每天您可能都在使用散列攻击工具,而甚至不知道它。
Every day you probably go to a hash hacking tool and don't even know it.
我还修复了另一种用于清除Windows日志的攻击工具。
The other attack tool I recovered is a log cleaner for Windows.
经过分析,我获取了目前使用最广泛的两种攻击工具,以下对它们进行简短说明。
During the forensic analysis, I acquired two attack tools that were used in almost all cases, so here is a short description of them.
目前,人们通过收集攻击工具或编写攻击脚本来构造攻击测试数据集。
At present, people collect attack tools or develop attack scripts to construct such data.
在攻击工具在工具箱中的集成方式和运行机制等方面做了大量有益的探索。
Explores the integration means and the run mechanism of the tools, which as the ingredient of the toolkit.
报告认为,设计这些电脑攻击工具的目的是“阻挠敌方获得基本信息以开展军事行动的能力”。
The goal of the computer attack tools, the report said, is "to deny an adversary access to information essential to conduct combat operations."
实际上,应该归结于攻击工具包(ATKs)的广泛传播,利用这个能够找到网站的安全漏洞。
Rather, the explosion can likely be attributed to the popularity of Attack Tool Kits (ATKs) - off the shelf programs designed to exploit website security holes.
因此,我对于工作中得出的相关数据分析结果非常的感兴趣,这些数据最近发表在赛门铁克关于攻击工具和恶意站点的报告中。
So, I was especially interested in the results of some related data analysis that I worked on for on the recently released Symantec Report on Attack Kits and Malicious Websites.
除了供应商FUD(担心、不确定性和怀疑影响产品销售)外,确实没有那么多攻击工具提供一步到位并且不需动脑的欺骗解决方案。
Vendor FUD (fear, uncertainty, and doubt spread to sell product) aside, there are really not that many attack tools that present a complete one-stop, no-brains-required spoofing solution.
换句话说,识别攻击的方式,而不是把精力集中在放弃这个工具。
In other words recognise the methods of attack, rather than focus on stopping the tools.
黑客进入虚拟机之后,他可以使用黑客工具启动恶意的网络扫描攻击活动,并把这些活动伪装成善意的网络扫描。
Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.
相反,其领导人攻击特别法庭的调门不断升高,指责该法庭为美国的工具,对传说中以色列制造了这起谋杀的证据不予采信。
Instead, its leaders have attacked the tribunal with growing vigour, accusing it of being an American tool and of ignoring purported evidence of Israel's hand in the killings.
随着攻击的进化,将会有工具辅助代码分析,代码分析可提供信息以帮助您找到存在漏洞的代码行。
As these attacks evolve there will be tools to assist with code analysis that will give information to help you find the lines of code where the vulnerabilities exist.
然而,近来的匿名攻击显示其复杂程度又上了新台阶,通过招募志愿者下载工具来创建“虚拟”僵尸网络,几乎可以让人人成为潜在的黑客。
However, recent anonymous attacks showed a new level of sophistication by recruiting volunteers to download a tool to create a "virtual" botnet, turning almost anybody into a potential hacker.
也就是说,它们只能很好的验证那些工具发行者已知的攻击类型和数量。
That is, the validation they perform is only as good as the number of attack vectors known to the publishers of the tool.
在黑客圈子里,人们向来在一定程度上鄙视“脚本小子”——这些人并不真正了解他们攻击的系统,只知道利用现成的工具。
Within the hacker community there's always been a certain amount of disdain for 'script kiddies' — people who don't really understand the systems they attack but use off-the-shelf tools.
在现实中,当犯罪分子想要入侵别人的银行账户时,他们不必使用密码破解工具——其实,他们只需用钓鱼攻击或者其他方法窃取所需信息即可。
The fact is that when criminals want to gain access to peoples' bank accounts, they don't do it with password-cracking tools - they simply steal the data by phishing or other means.
德尔林称,这两种攻击都是可以学的,只要了解相关的知识和工具就可以做得到。
While the attacks at this point are proof-of-concepts, they could be done if someone has the requisite knowledge and toolkits, said Dearing.
攻击者只要转至工作站并尝试使用HTML编辑工具攻击IIS服务器。
The attacker simply goes to a workstation and tries to attack the IIS server with an HTML editing tool.
他每天使用不同的工具和技术来攻击网上银行。
He USES different sets of tools and techniques everyday to target an online bank.
无需任何工具即可安装使用,足以防御肩扛式火箭筒的攻击。
It can be fitted without any tools and is strong enough to protect against rocket-propelled grenades.
最终挫败这些攻击需要投入自觉的努力、经过培训的人员、有用的工具以及良好的安全制度。
Combating these attacks ultimately requires a conscious effort, trained individuals, useful tools, and sound security policies.
一名优秀的安全分析师还需要使用一种好的审计工具(如tacacs +)来记录攻击。
A good security analyst also needs to employ a good auditing tool, such as Tacacs +, to log attacks.
当试图通过因特网连接到该站点时,攻击者使用一个密码发生器工具(如l0phtcrack),它启动对服务器的蛮力攻击。
When trying to attach over the Internet to the site, the attacker USES a password generator tool, such as L0phtCrack, which launches a brute force attack against the server.
除了要让系统更加安全之外,还有一些工具可以用来判断系统抵挡各种攻击的能力,例如。
Apart from making your system more secure, there are lots of tools you can use to determine your system's ability to withstand any kind of attack. For example.
除了要让系统更加安全之外,还有一些工具可以用来判断系统抵挡各种攻击的能力,例如。
Apart from making your system more secure, there are lots of tools you can use to determine your system's ability to withstand any kind of attack. For example.
应用推荐