• 部署入侵监测入侵系统

    Deploy intrusion-detection and intrusion-prevention systems.

    youdao

  • 他们目标想尽办法入侵系统所以他们设计寻找漏洞

    Their goal is to break your systems any way they can, and look for holes in your design as they do so.

    youdao

  • 系统调用劫持黑客入侵系统保留后门常用一项技术

    System call hijacking is a common technology used by hackers to keep backdoors on the compromised sys-tem.

    youdao

  • IDS成为一个备份系统因为很少入侵系统激活报警机制。

    The IDS will become a backup system, rarely forced to sound an alarm that someone has actually gotten past your secure threshold.

    youdao

  • 本文提出算法以及入侵系统模型使用入侵检测数据kddcup99作为测试集验证性能

    The algorithm proposed in this paper realizes the corresponding module and validates the performance in the KDDCUP99 intrusion detection data set.

    youdao

  • 计算机病毒入侵系统途径将计算机病毒分为源码病毒、入侵病毒、操作系统病毒外壳病毒。

    According to a computer virus intrusion system approach can be divided into source virus, computer virus virus, operating system viruses and shell viruses.

    youdao

  • 审计线索不仅突出网络脆弱处,而且识别出一次内部作业用于入侵系统口令设备

    The audit trail not only highlights points of vulnerability on a network, but can also identify the password and equipment used to invade the system during an inside job.

    youdao

  • 但是现在哈佛大学研究人员表示这种蛋白的确不为人知的功能大脑抵御细菌其他微生物入侵系统一部分

    But now researchers at Harvard suggest that the protein has a real and unexpected function - it may be part of the brain's normal defenses against invading bacteria and other microbes.

    youdao

  • 知道Snort一种入侵检测系统如何检测入侵的呢?

    You know that Snort is an intrusion detection system, but how does it detect intrusion?

    youdao

  • 堡垒保护容易因为构造更简单:它没有窗口几乎没有几道门,没有天窗通风系统这些入侵可能利用的东西。

    A fortress is easier to protect because it's simpler: it has no windows, few doors, no skylights, or vent systems through which an intruder might sneak.

    youdao

  • 只是我们免疫系统试图防御潜在外来入侵分类介绍

    Just an introduction to the classes of potential foreign invaders that our immune system tries to defend us against.

    youdao

  • 入侵一个地区物种危害生态系统农业人类健康

    Species that invade a territory can harm ecosystems, agriculture and human health.

    youdao

  • 入侵入侵系统可能是出于这两个原因之一为了获取他们应该拥有信息或者为了改变系统行为

    Intruders might invade your systems for one of two reasons: to gain access to information that they should not have or to alter the behavior of a system.

    youdao

  • 那么究竟什么入侵检测系统

    So what is an intrusion detection system, anyway?

    youdao

  • 一种入侵检测系统——而不仅仅工具

    It's an intrusion detection systemnot just a tool.

    youdao

  • 他们的目标想尽办法入侵我们系统

    Their goal is to break our systems any way they can.

    youdao

  • 某些黑客入侵系统只是为了取乐时,一个问题

    This can be a problem when some hackers break into systems simply for the fun of it.

    youdao

  • 现在攻击者(外部内部仅需入侵系统可以访问所有数据

    Now an attacker (external or internal) needs to compromise only a single system to get access to all master data.

    youdao

  • 研究人员希望通过展示如何入侵某些系统的方式,督促计算机行业采取措施使基础设施消费者更加的安全。

    Researchers hope that by showing off how to hack certain systems, the computer industry will take steps to make infrastructure and consumers safer.

    youdao

  • 冈萨雷斯俄国同伙建立套极为先进的系统用于入侵下载信用卡号码

    Gonzalez and his Russian helpers are said to have set up a sophisticated system for hacking into and downloading credit card Numbers.

    youdao

  • 作者很快得出两个重要主题入侵检测系统IDS旁路过滤

    The authors quickly jump into two important topics: problems with Intrusion Detection Systems, or IDSs, and bypassing filters.

    youdao

  • 使用一法案进行的诉讼,较为典型的起诉对象是入侵他人电脑系统黑客

    More typically, prosecutions under the act have involved people who hack into computer systems.

    youdao

  • 还有一个办法调整IDS(入侵检测系统)IPS(入侵防御系统)查找有僵尸嫌疑的行为

    Another approach is to fine-tune your IDS (intrusion detection system) and IPS (intrusion detection and prevention system) to look for botlike activity.

    youdao

  • 入侵探测系统(IDSes)现有安全解决方案了解探测不正当活动所需数据库协议结构

    Existing security solutions, such as intrusion detection systems (IDSes), lack the knowledge of database protocols and structures required to detect inappropriate activities.

    youdao

  • 这个步骤目标是以一种特殊方式格式化有效负载,以便躲避壁垒森严入侵探测系统IDSs)。

    The goal of this step is to format the payload in such a way that it can evade entrenched intrusion-detection systems (IDSs).

    youdao

  • 还有很多入侵检测系统(IDS),例如非常流行snortlogsnorter

    Then there are a number of intrusion detection systems (IDS) like the very popular snort and logsnorter.

    youdao

  • 可以证明,Snort市面上最好易用或许也是最便宜的入侵检测系统

    Snort is arguably the best and easiest-to-use, as well as (certainly) the cheapest, intrusion detection system you'll find.

    youdao

  • 可以证明,Snort市面上最好易用或许也是最便宜的入侵检测系统

    Snort is arguably the best and easiest-to-use, as well as (certainly) the cheapest, intrusion detection system you'll find.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定