• 训练有素的黑客可以伪装攻击来源,让们看上去某个城市实际却是另一个国家

    But well-trained hackers can disguise their origin of attack, making it seem they're in one city when they're actually in another country.

    youdao

  • SARP通过使用专门的映射服务器实现IP地址硬件地址安全映射,可以有效地避免非法用户对地址信息的纂改、重播以及实施ARP伪装攻击

    SARP can realize the safety resolution from IP address to hardware address, thus address information can effectively avoid being distorted and replayed by the illegal us...

    youdao

  • 黑客进入虚拟之后,可以使用黑客工具启动恶意网络扫描攻击活动,并把这些活动伪装善意的网络扫描

    Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.

    youdao

  • 他们可能成为黑客攻击目标攻击手段包括伪装受害者认识通过电子邮件向其发送恶意软件

    They could be targeted by a hacker who could takes steps, including sending malicious software in an email, that appears to come from someone the victim knows.

    youdao

  • 去年特征检测技术问题日渐突出网络攻击越来越多使用代码伪装技术制造出大量的病毒变种,更加重了防病毒分析工作

    The flip side of the problem became evident last year, as online attackers increasingly used obfuscation techniques to produce massive number of variants, taxing antivirus analysts.

    youdao

  • 一旦偷取cookie攻击使用cookie伪装成真正用户

    Once stolen, an attacker can use the cookie to impersonate the user.

    youdao

  • 看起来不是件什么大不了的事,但是攻击基本上是通过伪装合法用户然后取得用户所有权限

    This might not seem like a big deal, but the attacker has essentially masqueraded as a legitimate user and gained all the potential access that the user has.

    youdao

  • 破了彼德伪装并肆机攻击

    He saw right through Peter's disguise and tried to attack him whenever he got a chance.

    youdao

  • 本文主要讨论如何通过网络伪装防御操作系统真正类型及其版本被探测,进而避免遭受针对具体操作系统类型漏洞的攻击

    How to defend detecting of the type and version number of operating system by network masquerade and avoid the attack of operating system hole is researched in this dissertation.

    youdao

  • 基于伪装网络服务监测跟踪攻击行为过程可以有效地研究发现未知攻击方式及其特征

    Camouflaging network service can monitor and track attacks and its processes; also it can find unknown attack and its characters.

    youdao

  • 明白华丽的伪装总是那些年轻易受攻击作用。

    Be aware that these are dressed up to attract the young and vulnerable.

    youdao

  • 他们可能成为黑客的攻击目标。 攻击手段包括伪装受害者认识,通过电子邮件向其发送恶意软件

    They could be targetedby hacker who could takes steps, including sending malicious software in an email that appears tocome from someone the victim knows.

    youdao

  • 他们可能成为黑客的攻击目标。 攻击手段包括伪装受害者认识,通过电子邮件向其发送恶意软件

    They could be targetedby hacker who could takes steps, including sending malicious software in an email that appears tocome from someone the victim knows.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定