• Cannot carry on the malicious attack to it with to slander.

    不能进行恶意攻击诋毁

    youdao

  • Recommender System; Collaborative Filtering; User Trust; Malicious Attack; Similarity.

    推荐系统协同过滤用户信任恶意攻击相似性

    youdao

  • Multiple origin AS conflicts may result from multi-homing, misconfiguration or malicious attack.

    AS冲突可能起源于多宿主,如配置错误或者恶意攻击等。

    youdao

  • And while they said they had no reported cases so far of "malicious attack," they warned it is possible.

    他们虽然目前没有此类恶性事件发生报道,但可能的。

    youdao

  • McAfee has a product called McAfee Secure which helps corporations determine whether their sites are open to malicious attack.

    McAfee一个叫做McAfee安全(Secure)的产品用来帮助公司确认自己网站是否会受到恶意攻击

    youdao

  • In the malicious attack statement, two kinds of attacks, SQL injection and middleware channel multiplexing, are hard and heavy.

    恶意攻击语句中,SQL注入中间件通道复用攻击中难,同时也是中重。

    youdao

  • The experimental results show that TVCA can achieve good effects in many aspects such as efficient computing and malicious attack resistance.

    模拟实验表明TVCA算法提高计算效率、抵抗恶意攻击方面取得良好效果

    youdao

  • A malicious attacker can make use of this behavior and launch a remote denial-of-service attack against a vulnerable network service over the Internet.

    恶意攻击可以利用一点,通过Internet网络服务发动远程拒绝服务攻击

    youdao

  • Skype has no evidence to suggest that this was a malicious attack. We've identified a bug in the Skype software which was the root cause of the downtime.

    个发言人排除了一次破坏行为可能性,Skype没有证据显示是一次蓄意攻击,相反,我们Skype的软件发现了一个bug,该bug是导致此次全球宕机的根源。

    youdao

  • Securing Web services with ACLs, however, does not mitigate the risk of exposing Web services (and non-Web services) vulnerabilities to a malicious attack.

    访问控制表保护Web服务然而这并不能减轻Web服务(以及web服务)漏洞受到恶意攻击危险

    youdao

  • Regarding goods price and business information users may judge by themselves. any malicious attack on asking price and offering price is strictly prohibited.

    对于交易价格以及商品等各类信息,请网友自行判断严禁恶意攻击卖家的开价买家的出价以及对于商品的诋毁。

    youdao

  • Software tamper resistance is the art of crafting a program such that it cannot be modified by a potentially malicious attacker without the attack being detected.

    介绍软件抗篡改编写程序艺术,使代码没有攻击检测的情况下,不会潜在的恶意攻击代码所修改

    youdao

  • Automatic logoff is protection of dormant sessions to a given system (generally remote, but not necessarily) from malevolent usage to help mitigate the risk of malicious attack.

    自动下线保护给定系统(通常并不必须是远程)休眠会话不被恶意利用帮助降低受到恶意攻击的风险

    youdao

  • The model can effectively build up a high efficient and reliable trust relationship between peers, prevent malicious attack and enhance security and efficiency of the P2P networks.

    利用模型可以在两对等实体之间建立高效可靠信任关系有效防止恶意攻击提高P 2 P网络的效率安全

    youdao

  • "Social engineering," the gathering of information about a computer or computer network via questions to naive users, is often the first step in a malicious attack on computer networks.

    社会工程有关计算机通过向天真的问题,计算机网络用户信息收集往往计算机网络进行恶意攻击一步

    youdao

  • Anti-virus software plays one, albeit important, part in the defense of your company from malicious attack but the security of your computer system is only as strong as the weakest link.

    反病毒软件虽然可以电脑起到防御作用,使其不恶意攻击但是你的电脑系统安全仍然是很薄弱的环节。

    youdao

  • Knowing that the cause is a malicious attack does take Twitter off the hook to some degree –it may have been assumed that the site was simply failing to scale properly, as had happened in the past.

    当人们得知twitter宕机的原因缘于恶意袭击,Twitter才得以困境中缓过气 -人们原本推测Twitter宕机的原因是twitter不能承受如此规模的服务器负担,而这种情况在以前就发生过的。

    youdao

  • Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.

    黑客进入虚拟之后,可以使用黑客工具启动恶意网络扫描攻击活动,并把这些活动伪装善意的网络扫描

    youdao

  • Tencent said it was defending itself against a malicious software attack, but the move triggered accusations that Tencent had too much power.

    腾讯表示这么做针对恶意软件攻击防御举措,此举引发大量指责,称腾讯权势过大。

    youdao

  • A new program aims to put the squeeze on malicious software that can disable, infiltrate or transform a computer system into an unwitting zombie - before the cyber attack ever materializes.

    新的程序旨在恶意软件施加压力程序可以网络攻击开始之前禁用渗透变换的方法阻止计算机在不知情的情况下成为僵尸电脑。

    youdao

  • Replay attackRe-sending a previously valid message for malicious effect, possibly where only parts of the message (such as the security token) are replayed.

    应答攻击——实现恶意效果,重新发送一个以前曾经有效消息,其中可能只是部分消息(安全令牌)。

    youdao

  • As mentioned above, a replay attack by some malicious third party is the most convenient attack.

    正如上文所提到的,来自某个恶意第三再现攻击容易遭受到的攻击。

    youdao

  • Since attackers are usually trying to add malicious scripts, this particular variation is called a "cross-site scripting attack" (XSS attack).

    由于攻击通常试图添加恶意脚本,因些这种变化称为“交叉站点脚本攻击” (XSS攻击)。

    youdao

  • For years, security analysts had warned that industrial control systems were susceptible to attack or manipulation by malicious coders.

    多年以来,安全分析家们就做出警示工业控制系统容易遭到那些恶意的程序员的攻击操控

    youdao

  • In other words, in spite of the fact that the women realized malicious gossip wasn't socially appropriate, this was nevertheless their preferred first point of attack.

    就是说,虽然妇女意识到恶毒闲话适应社会性仍然她们首选攻击点。

    youdao

  • It should address mitigating risks of SaaS applications that are vulnerable to an attack by a malware application that allocates malicious instance resources.

    黑客可能通过分配恶意实例资源的恶意软件攻击SaaS应用程序,策略应该降低这种风险

    youdao

  • Using a Padding Oracle (PO) attack a malicious user can access encrypted data such as cookies, state, membership password, etc.

    恶意用户能够使用PaddingOracle (PO)攻击方式来解密cookie加密状态认证密码等关键信息。

    youdao

  • Using a Padding Oracle (PO) attack a malicious user can access encrypted data such as cookies, state, membership password, etc.

    恶意用户能够使用PaddingOracle (PO)攻击方式来解密cookie加密状态认证密码等关键信息。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定