• In another type of attack, the attacker might modify the stylesheet to hide information from users.

    另一种攻击类型中,攻击可能会修改样式表信息隐藏起来不让用户发现。

    youdao

  • The sophisticated attacker finds a weakness in a similar type of software, and tries to use that to exploit the system.

    富有经验的攻击者可以发现同类软件缺点并且尝试利用这些弱点进入系统

    youdao

  • By analyzing the networking character values actively and passively, attacker can get a lot of information about target host, such as the type of operating system.

    基于主动被动探测攻击目标分析数据网络特征可以得出攻击目标的操作系统类型重要信息,进而得出与之相关的系统漏洞,为入侵和攻击提供重要依据。

    youdao

  • Another type of session hijacking is known as a man-in-the-middle attack, where the attacker, using a sniffer, can observe the communication between devices and collect the data that is transmitted.

    一类会话劫持叫做中间人攻击攻击利用探测程序可以观测到设备之间通信收集发送出去数据

    youdao

  • Another type of session hijacking is known as a man-in-the-middle attack, where the attacker, using a sniffer, can observe the communication between devices and collect the data that is transmitted.

    一类会话劫持叫做中间人攻击攻击利用探测程序可以观测到设备之间通信收集发送出去数据

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定