• 端口扫描攻击

    Port scanning attack.

    youdao

  • 端口扫描攻击通过主机进行系统结构化扫描实现

    A port scanning attack is performed through the structured and systematic scanning of a host.

    youdao

  • Labrea一个“粘蜜罐”,可以限定蠕虫端口扫描攻击从而消除它们影响

    Labrea is a honeypot that can tarpit worms and port scanners, thereby nullifying their effect.

    youdao

  • 黑客进入虚拟之后,可以使用黑客工具启动恶意网络扫描攻击活动,并把这些活动伪装善意的网络扫描

    Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.

    youdao

  • 测试结果表明系统比较准确检测出大部分扫描攻击响应时间优于传统SNMP方法

    The test results show that: the system can accurately detect most of the scanning attacks, and its response time is better than traditional SNMP.

    youdao

  • 训练免疫系统识别肿瘤复发初始信号后,它们便早期开始攻击恶性肿瘤,这个时间最好的扫描技术能侦测到这些肿瘤的时间点。

    An immune system trained to recognize the first signs of new or recurrent growth can begin to attack malignancies far earlier than the best scans can detect them.

    youdao

  • 就使攻击者可以很容易扫描客户端计算机加密通信。

    This allows an attacker to easily scan unencrypted traffic from the user's computer.

    youdao

  • IaaS提供商可能允许基于网络漏洞扫描因为他们无法区分善意网络扫描攻击活动

    IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.

    youdao

  • 事件中有11%涉及扫描探测企图获取信息,0.1%拒绝服务攻击

    Eleven percent involved scans, probes and attempted access and 0.1 percent were denial-of-service attacks.

    youdao

  • 此外标准的技术,基于网络漏洞扫描通常IaaS提供商禁止原因之一是无法友好的扫描攻击者的活动区别开来。

    Also, standard tech-niques such as network-based vulnerability scanning are usually forbidden by IaaS providers because, for example, friendly scans can't be distinguished from at-tacker activity.

    youdao

  • 然后攻击发送充满SACK选项目的是使方主机扫描整个队列处理每个选项

    The attacker then sends a packet full of SACK options designed to force the other host to scan that entire queue to process each option.

    youdao

  • 微软表示微软打交道每家公司进行合法性验证,微软还借助技术广告和网站进行扫描减少攻击事件

    Microsoft says it verifies the legitimacy of the companies it does business with and deploys technologies that scan ads and Web sites to mitigate attacks.

    youdao

  • 扫描阶段攻击可能利用路径遍历站点脚本;攻击阶段,黑客可能会利用SQL注入远程文件包含进行攻击

    An attacker may use directory traversal and cross-site ccripting during a scan phase and then hit it with an SQL injection or an RFI in the exploit phase.

    youdao

  • 这种病毒是安装目标设备内存中的,一旦病毒目标设备中安装完成,病毒会马上屏蔽设备的远程通信端口开始扫描网络其它攻击的目标。

    Once installed in the router's memory, the bot blocks remote communication ports and begins to scan the network for other vulnerable machines.

    youdao

  • 对于防御拒绝服务攻击端口扫描我们网络传输分别采取相应措施进行防范。

    For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.

    youdao

  • 只要具有Internet上免费获得的众多端口扫描之一任何人可以轻松实现这种攻击

    This attack can be fairly easily performed with any one of a number of port scanners available freely on the Internet.

    youdao

  • 攻击可能使用多种免费软件工具(angryIPscannerNmap)执行简单ping扫描,以获得一个列表

    The attacker may obtain such a list by performing a simple ping sweep using any number of freeware tools, such as Angry IP scanner or Nmap.

    youdao

  • 漏洞攻击扫描有助于识别操作系统LotusDomino配置潜在安全漏洞

    Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.

    youdao

  • Metasploit常规漏洞扫描器更进一步支持研究自己攻击交付机制

    Metasploit goes a step beyond regular vulnerability scanners: it provides you the ability to develop your own exploits and delivery mechanisms.

    youdao

  • 病毒扫描软件需要一个名单病毒签名以便能够确定病毒攻击

    A virus scanner requires a list of virus signatures in order to be able to identify viruses.

    youdao

  • 美国研究人员最近发起了一项研究,找出互联网上易受攻击的网络设备.他们在扫描过程中发现了21000台路由器、网络摄像头VoIP(网络电话)产品

    Researchers scanning the internet for vulnerable embedded devices have found nearly 21, 000 routers, webcams and VoIP products open to remote attack.

    youdao

  • 具有攻击青年观看某人故意给他人施加痛苦时扫描显示来自大脑奖赏愉悦相关的区域反应

    When the aggressive youths watched people intentionally inflicting pain on another, the scan showed a response in the part of the brain associated with reward and pleasure.

    youdao

  • 根据爆炸成型弹丸智能攻击坦克运动特性,建立智能雷扫描轨迹模型

    According to the movement characteristic of multiple explosively formed penetrator (MEFP) intelligent mine attacking to tank top armor, a scan trail model was built.

    youdao

  • 黑客入侵一般过程首先攻击随机或者有针对性地利用扫描发现互联网那些漏洞的机器

    Hackers general process: first, the attacker random or purposeful use scanners to find the Internet those a loophole machine.

    youdao

  • 该文提出了基于木马漏洞扫描模型攻击原理以及关键攻击技术实现作了进一步研究

    This article proposed scans the model based on wooden horse's crack, and realized to its attack principle as well as the key attack technology has done the further research.

    youdao

  • 总结扫描技术持续进化不断攻击网络探测安全漏洞弱点

    New scanning techniques will continue to evolve and bombard your network, probing for holes and weak spots in your security.

    youdao

  • OS扫描黑客进行OS漏洞攻击前奏实时检测OS扫描防止系统遭受OS漏洞攻击重要手段

    OS scanning is the prelude of hacker's attack by using OS vulnerability. Real-time detection of OS scanning is one main measure against hacker's intrusion using OS vulnerabilities.

    youdao

  • OS扫描黑客进行OS漏洞攻击前奏实时检测OS扫描防止系统遭受OS漏洞攻击重要手段

    OS scanning is the prelude of hacker's attack by using OS vulnerability. Real-time detection of OS scanning is one main measure against hacker's intrusion using OS vulnerabilities.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定