• 了解了密码破解者如何在内部外部使用技术攻击基础结构

    You also saw how password crackers use techniques both internally and externally to your infrastructure.

    youdao

  • 他们不仅使用传统手段收集情报而且越来越多地部署复杂的技术攻击利用互联网渗透电脑网络

    They do not only use traditional methods to collect intelligence but increasingly deploy sophisticated technical attacks, using the internet to penetrate computer networks, " he said."

    youdao

  • 尽管本文提出的想法假设性,但也许能刺激出各种关于如何纳米技术攻击其它癌症的新想法。

    Although the scenarios outlined in this article are hypothetical, they might stimulate ideas about how other cancers could be attacked using nanotechnology.

    youdao

  • 注意,这里没有考虑一种技术攻击形式拒绝服务(Denialof Service,DoS)攻击

    Be aware that one other form of technical attack is not considered here: denial of service (DoS) attacks.

    youdao

  • 请注意我们没有考虑一种其他形式技术攻击拒绝服务(Denialof Service,DoS)攻击

    Note that we will not be considering one other form of technical attack, Denial of Service (DoS) attacks.

    youdao

  • 这种技术不同之处是既有攻击有说服力。

    There's something different about this technology: it is both invasive and persuasive.

    youdao

  • 自然而然披上杀死技术”的铠甲准备这个混蛋发起嘹亮难以理解攻击

    I naturally started to don my "kill the technician" armor, preparing for a loud but unintelligible assault on the jerk.

    youdao

  • 防止这些各种形式攻击可以应用许多众所周知技术

    To prevent these various forms of attack, you can apply a number of well-known techniques.

    youdao

  • 但是可以运用以下技术防止ARP攻击

    But you can help prevent ARP attacks using the following techniques.

    youdao

  • 这项攻击单个基因技术也许会催生应对75%缺乏任何特殊疗法癌症基因药物,包括其他疾病

    The technique's ability to attack single genes could lead to drugs for the 75 percent of cancer genes that lack any specific treatment, as well as for other illnesses.

    youdao

  • 始终要记住黑客可能远程危害一个应用程序(通过前面技术),然后利用内部攻击方法进行更多危害

    But always remember that a hacker might compromise an application remotely (via the previous techniques), and then leverage internal attack methods to do even more harm.

    youdao

  • 人类邪恶一面使得有人滥用计算机技术实施攻击入侵,那么就是试图破坏计算机系统

    That same dark side of human nature ensures that there will always be those who misuse computer technology to attack, intrude, and otherwise attempt to do harm to computer systems.

    youdao

  • 演习模拟了一次协同网络攻击,目标是信息技术通信化学交通系统设施

    The exercise simulated a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.

    youdao

  • 有一个女人曾经使用类似MITM攻击技术抢劫很多的很多(请参阅参考资料)。

    A woman used a technique similar to the MITM attack to rob families out of a lot of money (see Resources).

    youdao

  • 然而大多数SSL部署受到网络攻击的影响,因为这项技术普遍都认识不清

    Yet, most SSL deployments are susceptible to network-based attacks, because the technology is widely misunderstood.

    youdao

  • 每天使用不同工具技术攻击网上银行

    He USES different sets of tools and techniques everyday to target an online bank.

    youdao

  • SQL注入这种技术使攻击可以利用应用程序未仔细检查输入机会执行未经授权的SQL命令,而应用程序的本意是使用输入来构造动态sql查询。

    SQL injection is a technique which enables an attacker to execute unauthorized SQL commands by taking advantage of non-scrutinized input opportunities in applications that build dynamic SQL queries.

    youdao

  • 为了帮助这些技术刚才提到攻击类别联系起来,我们使用以下图形解释各种技术

    To help you tie these techniques back to the classes of attack just presented, for each technique we will include the following graphic.

    youdao

  • 防范DoS攻击需要不同技术超出应用服务器提供的范围。

    Preventing DoS attacks require different techniques that go well beyond what an application server can provide.

    youdao

  • 阻止这种类型攻击技术

    Techniques used to prevent this type of attack include.

    youdao

  • 四个方块加了适当的底纹代表这种技术有助于防范攻击类型

    The four squares will be shaded as appropriate to represent the type of attack this technique helps to prevent

    youdao

  • 通常程序员使用拙劣技术进行攻击留下后门没有严格地定义Web服务所需输入数据类型

    Often, programmers will leave the door open to attacks by using poor technique, like not strictly defining the types of data they expect as input to Web services.

    youdao

  • Long说:“任何新的技术使得新的攻击出现。”

    "Any new technology allows for a new attack vector," Long said.

    youdao

  • 可以使用以下几种技术阻止iframe片段标识符攻击

    You can use several techniques to prevent iframe fragment-identifier attacks.

    youdao

  • 单个多个消息XML拒绝服务XDoS),实施攻击技术包括元素megatag强制性解析 XML 流

    Single- and multiple-message XML Denial of Service (XDoS) using techniques such as recursive elements, megatags, coercive parsing, and XML flood

    youdao

  • 拒绝服务(denial of service)”这种攻击技术粗糙但却具有破坏性

    The “denial of serviceattack was crude, but disruptive.

    youdao

  • DDoS攻击惊人的技术

    DDoS attacks are surprisingly low tech.

    youdao

  • DDoS攻击惊人的技术

    DDoS attacks are surprisingly low tech.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定