他说,组织的名字并不重要,他们仍然有能力实施攻击。
'the name of the group is not important. They still have the capability,' he said.
非授权访问,实施攻击的技术包括目录攻击和伪造消息。
Unauthorized access using techniques such as dictionary attack and falsified message.
系统损害,实施攻击的技术包括破坏内存空间或xml病毒。
System compromise using methods such as memory space breach or XML virus.
现代空袭是以波次为单位实施攻击的,提出波次规划的概念。
The concept of round attack planning is proposed, because modern air attack is in round unit.
他的踢球风格与我很类似,他很会阅读比赛,并找寻空挡实施攻击。
He is similar to me in the way he plays, as he reads the play and attacks the Spaces.
另一个问题是默认配置存在一些安全漏洞,很容易被黑客用来实施攻击。
Another problem is that the default configurations leave security holes that hackers can exploit.
大约在Bob实施攻击一分钟之后,我注意到信息包逐渐占满了上行链路。
About a minute or so after Bob begins his attack, I notice that my uplinks start becoming saturated with packets.
在战术行动中,指挥官以火力在阵地全纵深上对敌两翼、后方和支援梯队实施攻击。
In tactical actions, commanders fight the enemy throughout the depth of their positions with fires and attacks on the enemy's flanks, rear, and support echelons.
人类邪恶的一面使得总有人会滥用其计算机技术去实施攻击和入侵,那么就是试图去破坏计算机系统。
That same dark side of human nature ensures that there will always be those who misuse computer technology to attack, intrude, and otherwise attempt to do harm to computer systems.
要是三艘快艇其中一条控制了货船,并认为人质在海盗的控制之下,海盗就不会实施攻击行为。
If a vessel attached to one of the three main flotillas believes that pirates have hostages under their control, it is under orders not to launch an attack.
这些攻击类型是最危险的,因为它们要求的技能很少,并且只要有可用的IP连接,就可以从很远的距离实施攻击。
These types of attacks are the most dangerous because they usually require the least skill and can be done from a great distance as long as IP connectivity is available.
其任务是突入苏联在中欧的严密的防空体系,对重要目标和防空系统(雷达、指挥中心和导弹发射架)实施攻击。
The mission it was designed for was to penetrate thick Soviet air defenses in central Europe and attack key targets and air defense systems (radars, command centers, and missile launchers).
雅文大撤退期间,悲剧降临多登纳将军,他的儿子弗拉德·多登纳在对超级歼星舰“执行者号”实施攻击疾飞时阵亡。
Tragedy struck General Dodonna during the Yavin evacuation, as his son Commander Vrad Dodonna was killed during an attack run on the Super Star Destroyer Executor.
这些攻击类型是最危险的,因为它们需要的技能往往很少,并且只要有可用的IP连接,就可以从很远的距离实施攻击。
These types of attacks are the most dangerous, as they usually require the least skill and can be done from a great distance as long as IP connectivity is available.
注意:通过以上设置,这个编队需要一个回合移动到可打击范围内并且在下一个回合的夜晚阶段以最高速度实施攻击。
Note: With the above settings, this TF will take a turn to move within striking range and then during the next turn 's night phase, rush in at full speed to make the attack.
为了保证射击的精度和缩短作战反应时间,舰炮对远程岸上目标实施攻击时需要实时获取炸点相对于目标的偏差情况。
In order to ensure the accuracy of firing and to shorten the operational reaction time, while performing ship-to-shore gun fire, naval gun needs to obtain the real-tine bias data of burst points.
与此同时,这些重要的信息网络系统面临入侵攻击的威胁,而操作系统和应用服务程序的漏洞正是攻击者实施攻击的基础。
Meanwhile, these important information network systems face the threat attacked in invasion, and the loophole of operating systems and applications is the foundation of attack implemented by attacker.
文章介绍了攻击树模型,提出了一种基于攻击树的网络攻击系统,它可以根据目标的实际情况制定出攻击策略,实施攻击。
This paper introduces the attack tree model, presents a network attack system based on attack tree, which can make attack scenario base on the target's practice and do it.
单个或多个消息的XML拒绝服务(XDoS),实施攻击的技术包括递归元素、megatag、强制性解析和 XML 流
Single- and multiple-message XML Denial of Service (XDoS) using techniques such as recursive elements, megatags, coercive parsing, and XML flood
信息战是现代战争中重要作战样式,网络战是信息战的重要组成部分,分布式、网络化的计算机系统是信息作战中实施攻击与防护首要作战目标。
Information warfare is the major operation mode in modern wars, in which network war take an important part. Distributed and network computer system is the chief target in attack and defense.
对于希望实施拒绝服务攻击的黑客,这是一个有吸引力的目标。
This is an attractive target for hackers who may decide to carry out a denial of service attack.
其它攻击者向有效的AT M添加硬件,实施相同的攻击并取得了成功。
Other attackers have added hardware to valid ATMs to apply the same attacks with real success.
系统被破坏后,攻击者将实施以下任一步骤——收集数据或破坏另一个系统。
With the system compromised, the attacker carries out whatever the next step may be-whether it's to gather data or compromise another system.
巴基斯坦的将军们称他们新的战术武器可以应对印度于2004年开始实施的“冷启动”作战理论带来的威胁,该理论倡导针对巴基斯坦发动的虽然传统但迅速猛烈的攻击。
Pakistan's generals say their new tactical weapons will meet a threat from India's Cold Start doctrine, adopted in 2004, that calls for rapid, punitive, though conventional thrusts against Pakistan.
对于Web上托管的应用程序、Web站点以及服务,其中相当一部分都会遭遇到意图实施某类攻击的黑客带来的破坏。
Of the applications, Web sites, and services hosted on the Web, more than a fair share will experience some sort of mischief at the hands of a hacker intent on carrying out some sort of attack.
大多数情况下,这些自动进行的攻击由黑客社区中技能水平最低的人来实施——即所谓的脚本kiddy。
In most cases, these automated attacks are launched by those with the lowest skill levels of the hacker community-those known as script kiddies.
作为测试的攻击是在宏达公司的Android-basedLegendandDesire手机上实施的,但是他相信在其他的Android手机上也一样可以。
The test attacks were conducted on HTC Corp's Android-based Legend and Desire phones, but he believed it could be conducted on other Android phones.
他在履行他的工作,他不恨他杀死的那些人,他不是在对他们实施报复,他杀他们不是因为他们妨碍他,威胁他或者是攻击他。
He's doing his work, he doesn't hate the people he executes, he's not taking revenge on them, he's not killing them because they're in his way or threatening him or attacking him.
到目前为止,因涉嫌参与LulzSec 和Anonymous集团实施的网络黑客攻击的犯罪人已有10人被警方抓获,并且都是来自英国的男性。
Police have so far arrested 10 people in the UK, all male, in connection with online attacks carried out by the LulzSec and Anonymous groups.
到目前为止,因涉嫌参与LulzSec 和Anonymous集团实施的网络黑客攻击的犯罪人已有10人被警方抓获,并且都是来自英国的男性。
Police have so far arrested 10 people in the UK, all male, in connection with online attacks carried out by the LulzSec and Anonymous groups.
应用推荐