Soon, the term hacker had a new meaning — a person using computers to explore a network to which he or she didn't belong.
不久,黑客被赋予了新的含义,即黑客是使用计算机探索其不在的网络。
Instead of trying to penetrate a network and find a domain or network they're completely unaware of, the hacker only has to infiltrate a portion of a network that they do know about.
他们不必再去尝试潜入网络并找到毫不了解的域或网络,只需进入自己了解的某个网络的一部分即可。
In fact, he notes that within the hacker community, DDoS and similar attacks don't even qualify as true hacking, which involves actually compromising a network, not taking down a site.
他注意到,在黑客界内部,阻断服务攻击以及类似的攻击方式只能算是雕虫小技,甚至还不够格被称作真正的“黑”。真正的“黑”是要对一个网络造成真正的危害,而不是暂时关掉一个网站。
A hacker takes advantage of the fact that the IaaS administrator cannot apply standard controls such as IP-based network zoning in virtualized networks.
IaaS管理员无法在虚拟网络中应用基于IP的网络分段等标准控制措施,黑客可以利用这一情况。
Using a network of computers (dubbed zombies) controlled by a single master machine, the hacker tries to overwhelm a website's servers.
利用一个由单一主机控制的电脑网络(称为僵尸网络),黑客竭力地颠覆一个网站的服务器。
Hacker crime emerges as a new type of crime with the development of computer and network technology.
黑客犯罪是伴随网络和计算机出现的一种新的犯罪形式。
The second might enable the hacker to overload a Windows machine and prevent it from functioning properly. This can be achieved by sending similarly customized network messages repeatedly.
其二是黑客可以让装有视窗的电脑超载,使该机功能失常,用反复输入类似定制网络信息的方法就可达此目的。
Thee second might enable the hacker to overload a Windows machine and prevent it from functioning properly. This can be achieved by sending similarly customized network messages repeatedly.
其二是黑客可以让装有视窗的电脑超载,使该机功能失常,用反复输入类似定制网络信息的方法就可达此目的。 。
The first could allow the hacker to break into a Windows system and run any programs or code they choose by sending a specially designed network message.
一是可能允许黑客用输入一种特别编制的网络信息,闯入一种视窗系统,操纵全部程序或由他们任意编码。
Since TCP/IP shows less consideration to security, some shortcomings in security are in existence, which provides Hacker opportunities to attack network.
IP协议由于缺乏对安全性的考虑,存在一定的安全缺陷,给黑客攻击网络以可乘之机。
When People purchase and use these network product, they are not aware of some hacker or organization are intercepting; stealing; modifying their information through network without any resistance.
当人们购买、使用这些网络产品时,他们还未意识到一些黑客、强力组织,正通过网络悄无声息的窥探、窃取、修改他们的信息。
The police spent a long time tackling the hacker who ruined the network.
警方花了很长时间对付那个毁坏了电脑网络的黑客。
But, it has not only its own features, such as interconnected, openning, sharing information, etc. also lots of unsafety factors, such as network virus, hacker attack, ect. exist.
但是,高校校园网具有互联性、开放性、共享性等特点,具有众多的不安全因素,如网络病毒、黑客的攻击等。
Computer hacker activity has formed an important threat. Information infrastructure facilities are facing the challenge of network security.
电脑黑客活动已形成重要威胁;信息基础设施面临网络安全的挑战;
This text has discussed the urgency of case study of the network, the hacker attacks the characteristic safe loophole question.
本文讨论了网络安全研究的紧迫性,黑客攻击特征,安全漏洞问题。
Also the community network will connect to internet, so it is an important requirement to prevent outside hacker, and network virus invasion.
另外,整个网络需要接入国际互联网,因此本方案设计了以下措施防止外部黑客和网络病毒的入侵。
Aimed at confronting the digital campus viruses, hacker attacks and spam, and a series of network security issues.
针对数字化校园面临的病毒入侵、黑客攻击和垃圾邮件等一系列网络安全问题。
To oppose hacker and to prevent virus are the important content of network secure.
反黑客、病毒是网络安全的重要内容。
A comprehensive, yet easy to use network protection software, you can ensure that your computer is not by any hacker intrusion.
一个全面,却又简单易用的网络防护软件,可以确保你的计算机不被任何黑客侵扰。
Guards the network security, becomes the genuine hacker!
捍卫网络安全,成为真正的黑客!
Program design, network technology, hacker attack and defense, and other e-books.
程序设计、网络技术、黑客攻防等各种电子书。
Network sniffing is like one double-edged sword. It makes the network administrator convenience, but it also offers the hacker a tool to steal network information.
网络监听技术就像一把双刃剑,在提供给网络管理员管理网络的方便时也提供给黑客一个盗取网络信息的工具。
However as hacker attack and network virus emerge in endlessly, the problem of network security has become very serious.
然而层出不穷的黑客攻击和网络病毒事件使得网络安全问题突显出来。
On the other side, hacker attack, virus spreading and mixed network attacks add increasingly, so that the network security defensive line is full frailness.
另一方面,黑客攻击、病毒传播以及形形色色的网络攻击日益增加,网络安全防线十分脆弱。
At present constant enlargement in network size and hacker attack means complicated day-by-day, the demands of people for the network security grow with each passing day.
目前随着网络规模的不断扩大和黑客攻击手段的日益复杂,人们对于网络安全的需求与日俱增。
This paper presents a network attack model , which departs attack into several steps , and describes technology that hacker adopts during each attack step.
给出了一个网络攻击模型,该模型将攻击过程归纳为若干阶段,并详细地分析了黑客在各阶段所采用技术方法。
The first could allow the hacker to break into a Windows system run any programs or code they choose by sending a specially designed network message.
一是可能允许黑客用输入一种特别编制的网络信息,闯入一种视窗系统,操纵全部程序或由他们任意编码。
The first could allow the hacker to break into a Windows system run any programs or code they choose by sending a specially designed network message.
一是可能允许黑客用输入一种特别编制的网络信息,闯入一种视窗系统,操纵全部程序或由他们任意编码。
应用推荐