹,以代表这种技术有助于防范的攻击类型
The four squares will be shaded as appropriate to represent the type of attack this technique helps to prevent
Web应用程序使用POST中包含的nonce(值仅在短期内有效的惟一字符串)来防范服务拒绝攻击。
The Web application USES a nonce (a unique string whose value is valid only for a short time) that is included in the POST as a way to guard against denial-of-service attacks.
1940年3月27日,一匹头戴防毒面具的马,用于防范可能的毒气攻击,这种防毒面具由英国伦敦的保护动物协会“我们不会说话的朋友联盟”打造。
A docile horse wears a gas mask, as a precaution against gas attacks, that was developed by "Our Dumb Friends League," a humane society in London, England, March 27, 1940.
有几种不同的保护技术可以防范多种形式的攻击,而有时一次攻击可能利用多种入侵形式来达到最终目标。
Several different protection techniques help with multiple forms of attack, and sometimes a single attack can leverage multiple forms of intrusion to achieve the end goal.
每个级别防范不同的攻击类型,并提供对攻击者更有效的屏障。
Each level tries to thwart different types of attacks and also provides more barriers to attackers.
有几种不同的保护技术可以防范多种形式的攻击,而有时一次攻击可能利用多种入侵形式才达到最终目标。
Several different techniques of protection help with multiple forms of attack, and sometimes a single attack may leverage multiple forms of intrusion to achieve the end goal.
对此,哈德利说,这是为了防范来自伊朗的攻击,不是为了防范俄罗斯。
They will discuss the U.S. missile defense system, which Hadley says is meant to guard against attack from Iran, not Russia.
下面是一些加强路由器安全的具体措施,用以阻止对路由器本身的攻击,并防范网络信息被窃取。
Here are some strengthen router security measures, to prevent the attack on the router itself, and prevent the network information from eavesdroppers.
因此,人应该非常小心地防范玛亚的攻击。
Therefore one should be very careful against the attack of Maya.
来自于F网络安全公司的米克·海坡嫩(Mikko Hyppönen)说道,对网络攻击最好的防范便是在多个国家都建立起强大的多服务器网络,这家公司为芬兰的一家英特网安全公司并负责监控这次的网络攻击。
Mikko Hyppönen of F-Secure, a Finnish internet security company that has been monitoring the attacks, says the best defence is to have strong networks of servers in many countries.
在介绍了如何破解Windows密码后,我还将介绍一些技巧,帮助您防范此类攻击。
After demonstrating how to crack Windows passwords I will provide some tips for ensuring you are not vulnerable to these types of attacks.
如果执行得力的话,员工的信息安全意识会有助于企业防范一些基本的网络攻击。
If done effectively, employee awareness can help prevent basic attacks.
此专利系列涵盖用于防止小型分组攻击的各种方法,并包含涵盖众所熟知的诸多防范措施的各种主张。
This patent family covers all ways of preventing the small subgroup attack and includes claims covering most known preventative measures.
对于防御拒绝服务攻击与端口扫描,我们在网络层与传输层分别采取相应的措施进行防范。
For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.
还有4.4%的攻击源不明,不管是来自境内还是境外,都要对此类安全隐患尽早防范、有效规避。
There are 4.4% of the source of the attack is unknown, whether it is from inside or outside, we must guard against such security risks as early as possible, effectively circumvent.
认证中心的攻击的防范策略是本文的另一研究重点。
The preventive strategy of the attack on certification is another research focus of this article.
这种模型使得攻击非常难以预测和防范,并大大提高了攻击成功的可能性。
This model makes it hard to predict and prevent attack behaviors, and enhances the possibility of success attack.
网络告警因果关联技术有助于管理员根据告警之间的因果关系构建攻击场景,及时调整防范措施。
Network alarm causal correlation technology can help network administrators construct attack scenarios and take timely responses by unveiling the causal relationship of intrusion alarms.
本文阐述了网络攻击的特点,并提出网络安全的防范措施。
This paper expounds the characteristics of network attack, and puts forward corresponding measures.
对于分布式应用资源的大量安全攻击来说,访问控制是重要的防范手段。
Resources access control (AC) is an essential defensive measure against a large number of security attacks.
对于分布式应用资源的大量安全攻击来说,访问控制是重要的防范手段。
Resources access control (AC) is an essential defensive measure against a large number of security attacks.
应用推荐