训练有素的黑客,可以伪装攻击来源,让们看上去他是在某个城市,而实际却是另一个国家。
But well-trained hackers can disguise their origin of attack, making it seem they're in one city when they're actually in another country.
SARP通过使用专门的映射服务器可实现IP地址到硬件地址的安全映射,可以有效地避免非法用户对地址信息的纂改、重播以及实施ARP伪装攻击。
SARP can realize the safety resolution from IP address to hardware address, thus address information can effectively avoid being distorted and replayed by the illegal us...
黑客进入虚拟机之后,他可以使用黑客工具启动恶意的网络扫描攻击活动,并把这些活动伪装成善意的网络扫描。
Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.
他们很可能成为黑客的攻击目标。攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。
They could be targeted by a hacker who could takes steps, including sending malicious software in an email, that appears to come from someone the victim knows.
去年特征检测技术的问题日渐突出,网络攻击者越来越多的使用代码伪装技术制造出大量的病毒变种,更加重了防病毒分析工作。
The flip side of the problem became evident last year, as online attackers increasingly used obfuscation techniques to produce massive number of variants, taxing antivirus analysts.
一旦偷取到cookie,攻击者会使用cookie去伪装成真正的用户。
Once stolen, an attacker can use the cookie to impersonate the user.
这看起来不是一件什么大不了的事,但是攻击者基本上是通过伪装成合法用户然后取得用户的所有权限。
This might not seem like a big deal, but the attacker has essentially masqueraded as a legitimate user and gained all the potential access that the user has.
他看破了彼德的伪装并肆机攻击他。
He saw right through Peter's disguise and tried to attack him whenever he got a chance.
本文主要讨论如何通过网络伪装来防御操作系统的真正类型及其版本被探测,进而避免遭受针对具体操作系统类型漏洞的攻击。
How to defend detecting of the type and version number of operating system by network masquerade and avoid the attack of operating system hole is researched in this dissertation.
基于伪装网络服务监测跟踪攻击行为及过程,可以有效地研究发现未知攻击方式及其特征。
Camouflaging network service can monitor and track attacks and its processes; also it can find unknown attack and its characters.
请明白华丽的伪装总是对那些年轻与易受攻击的人起作用。
Be aware that these are dressed up to attract the young and vulnerable.
他们很可能成为黑客的攻击目标。 攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。
They could be targetedby hacker who could takes steps, including sending malicious software in an email that appears tocome from someone the victim knows.
他们很可能成为黑客的攻击目标。 攻击手段包括伪装成受害者认识的人,通过电子邮件向其发送恶意软件。
They could be targetedby hacker who could takes steps, including sending malicious software in an email that appears tocome from someone the victim knows.
应用推荐