端口扫描攻击。
端口扫描攻击通过对主机进行系统的结构化扫描来实现。
A port scanning attack is performed through the structured and systematic scanning of a host.
Labrea是一个“粘蜜罐”,可以限定蠕虫和端口扫描攻击,从而消除它们的影响。
Labrea is a honeypot that can tarpit worms and port scanners, thereby nullifying their effect.
黑客进入虚拟机之后,他可以使用黑客工具启动恶意的网络扫描攻击活动,并把这些活动伪装成善意的网络扫描。
Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.
测试结果表明:该系统能比较准确的检测出大部分的扫描攻击,其响应时间优于传统的SNMP方法。
The test results show that: the system can accurately detect most of the scanning attacks, and its response time is better than traditional SNMP.
训练免疫系统识别肿瘤新发或复发初始信号后,它们便能在最早期开始攻击恶性肿瘤,这个时间远早于最好的扫描技术能侦测到这些肿瘤的时间点。
An immune system trained to recognize the first signs of new or recurrent growth can begin to attack malignancies far earlier than the best scans can detect them.
这就使攻击者可以很容易的扫描客户端计算机的未加密通信。
This allows an attacker to easily scan unencrypted traffic from the user's computer.
IaaS提供商可能不允许基于网络的漏洞扫描,因为他们无法区分善意的网络扫描和攻击活动。
IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.
事件中有11%涉及扫描探测并企图获取信息,0.1%是拒绝服务攻击。
Eleven percent involved scans, probes and attempted access and 0.1 percent were denial-of-service attacks.
此外,标准的技术,如基于网络的漏洞扫描通常被IaaS提供商所禁止,原因之一是无法把友好的扫描从攻击者的活动区别开来。
Also, standard tech-niques such as network-based vulnerability scanning are usually forbidden by IaaS providers because, for example, friendly scans can't be distinguished from at-tacker activity.
然后攻击者发送一个充满SACK选项的包,目的是使另一方主机扫描整个队列以处理每个选项。
The attacker then sends a packet full of SACK options designed to force the other host to scan that entire queue to process each option.
微软表示,会对和微软打交道的每家公司进行合法性验证,微软还借助技术对广告和网站进行扫描以减少攻击事件。
Microsoft says it verifies the legitimacy of the companies it does business with and deploys technologies that scan ads and Web sites to mitigate attacks.
在扫描阶段,攻击者可能会利用路径遍历和跨站点脚本;在攻击阶段,黑客可能会利用SQL注入或远程文件包含进行攻击。
An attacker may use directory traversal and cross-site ccripting during a scan phase and then hit it with an SQL injection or an RFI in the exploit phase.
这种病毒是安装在目标设备的内存中的,一旦病毒在目标设备中安装完成,病毒会马上屏蔽设备的远程通信端口,并开始扫描网络中其它可攻击的目标。
Once installed in the router's memory, the bot blocks remote communication ports and begins to scan the network for other vulnerable machines.
对于防御拒绝服务攻击与端口扫描,我们在网络层与传输层分别采取相应的措施进行防范。
For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.
只要具有可从Internet上免费获得的众多端口扫描器之一,任何人都可以轻松实现这种攻击。
This attack can be fairly easily performed with any one of a number of port scanners available freely on the Internet.
攻击者可能使用多种免费软件工具(如angryIPscanner或Nmap)执行一个简单的ping扫描,以获得一个列表。
The attacker may obtain such a list by performing a simple ping sweep using any number of freeware tools, such as Angry IP scanner or Nmap.
漏洞攻击扫描有助于识别操作系统或LotusDomino配置中潜在的安全漏洞。
Vulnerability scanning helps to identify any potential security holes in either the operating system or in the configuration of Lotus Domino.
Metasploit比常规漏洞扫描器更进一步:它支持您研究自己的攻击和交付机制。
Metasploit goes a step beyond regular vulnerability scanners: it provides you the ability to develop your own exploits and delivery mechanisms.
病毒扫描软件需要一个名单病毒签名,以便能够确定病毒的攻击。
A virus scanner requires a list of virus signatures in order to be able to identify viruses.
美国研究人员最近发起了一项研究,要找出互联网上易受攻击的网络设备.他们在扫描过程中发现了近21000台路由器、网络摄像头和VoIP(网络电话)产品。
Researchers scanning the internet for vulnerable embedded devices have found nearly 21, 000 routers, webcams and VoIP products open to remote attack.
当具有攻击性的青年观看某人故意给他人施加痛苦时,扫描就显示来自大脑中与奖赏和愉悦相关的区域的反应。
When the aggressive youths watched people intentionally inflicting pain on another, the scan showed a response in the part of the brain associated with reward and pleasure.
根据多爆炸成型弹丸智能雷攻击坦克顶甲时的运动特性,建立了智能雷扫描轨迹模型。
According to the movement characteristic of multiple explosively formed penetrator (MEFP) intelligent mine attacking to tank top armor, a scan trail model was built.
黑客入侵的一般过程:首先,攻击者随机或者有针对性地利用扫描器去发现互联网上那些有漏洞的机器。
Hackers general process: first, the attacker random or purposeful use scanners to find the Internet those a loophole machine.
该文提出了基于木马的漏洞扫描模型,并对其攻击原理以及关键攻击技术实现作了进一步的研究。
This article proposed scans the model based on wooden horse's crack, and realized to its attack principle as well as the key attack technology has done the further research.
总结新扫描技术将持续进化并不断攻击贵网络,探测安全上的漏洞和弱点。
New scanning techniques will continue to evolve and bombard your network, probing for holes and weak spots in your security.
OS扫描是黑客进行OS漏洞攻击的前奏,实时检测OS扫描是防止系统遭受OS漏洞攻击的重要手段。
OS scanning is the prelude of hacker's attack by using OS vulnerability. Real-time detection of OS scanning is one main measure against hacker's intrusion using OS vulnerabilities.
OS扫描是黑客进行OS漏洞攻击的前奏,实时检测OS扫描是防止系统遭受OS漏洞攻击的重要手段。
OS scanning is the prelude of hacker's attack by using OS vulnerability. Real-time detection of OS scanning is one main measure against hacker's intrusion using OS vulnerabilities.
应用推荐