4)盗用口令攻击(Password-Based Attacks) 基于口令的访问控制是一种最常见的安全措施。这意味着我们对某台主机或网络资源的访问权限决定于我们是谁,也就是说,这种访问权...
基于1个网页-相关网页
Password-Based Attacks 盗用口令攻击
flood-based attacks 泛滥式攻击
Histogram-based attacks 直方图攻击
counter sound-based attacks 抵消声基攻击
Beware of Mobile Web-based attacks as well.
要小心对移动手机上网的攻击。
First, it enables you to prevent XML-based attacks.
首先,它能够阻止基于XML的攻击。
Yet, most SSL deployments are susceptible to network-based attacks, because the technology is widely misunderstood.
然而,大多数SSL部署会受到网络攻击的影响,因为这项技术普遍地都认识不清。
Paul Ingram,co-director of the London-based British-American Security Information Council, notes that similar attacks have been going on for years.
VOA: standard.2009.10.18
The Budapest-based European Roma Rights Center,or ERRC, suggests that the attacks to which detained suspects are linked are no isolated incidents.
VOA: standard.2009.08.22
The capture of Kasab and Islamabad's admission that he was a Pakistani citizen has helped India bolster its case that the attacks were planned and executed by a terror group based in Pakistan.
VOA: standard.2009.07.23
应用推荐