• Finally, some ideas on how to properly secure yourself and your systems from the possibility of a password cracking attack were offered.

    最后,提供有关如何适当保护您自己系统避免可能受到密码破解攻击一些想法

    youdao

  • This type of attack is only possible if the database or password store is already compromised.

    这种类型攻击可能数据库密码存储已经暴露的情况下进行。

    youdao

  • Dictionary attack — Guessing the password of a valid user using a brute force search through dictionary words.

    字典攻击——根据字典词汇,使用搜索方式推测一个有效用户密码

    youdao

  • Another common attack is to guess a user's password.

    另一种常用攻击猜测用户密码

    youdao

  • A hybrid attack will add numbers or symbols to the filename to successfully crack a password.

    混合攻击数字符号添加文件名成功破解密码

    youdao

  • This attack USES password cracking to penetrate the systems that the attacker wants to deface.

    攻击使用密码破解渗透攻击破坏系统

    youdao

  • A brute force attack is the most comprehensive form of attack, though it may often take a long time to work depending on the complexity of the password.

    攻击全面攻击形式虽然通常需要长的时间工作,这取决于密码的复杂程度

    youdao

  • When trying to attach over the Internet to the site, the attacker USES a password generator tool, such as L0phtCrack, which launches a brute force attack against the server.

    试图通过因特网连接站点时,攻击使用一个密码发生器工具(l0phtcrack),启动服务器攻击

    youdao

  • This is known as a dictionary attack, and it's one of the many good reasons why your password shouldn't be password or the name of a Star Trek character or even your dog's name.

    称为字典攻击因此密码最好应该是密码Startrek字符甚至您的呢称。

    youdao

  • Just because you encrypt Fido and it becomes gibberish doesn't mean your password is safe from this kind of attack.

    因为加密Fido后会变成一堆语,但并不表明它对于此种攻击安全

    youdao

  • To wit, e-mail, remote login, and superuser privileges all require a passwordpreferably disparate and each difficult to guess or derive using an automated attack.

    电子邮件远程登录超级用户特权需要密码,这些密码最好不相同而且难以通过自动化攻击猜测推断出来

    youdao

  • But it is possible to attack the hashed value of your password using rainbow tables: enormous, pre-computed hash values for every possible combination of characters.

    但是可能通过rainbow攻击密码hash:预先计算出来的数量庞大的hash,涵盖所有可能的字符组合

    youdao

  • Using a Padding Oracle (PO) attack a malicious user can access encrypted data such as cookies, state, membership password, etc.

    恶意用户能够使用PaddingOracle (PO)攻击方式来解密cookie加密状态认证密码等关键信息。

    youdao

  • Some 73% of Internet bank clients in the US share their online banking password with non-financial sites, sharply increasing the risk of attack to their bank account, a poll said.

    最新调查显示,美国73%网上银行用户使用同一个密码网银其他网站注册个人信息,极大提高银行账户被攻击风险

    youdao

  • "We tend to think of password guessing as a very time-consuming attack in which I take each account and try a large number of name-and-password combinations," Mr. Shulman said.

    Shulman先生:“我们往往认为破译密码非常耗时需要逐个尝试密码用户名组合。”

    youdao

  • If someone wanted to attack a transaction, they could get everything they need at the ISP level, without breaking an encrypted password.

    如果有人攻击一次交易,他不要破译加密口令IS P层面上得到所需一切

    youdao

  • By using these schemes, computer system can not only supervises and controls all passwords, but also withstand all attack of forging password.

    利用这些方案计算机系统不仅监测控制口令的使用,而且可以抗击许多对口令伪造攻击

    youdao

  • But it still has some security hidden troubles, for instance: replay attack, password guessing, inter-session chosen plaintext attacks.

    存在一些隐患例如重放攻击密码猜测会话选择明文攻击等等。

    youdao

  • In this paper, we focus on the vulnerability that the administrator account and password are empty, using some basic methods of attack, describing in detail the process of attacks.

    利用漏洞对系统进行攻击成为了黑客们惯用本文针对管理员账号口令一安全漏洞,采用了一些基本攻击方法,详细描述了具体地攻击过程。

    youdao

  • Hashed passwords stored in a text file cannot be used to regenerate the original password, but they are potentially vulnerable to a dictionary attack.

    储存文字中的杂凑密码无法用于重新产生原始密码它们可能容易受到字典攻击

    youdao

  • He said: "the biggest mistake anyone can make is using the same password for each account as you can become more vulnerable should a cyber attack occur."

    :“最大错误所有账户使用同一个密码黑客攻击时,你的账户变得非常脆弱。”

    youdao

  • The main way: password loophole attack, SQL Server extended stored procedure attack, SQL Injection (SQL Injection), steals backup, etc.

    主要手法有:口令漏洞攻击SQLServer扩展存储过程攻击、SQL注入(SQLInjection)、窃取备份

    youdao

  • One option a thief might try to crack your password is a brute-force dictionary attack .

    选项小偷可能企图攻破密码强力字典攻击。

    youdao

  • The fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.

    基于验证元口令认证密钥交换协议基本安全目标抵抗字典攻击服务器泄露攻击。

    youdao

  • This attack is made much more difficult by the introduction of random bytes at the end of the password before the key derivation.

    这项攻击由于衍生前在密码末端导入随机位元组而困难

    youdao

  • Google Chrome defends against this subtle attack by checking the page to which the password data is submitted, once again using the same-origin policy.

    GoogleChrome阻拦这种狡猾的攻击再一使用same - origin策略,检查密码数据提交哪个页面

    youdao

  • Attack, a method of resisting server compromise attack is given and a new password-based authenticated key agreement protocol is proposed.

    针对服务器泄漏攻击给出抵抗这种攻击方法提出了一个新的基于口令认证密钥协商协议

    youdao

  • Attack, a method of resisting server compromise attack is given and a new password-based authenticated key agreement protocol is proposed.

    针对服务器泄漏攻击给出抵抗这种攻击方法提出了一个新的基于口令认证密钥协商协议

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定