• This section describes potential security attack methods from an attacker or hacker.

    描述了攻击或者黑客可以使用潜在的安全攻击方法

    youdao

  • Also referred to as TCP session hijacking, a security attack on a user session over a protected network.

    TCP会话劫持,它是保护的网络用户的会话进行安全攻击

    youdao

  • A variety of invasive techniques and exploit ideas and exchanges, so that you become a master script security attack and defense.

    各种入侵思路技术漏洞利用交流成为脚本安全攻防高手

    youdao

  • This method not just protects the first access node (3), but also the following network nodes (10) and users (1) respectively, against a security attack.

    方法不仅保护第一接入节点(3),而且分别保护后面网络节点(10)用户(1),免于安全攻击

    youdao

  • The present invention relates to a method for protecting a network against a security attack from an user, and in particular, for a layer 2 switch, against a MAC flooding attack.

    发明涉及一种用于保护网络免于来自用户安全攻击并且尤其是对于第2交换机而言免于MAC洪流攻击的方法

    youdao

  • Government should attach great importance to cyber security which is constantly under attack and is of great importance to national security.

    政府应该十分重视网络安全不断受到攻击,却又对于国家安全十分重要

    youdao

  • The attack was captured on film by security cameras.

    袭击事件保安摄像机拍摄下来

    《牛津词典》

  • Realize, though, that this attack is not reserved strictly for the realm of computer and digital security.

    然而我们要认识到这种攻击并不仅仅存在计算机数字安全领域。

    youdao

  • To reduce the risk of this form of attack, you should consider enabling session security.

    降低这种攻击形式风险应该考虑启用会话安全性

    youdao

  • Security experts said it would be difficult for investigators to prove which nation was behind the attack.

    安全专家表示调查者来说证明哪个国家处于攻击状态困难的。

    youdao

  • While polyinstantiation will not prevent every type of attack, it is a useful addition to your security toolkit that is straightforward to configure.

    尽管实例不能防止所有攻击但它安全工具包一个有用的补充,而且配置十分简单。

    youdao

  • The company's information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.

    公司信息安全团队几乎立即发现攻击采取积极行动保护所有系统数据

    youdao

  • The company’s information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.

    公司信息安全团队几乎立即发现攻击采取积极行动保护所有系统数据

    youdao

  • However, one computer security expert said that even an attack of this size did not necessarily have to be the work of a large or powerful group.

    不过一名计算机安全专家即使这样大规模攻击不一定来自大型有势力的组织。

    youdao

  • For example, if the message category is related to security, a warning message should be produced if a dictionary attack is detected.

    例如如果这个消息类别有关安全性方面的,那么如果检测到字典攻击,就应该产生一条警告消息。

    youdao

  • Several days after the assault state television channels were still leading their news with it and playing security camera videos of the attack mysteriously leaked by the police.

    袭击过后几天里,国家电视频道仍然一直在新闻首要时间报道,不断播放警方神秘泄露袭击时的安全录像

    youdao

  • But the ease with which the militants struck raised tough questions about who was helping them, and why the country's security services had failed to pre-empt the attack.

    然而袭击者如此轻易就得逞,使人们产生了很大的疑问:有帮助他们为什么安全部门没有此次袭击提前采取行动。

    youdao

  • This kind of attack can even be used to bypass explicit security checks.

    这种类型攻击甚至用于绕过显式安全检查

    youdao

  • Run by small organizations, highly fragmented and with few resources to invest in security, the nation's water supply is an inviting target for attack.

    小型组织维护高度分散安全方面毫无资源投入这个国家供水设施攻击绝好目标

    youdao

  • This attack doesn't mean that all Internet or SSL security has been compromised, but it does mean vendors should move away from using the MD5 signing algorithm.

    这种攻击并不意味着整个互联网或者SSL安全已经突破的确意味着厂商应该不再用MD 5作为签名算法

    youdao

  • For years, security analysts had warned that industrial control systems were susceptible to attack or manipulation by malicious coders.

    多年以来,安全分析家们就做出警示工业控制系统容易遭到那些恶意的程序员的攻击操控

    youdao

  • Security pundits have long been ringing alarm bells about the possibility of such an attack-the digital equivalent of burglars breaking into a locksmith's shop.

    网络安全专家早已这种攻击可能性敲过警钟——它相当于窃贼进入锁匠店铺的数字化时代版本。

    youdao

  • Determine the potential for damage from a successful attack that results in a security breach.

    确定攻击成功导致安全性被破坏可能性

    youdao

  • We are filling unacceptable gaps revealed by the failed Christmas attack, with better airline security and swifter action on our intelligence.

    我们正在弥补圣诞节攻击事件暴露不可接受疏漏,增强了航空安全,为改善我国的情报工作迅速地采取行动

    youdao

  • Security experts widely believe that the worm was built as part of a state-backed attack on Iran's nuclear program.

    安全专家们普遍认为病毒国家背后支持攻击伊朗核计划一部分

    youdao

  • Security experts widely believe that the worm was built as part of a state-backed attack on Iran's nuclear program.

    安全专家们普遍认为病毒国家背后支持攻击伊朗核计划一部分

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定