您还了解了密码破解者如何在内部和外部使用技术攻击您的基础结构。
You also saw how password crackers use techniques both internally and externally to your infrastructure.
他们不仅使用传统手段收集情报,而且越来越多地部署复杂的技术攻击,利用互联网渗透电脑网络。
They do not only use traditional methods to collect intelligence but increasingly deploy sophisticated technical attacks, using the internet to penetrate computer networks, " he said."
尽管本文提出的想法是假设性的,但它也许能刺激出各种关于如何用纳米技术攻击其它癌症的新想法。
Although the scenarios outlined in this article are hypothetical, they might stimulate ideas about how other cancers could be attacked using nanotechnology.
请注意,这里没有考虑另一种技术攻击形式:拒绝服务(Denialof Service,DoS)攻击。
Be aware that one other form of technical attack is not considered here: denial of service (DoS) attacks.
请注意,我们没有考虑一种其他形式的技术攻击:拒绝服务(Denialof Service,DoS)攻击。
Note that we will not be considering one other form of technical attack, Denial of Service (DoS) attacks.
这种技术的不同之处是:它既有攻击性,又有说服力。
There's something different about this technology: it is both invasive and persuasive.
我自然而然地披上“杀死技术员”的铠甲,准备向这个混蛋发起嘹亮但难以理解的攻击。
I naturally started to don my "kill the technician" armor, preparing for a loud but unintelligible assault on the jerk.
要防止这些各种形式的攻击,您可以应用许多众所周知的技术。
To prevent these various forms of attack, you can apply a number of well-known techniques.
但是你可以运用以下技术来防止ARP攻击。
But you can help prevent ARP attacks using the following techniques.
这项能攻击单个基因的技术也许会催生应对75%的缺乏任何特殊疗法癌症基因的药物,还包括其他的疾病。
The technique's ability to attack single genes could lead to drugs for the 75 percent of cancer genes that lack any specific treatment, as well as for other illnesses.
但始终要记住,黑客可能远程危害一个应用程序(通过前面的技术),然后利用内部攻击方法来进行更多的危害。
But always remember that a hacker might compromise an application remotely (via the previous techniques), and then leverage internal attack methods to do even more harm.
人类邪恶的一面使得总有人会滥用其计算机技术去实施攻击和入侵,那么就是试图去破坏计算机系统。
That same dark side of human nature ensures that there will always be those who misuse computer technology to attack, intrude, and otherwise attempt to do harm to computer systems.
演习模拟了一次协同网络攻击,目标是信息技术、通信、化学和交通系统与设施。
The exercise simulated a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.
有一个女人曾经使用类似于MITM攻击的技术抢劫了很多家的很多钱(请参阅参考资料)。
A woman used a technique similar to the MITM attack to rob families out of a lot of money (see Resources).
然而,大多数SSL部署会受到网络攻击的影响,因为这项技术普遍地都认识不清。
Yet, most SSL deployments are susceptible to network-based attacks, because the technology is widely misunderstood.
他每天使用不同的工具和技术来攻击网上银行。
He USES different sets of tools and techniques everyday to target an online bank.
SQL注入这种技术使攻击者可以利用应用程序中未仔细检查的输入机会来执行未经授权的SQL命令,而应用程序的本意是使用该输入来构造动态sql查询。
SQL injection is a technique which enables an attacker to execute unauthorized SQL commands by taking advantage of non-scrutinized input opportunities in applications that build dynamic SQL queries.
为了帮助您将这些技术与刚才提到的攻击类别联系起来,我们将使用以下图形解释各种技术。
To help you tie these techniques back to the classes of attack just presented, for each technique we will include the following graphic.
防范DoS攻击需要不同的技术,这超出了应用服务器所能提供的范围。
Preventing DoS attacks require different techniques that go well beyond what an application server can provide.
阻止这种类型的攻击的技术有。
这四个方块加了适当的底纹,以代表这种技术有助于防范的攻击类型
The four squares will be shaded as appropriate to represent the type of attack this technique helps to prevent
通常,程序员会为使用拙劣技术进行的攻击留下后门,如没有严格地定义Web服务所需的输入数据的类型。
Often, programmers will leave the door open to attacks by using poor technique, like not strictly defining the types of data they expect as input to Web services.
Long说:“任何新的技术都使得新的攻击出现。”
"Any new technology allows for a new attack vector," Long said.
您可以使用以下几种技术来阻止iframe片段标识符攻击。
You can use several techniques to prevent iframe fragment-identifier attacks.
单个或多个消息的XML拒绝服务(XDoS),实施攻击的技术包括递归元素、megatag、强制性解析和 XML 流
Single- and multiple-message XML Denial of Service (XDoS) using techniques such as recursive elements, megatags, coercive parsing, and XML flood
“拒绝服务(denial of service)”这种攻击的技术很粗糙,但却具有破坏性。
DDoS攻击是惊人的低技术。
DDoS攻击是惊人的低技术。
应用推荐