攻击技术的一些特点。
图像水印的算法设计和攻击技术是互相促进的对立面。
The image watermarking algorithm design and the attack way are opposite to and promotional of each other.
缓冲区溢出攻击技术是一项十分有效的网络攻击技术。
Buffer overflow attack technology is a very efficient attack technology based on network.
网络隐蔽通道技术是一种被广泛应用的网络攻击技术。
Network covert channel has been widely used for network attack.
攻击技术:比赛攻击以旋踢为主,后踢与前踢攻击为辅。
Attack skill: The main attack was turning kick in competition. The auxiliary attacks were back kick and front kick.
本论文对MD5算法的攻击技术进行了深入的分析和研究。
Attack technology of MD5 algorithm is analyzed and researched deeply in this paper.
本文介绍了木马的攻击原理、常用攻击技术以及防范策略。
This article discusses the work principles and attack technology and defending policies on Trojan Horse.
攻击者浪费了他们的时间,更糟糕的是,揭示了他们的攻击技术。
The attacker has wasted their time and, worse, revealed their attack techniques.
其主要方式有:网上教授病毒、木马制作技术和各种网络攻击技术;
Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;
此外,结 合可能无细微先验知识的限制,提出了有限盲攻击技术。
The limited blind interference technology is presented in terms of no subtle priori knowledge.
为了提高检测技术和检测设备的水平,则首先要对攻击技术有非常深入的了解。
In order to improve the level of detection technology and testing equipment, we must first have a deep understanding of the attack technology.
信息安全防护是一个博弈过程,黑客攻击技术魔高一尺,防护技术就道高一丈。
Information security is a process of game, hacking technology MoGaoYiChe, protection technology on a high.
这里,我们对僵尸网络,普遍的攻击技术以及涉及到的个人做一个更贴近的观察。
In this paper we take a closer look at botnets, common attack techniques, and the individuals involved.
为了在未来的信息战中掌握主动权,研究木马型网络攻击技术具有重要的军事战略意义。
To have the initiative in future weapon of information, will study the wooden horse network attack technology to have the important military strategy significance.
该文提出了基于木马的漏洞扫描模型,并对其攻击原理以及关键攻击技术实现作了进一步的研究。
This article proposed scans the model based on wooden horse's crack, and realized to its attack principle as well as the key attack technology has done the further research.
首先对智能卡安全攻击的主要方法进行了研究,分析了几种最新的智能卡攻击技术的原理与关键步骤。
At first, the main methods of smartcard security attacks are discussed, and the principle and key steps of the latest attack technologies are analysed.
信息安全的核心技术在于“攻防”,即攻击技术和防御技术,只有掌握攻击技术才能更好做到安全防御。
The core technology of information security lies in attack and defense, that is, attack technology and defense technology, only to master the attack technology in order to achieve better security.
攻击技术涉及到左直拳、左刺拳、左钩拳、右上钩拳、右交叉拳以及组合拳,如1 - 2连击的组合拳。
Punching involves quite a few skills, such as the straight left, the left jab, the left hook, the right uppercut, the right cross as well as the combination punching like the one-two.
入侵检测是信息安全领域中一个最富挑战性的课题,这其中最重要的原因是入侵检测所面临的是极富智慧的攻击技术。
Intrusion detection is a real challenge in the area of information security. The reason is that it faces the most intelligent hackers.
本论文在信息隐藏方面的主要工作就是围绕这两种应用展开的,内容涉及图像置乱、图像信息隐藏和隐藏分析和攻击技术等方面。
In this dissertation, we study the technologies and application of these two situations, our attentions focused on image scramble, image hiding, hiding analysis and attack.
这种技术的不同之处是:它既有攻击性,又有说服力。
There's something different about this technology: it is both invasive and persuasive.
我自然而然地披上“杀死技术员”的铠甲,准备向这个混蛋发起嘹亮但难以理解的攻击。
I naturally started to don my "kill the technician" armor, preparing for a loud but unintelligible assault on the jerk.
但是你可以运用以下技术来防止ARP攻击。
But you can help prevent ARP attacks using the following techniques.
有一个女人曾经使用类似于MITM攻击的技术抢劫了很多家的很多钱(请参阅参考资料)。
A woman used a technique similar to the MITM attack to rob families out of a lot of money (see Resources).
您还了解了密码破解者如何在内部和外部使用技术攻击您的基础结构。
You also saw how password crackers use techniques both internally and externally to your infrastructure.
您还了解了密码破解者如何在内部和外部使用技术攻击您的基础结构。
You also saw how password crackers use techniques both internally and externally to your infrastructure.
应用推荐