BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
在短期内,后门相结合的功能,大多数其他类型的木马在一个封装中。
In short, backdoors combine the functionality of most other types of Trojans in one package.
特洛伊木马——这种程序在进入系统时并不复制自己,但可以被用来打开系统的“后门”。
Trojan Horse - a program that doesn't replicate when entering a system but can be effectively used to open 'back doors. '
Rootkit的后门-通常被称为特洛伊木马-通常可以分为两类:本地节目和网络服务。
Rootkit backdoors — often called trojan horses — can typically be divided into two categories: local programs and network services.
Rootkit的后门-通常被称为特洛伊木马-通常可以分为两类:本地节目和网络服务。
Rootkit backdoors — often called trojan horses — can typically be divided into two categories: local programs and network services.
应用推荐