• 根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    youdao

  • 尽管这次威胁看来已经过去,但人们仍然这次攻击严重性留有疑问这次蠕虫制造者受到的惩罚表示好奇。

    Even though the threat seems to have passed, questions remain about just how serious this attack was and if there will be any repercussions for the worm's creator.

    youdao

  • 蠕虫病毒已经试图利用搜索引擎建立准备攻击潜在牺牲者列表

    Worms and viruses have attempted to use the search engine to create lists of potentially vulnerable victims to attack.

    youdao

  • 类型攻击使用系统可能多种方式破坏受到蠕虫病毒感染

    Systems used in this type of attack can be compromised in any number of ways and infected with a worm or virus.

    youdao

  • 赛门铁克报告说蠕虫主要伊朗境内攻击,并且适时出现印度印尼及其国家

    The worm hit primarily inside Iran, Symantec reported, but also in time appeared in India, Indonesia and other countries.

    youdao

  • 结果通常相同蠕虫成为攻击出色的攻击平台。

    The result, generically, is the same: a worm ACTS as an excellent attack vector for an attacker.

    youdao

  • 根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    Under section 1030(a)(5) of the U.S. Computer Fraud and Abuse Act, it’s against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    youdao

  • Labrea一个“粘蜜罐”,可以限定蠕虫端口扫描攻击从而消除它们影响

    Labrea is a honeypot that can tarpit worms and port scanners, thereby nullifying their effect.

    youdao

  • 1120日一的《新闻周刊》报道,特洛伊木马、蠕虫其它令人讨厌病毒已经侵入了无线领域, 也可能正在攻击手机

    Nov. 20, 2006 issue - Trojan horses, worms and other nasty viruses have gone wireless—and could be targeting your cell phone.

    youdao

  • 蠕虫定义如下,蠕虫一个自包含软件组件可以自动执行可识别攻击目标系统漏洞探测操作

    By definition, a worm is a self-contained software component that automatically performs probe actions designed to identify and exploit vulnerabilities on a targeted system.

    youdao

  • 一般情况下,如果在水流过或者遭到饥饿食者攻击时,这种贫毛类蠕虫丢掉它的,但很快长出一个新的头部。

    Generally, if a sudden rushof water or a hungry predator causes a naidid to lose its head, it willsimply grow another one.

    youdao

  • 同样周一,Twitter再次强调尽管蠕虫病毒攻击已经给人们造成困扰,但它们并未成功盗取用户任何帐户信息

    Also on Monday, Twitter again emphasized that while the worm attacks have been a nuisance, they haven't stolen any user account information.

    youdao

  • 通常Web服务器用户输入中移除脚本但是攻击经常利用服务器的弱点绕过这些过滤器从而造成一些重大的攻击,比如说YamannerMySpaceIn蠕虫

    Usually Web servers remove scripts from user input, but often attackers exploit vulnerabilities to bypass these filters, resulting in major attacks such as the Yamanner or MySpace worms.

    youdao

  • BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵

    The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    youdao

  • 最后是三个漏洞个是攻击MicrosoftWord的,一个是利用Microsoft's animated cursor vulnerability漏洞最后利用Microsoft's SQL数据库引擎漏洞的Slammer worm蠕虫

    Three exploits followed: an attack on Microsoft Word, an exploit for Microsoft's animated cursor vulnerability and the Slammer worm, which exploited a flaw in Microsoft's SQL database engine.

    youdao

  • 即使Stuxnet蠕虫病毒爆发前,安全顾问演示过大数量智能电表遭到如何的黑客攻击因此被关闭

    But even before Stuxnet struck, security consultants had shown how large Numbers of smart power meters could be hacked and shut down.

    youdao

  • 7月,另一个名为CodeRed”的蠕虫病毒最终导致了全球运行微软IISWebServer的300,000多台计算机受到攻击

    In July 2001, another worm named "Code Red" eventually exploited over 300,000 computers worldwide running Microsoft's IIS Web Server.

    youdao

  • 智慧城市网络通信过程存在信息安全隐患,主要有木马程序拒绝服务攻击欺骗攻击SQL注入蠕虫病毒

    There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.

    youdao

  • 根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    Under section 1030 (a) (5) of the U. s. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    youdao

  • 这种软件为了保护电脑防止蠕虫病毒攻击而设计

    This software is intended to protect the computers from being attacked by a kind of virus called worm.

    youdao

  • 网络蠕虫作为一种典型互联网攻击手段具有攻击范围广、破坏力强并且难于清除的特点,近来已受到高度的关注。

    Internet worm attacks, as a typical attack method of the Internet, with a wide range of attacks and difficult to remove, recently drew a high degree of attention.

    youdao

  • CGI攻击不同类型病毒蠕虫

    CGI attacks, different types of viruses and worms.

    youdao

  • USB快速检查一个易于使用应用程序有助于保护计算机免受病毒木马蠕虫其他恶意攻击

    USB Quick Check is a small and easy to use application that will help protect your computer against viruses, trojans, worms and other malicious attacks.

    youdao

  • 利用攻击模型蠕虫攻击进行检测

    Carrying the detection on worm attack out by the attack-tree model.

    youdao

  • 禁用代码访问安全性使系统容易受到恶意代码(病毒蠕虫)的攻击

    Disabling code access security makes the system vulnerable to attacks by malicious code such as viruses and worms.

    youdao

  • 禁用代码访问安全性使系统容易受到恶意代码(病毒蠕虫)的攻击

    Disabling code access security makes the system vulnerable to attacks by malicious code such as viruses and worms.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定