• 这样军人平民界限的进一模糊是否增加美国本土针对家庭学校攻击

    Would an increasingly sketchy line between warrior and civilian invite attacks on U. S. soil against homes and schools?

    youdao

  • 这样军人平民界限的进一模糊是否增加美国本土针对家庭学校攻击

    Would an increasingly sketchy line between warrior and civilian invite attacks on U.S. soil against homes and schools?

    youdao

  • 系统破坏后,攻击实施以下任一骤——收集数据破坏另一个系统。

    With the system compromised, the attacker carries out whatever the next step may be-whether it's to gather data or compromise another system.

    youdao

  • 除了供应商FUD担心不确定性怀疑影响产品销售确实没有那么攻击工具提供一到位并且不需动脑的欺骗解决方案

    Vendor FUD (fear, uncertainty, and doubt spread to sell product) aside, there are really not that many attack tools that present a complete one-stop, no-brains-required spoofing solution.

    youdao

  • 说,并进一补充道:以色列完全能力制造Stuxnet,而且这样攻击几乎没有任何弊端因为证明病毒制造者是谁几乎可能

    Israel certainly has the ability to create Stuxnet, he adds, and there is little downside to such an attack, because it would be virtually impossible to prove who did it.

    youdao

  • 持枪者攻击了Gamaand Albless医院GT医院,导致更进一恐慌

    Gunmen also attacked Cama and Albless hospital and GT hospital, causing fresh panic.

    youdao

  • 团队使用这些信息建立一个完善攻击行为认知研发方案防止进一攻击

    This team USES the information to build a thorough understanding of the attacker's behaviours and develops methods to prevent further attacks.

    youdao

  • 知道主机哪些端口打开的,对于攻击推断目标主机上可能存在的弱点重要

    Knowing which ports are open on a host is an important first step for an attacker to deduce possible vulnerabilities to the target host.

    youdao

  • 后退了,同时,袭击者攻击也减缓了。

    For a second time, I retreated a step while my attacker relented in his attack.

    youdao

  • 目前这些策略还是研究阶段,并且我们专注下一该如何堵住网络攻击潮水。

    Currently these strategies are the domain of research and we are focused on what we must do next to stem the tide of attack.

    youdao

  • 最近前往加兹他们更进一攻击车子开火之后又突然搜查我的房子

    During a recent visit I had to Qazvin province, they went further in attacking me and opened fire on my car and later raided my house.

    youdao

  • 确定易遭到恶意攻击关键系统资产——无形或者有形

    The first step is to identify critical system assetsintangible or tangiblethat are vulnerable to malicious attacks.

    youdao

  • 第二确定电脑黑客攻击可能恶意攻击漏洞

    The second step is to identify vulnerabilities that a hacker or attacker could maliciously exploit.

    youdao

  • 表示需要识别(有形无形的)关键系统资产,这些资产罪可能受到恶意攻击

    The first step says you need to identify critical system assets-tangible and intangible-that are most likely vulnerable to malicious attacks.

    youdao

  • 世行发言人称,在未清楚该次电脑攻击严重性性质之前,采取这措施是出自“多方面谨慎考虑”。

    A World Bank spokesman said the step had been taken out of “an abundance of caution” until the severity and nature of the cyberattack on the I.M.F. is understood.

    youdao

  • Twitter是不是因为这个原因受到攻击尚不得而知官方博客下午3点40分更新时并未进一透露详情

    Whether that is the aim of this attack on Twitter is not known: the status blog, updated at 3.40pm BST, gives no other details.

    youdao

  • 我们进一假设主机a位于网络192.168.2.0并且攻击数据报发送这个网络网络广播地址而不是某台特定主机。

    Let's further assume that host a is located in network 192.168.2.0, and that the attacker sends the datagram to the network broadcast address of this network instead of to a particular host.

    youdao

  • 攻击 sticky目录以及创建文件受限权限只是

    Sticky directories and limited permissions on the files you create are only the first step.

    youdao

  • 设备操作系统遵循JustEnoughOperatingSystem原则进一减少攻击

    The operating system in the appliance follows "Just Enough operating system" principles to further decrease the attack surface.

    youdao

  • Metasploit常规漏洞扫描器更进一支持研究自己攻击交付机制

    Metasploit goes a step beyond regular vulnerability scanners: it provides you the ability to develop your own exploits and delivery mechanisms.

    youdao

  • 社会工程有关计算机通过向天真的问题,计算机网络用户信息收集往往计算机网络进行恶意攻击

    "Social engineering," the gathering of information about a computer or computer network via questions to naive users, is often the first step in a malicious attack on computer networks.

    youdao

  • 我们希望自己针对SHA - 1完成实际攻击能够进一巩固结论多人意识已经不再安全可靠

    We hope to complete the actual attack against SHA-1 to further consolidate this conclusion, so that more people realize that it is no longer safe and reliable.

    youdao

  • 正如我们已经看到的,航空公司正在十分富有攻击进一降低成本,他们下一认真处理的问题将是GDS费用

    As we have seen, airlines are aggressively looking to further cut costs, and the next area to be seriously tackled will be the GDS fees.

    youdao

  • 有时受侵电脑会被进一用于其他欺诈活动例如网络钓鱼攻击这种攻击往往会说服用户透露银行密码敏感信息

    Compromised computers are sometimes used to further other scams, such as "phishing" attacks that try to persuade users to reveal sensitive information such as bank passwords.

    youdao

  • 堆栈旨在防止引诱攻击;在这种攻击中,受信程度较低的代码调用高度信任的代码,并使用高度信任的代码执行未经授权操作

    The stack walk is designed to help prevent luring attacks, in which less-trusted code calls highly trusted code and USES it to perform unauthorized actions.

    youdao

  • 堆栈旨在防止引诱攻击;在这种攻击中,受信程度较低的代码调用高度信任的代码,并使用高度信任的代码执行未经授权操作

    The stack walk is designed to help prevent luring attacks, in which less-trusted code calls highly trusted code and USES it to perform unauthorized actions.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定