通过跟踪这个恶意程序并获得对入侵者使用的服务器电脑的访问权限,McAfee识别出了72个受危害的公司和组织。
Through tracing this malware and also gaining access to a "command and control" computer server used by the intruders, McAfee identified 72 compromised companies and organisations.
恶意软件正与日俱增(间图二),其典型用途是偷盗密码和其他数据,或者打开电脑的“后门[注4]”以便入侵者控制。
Malware is exploding (see chart 2). It is typically used to steal passwords and other data, or to open a "back door" to a computer so that it can be taken over by outsiders.
我认为恶意软件、蠕虫病毒和其他病毒都会很快入侵平板和手机。
I'd expect to see malware, worms and viruses jump onto tablets and phones.
基于进程行为的入侵检测技术是主机防范入侵和检测恶意代码的重要技术手段之一。
Intrusion Detection based on process 'behaviors is one of the mainstream techniques for defend against intrusion and malicious code.
密码管理器将密码存储于智能卡芯片上,在芯片上具有密码保护和PIN保护功能,所以不易使恶意插件入侵电脑。
Its password manager stores passwords on the smart card chip, where they are encrypted and PIN-protected, and thus not vulnerable to malware infecting the computer.
当它与入侵检测系统联用时,关于恶意软件的行为、数据包捕获和恶意二进制文件本身这些有价值的信息就可以被获得。
When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.
当它与入侵检测系统联用时,关于恶意软件的行为、数据包捕获和恶意二进制文件本身这些有价值的信息就可以被获得。
When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.
应用推荐