This section describes potential security attack methods from an attacker or hacker.
本节描述了攻击者或者黑客可以使用的潜在的安全攻击方法。
Also referred to as TCP session hijacking, a security attack on a user session over a protected network.
也叫TCP会话劫持,它是在受保护的网络上对用户的会话进行安全攻击。
A variety of invasive techniques and exploit ideas and exchanges, so that you become a master script security attack and defense.
各种入侵思路与技术和漏洞利用交流、让你成为脚本安全攻防高手。
This method not just protects the first access node (3), but also the following network nodes (10) and users (1) respectively, against a security attack.
此方法不仅保护第一接入节点(3),而且分别保护后面的网络节点(10)和用户(1),免于安全攻击。
The present invention relates to a method for protecting a network against a security attack from an user, and in particular, for a layer 2 switch, against a MAC flooding attack.
本发明涉及一种用于保护网络免于来自用户的安全攻击并且尤其是对于第2层交换机而言免于MAC洪流攻击的方法。
Government should attach great importance to cyber security which is constantly under attack and is of great importance to national security.
政府应该十分重视网络安全,它不断地受到攻击,却又对于国家安全十分重要。
The attack was captured on film by security cameras.
袭击事件已被保安摄像机拍摄下来。
Realize, though, that this attack is not reserved strictly for the realm of computer and digital security.
然而我们要认识到,这种攻击并不仅仅存在于计算机和数字安全领域。
To reduce the risk of this form of attack, you should consider enabling session security.
要降低这种攻击形式的风险,您应该考虑启用会话安全性。
Security experts said it would be difficult for investigators to prove which nation was behind the attack.
安全专家表示对调查者来说要证明哪个国家处于攻击状态是困难的。
While polyinstantiation will not prevent every type of attack, it is a useful addition to your security toolkit that is straightforward to configure.
尽管多实例化不能防止所有攻击,但它是您的安全工具包的一个有用的补充,而且配置十分简单。
The company's information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.
该公司的信息安全团队几乎立即发现了攻击,并采取积极的行动来保护所有系统和数据。
The company’s information security team detected the attack almost immediately, and took aggressive actions to protect all systems and data.
该公司的信息安全团队几乎立即发现了攻击,并采取积极的行动来保护所有系统和数据。
However, one computer security expert said that even an attack of this size did not necessarily have to be the work of a large or powerful group.
不过,一名计算机安全专家称,即使是这样大规模的攻击也不一定来自大型或有势力的组织。
For example, if the message category is related to security, a warning message should be produced if a dictionary attack is detected.
例如,如果这个消息类别是有关安全性方面的,那么如果检测到字典攻击,就应该产生一条警告消息。
Several days after the assault state television channels were still leading their news with it and playing security camera videos of the attack mysteriously leaked by the police.
袭击过后的几天里,国家电视频道仍然一直在新闻的首要时间报道,并不断播放被警方神秘泄露的袭击时的安全录像。
But the ease with which the militants struck raised tough questions about who was helping them, and why the country's security services had failed to pre-empt the attack.
然而,袭击者如此轻易就得逞,这使人们产生了很大的疑问:有谁在帮助他们,为什么安全部门没有对此次袭击提前采取行动。
This kind of attack can even be used to bypass explicit security checks.
这种类型的攻击甚至可用于绕过显式安全检查。
Run by small organizations, highly fragmented and with few resources to invest in security, the nation's water supply is an inviting target for attack.
由小型组织维护,高度分散,安全方面毫无资源投入,这个国家的供水设施是攻击的绝好目标。
This attack doesn't mean that all Internet or SSL security has been compromised, but it does mean vendors should move away from using the MD5 signing algorithm.
这种攻击并不意味着整个互联网或者SSL安全已经被突破,但的确意味着厂商应该不再用MD 5作为签名算法。
For years, security analysts had warned that industrial control systems were susceptible to attack or manipulation by malicious coders.
多年以来,安全分析家们就做出警示:工业控制系统很容易遭到那些恶意的程序员的攻击和操控。
Security pundits have long been ringing alarm bells about the possibility of such an attack-the digital equivalent of burglars breaking into a locksmith's shop.
网络安全专家早已就这种攻击的可能性敲过警钟——它相当于窃贼进入锁匠店铺的数字化时代版本。
Determine the potential for damage from a successful attack that results in a security breach.
确定攻击成功而导致安全性被破坏的可能性。
We are filling unacceptable gaps revealed by the failed Christmas attack, with better airline security and swifter action on our intelligence.
我们正在弥补圣诞节攻击事件暴露的不可接受的疏漏,增强了航空安全,为改善我国的情报工作更迅速地采取行动。
Security experts widely believe that the worm was built as part of a state-backed attack on Iran's nuclear program.
安全专家们普遍认为病毒是国家背后支持攻击伊朗核计划的一部分。
Security experts widely believe that the worm was built as part of a state-backed attack on Iran's nuclear program.
安全专家们普遍认为病毒是国家背后支持攻击伊朗核计划的一部分。
应用推荐