根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
尽管这次威胁看来已经过去,但人们仍然对这次攻击的严重性留有疑问,或对这次蠕虫制造者将受到的惩罚表示好奇。
Even though the threat seems to have passed, questions remain about just how serious this attack was and if there will be any repercussions for the worm's creator.
蠕虫与病毒已经试图利用搜索引擎建立准备攻击的潜在牺牲者的列表。
Worms and viruses have attempted to use the search engine to create lists of potentially vulnerable victims to attack.
此类型攻击中使用的系统可能以多种方式被破坏并受到蠕虫或病毒感染。
Systems used in this type of attack can be compromised in any number of ways and infected with a worm or virus.
赛门铁克报告说,蠕虫主要在伊朗境内攻击,并且适时出现在印度、印尼及其他国家。
The worm hit primarily inside Iran, Symantec reported, but also in time appeared in India, Indonesia and other countries.
其结果通常相同:蠕虫成为攻击者出色的攻击平台。
The result, generically, is the same: a worm ACTS as an excellent attack vector for an attacker.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030(a)(5) of the U.S. Computer Fraud and Abuse Act, it’s against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
Labrea是一个“粘蜜罐”,可以限定蠕虫和端口扫描攻击,从而消除它们的影响。
Labrea is a honeypot that can tarpit worms and port scanners, thereby nullifying their effect.
据11月20日一期的《新闻周刊》报道,特洛伊木马、蠕虫和其它令人讨厌的病毒已经侵入了无线领域, 也可能正在攻击你的手机。
Nov. 20, 2006 issue - Trojan horses, worms and other nasty viruses have gone wireless—and could be targeting your cell phone.
蠕虫的定义如下,蠕虫是一个自包含软件组件,可以自动执行可识别和攻击目标系统漏洞的探测操作。
By definition, a worm is a self-contained software component that automatically performs probe actions designed to identify and exploit vulnerabilities on a targeted system.
一般情况下,如果在水流过急或者遭到饥饿掠食者的攻击时,这种贫毛类蠕虫会丢掉它的头,但很快长出一个新的头部。
Generally, if a sudden rushof water or a hungry predator causes a naidid to lose its head, it willsimply grow another one.
同样在周一,Twitter再次强调,尽管蠕虫病毒的攻击已经给人们造成困扰,但它们并未成功盗取用户的任何帐户信息。
Also on Monday, Twitter again emphasized that while the worm attacks have been a nuisance, they haven't stolen any user account information.
通常,Web服务器从用户输入中移除脚本,但是攻击者经常会利用服务器的弱点绕过这些过滤器,从而造成一些重大的攻击,比如说Yamanner或MySpaceIn蠕虫。
Usually Web servers remove scripts from user input, but often attackers exploit vulnerabilities to bypass these filters, resulting in major attacks such as the Yamanner or MySpace worms.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
最后是三个漏洞:一个是攻击MicrosoftWord的,一个是利用Microsoft's animated cursor vulnerability漏洞的,最后是利用Microsoft's SQL数据库引擎漏洞的Slammer worm蠕虫。
Three exploits followed: an attack on Microsoft Word, an exploit for Microsoft's animated cursor vulnerability and the Slammer worm, which exploited a flaw in Microsoft's SQL database engine.
但即使在Stuxnet蠕虫病毒爆发前,安全顾问就演示过大数量的智能电表会遭到如何的黑客攻击,并因此被关闭。
But even before Stuxnet struck, security consultants had shown how large Numbers of smart power meters could be hacked and shut down.
年7月,另一个名为“CodeRed”的蠕虫病毒最终导致了全球运行微软的IISWebServer的300,000多台计算机受到攻击。
In July 2001, another worm named "Code Red" eventually exploited over 300,000 computers worldwide running Microsoft's IIS Web Server.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
根据美国计算机欺诈和滥用法案第1030条(a)(5),故意散布计算机病毒,蠕虫,进行拒绝服务攻击和其他安全入侵的行为是违法的。
Under section 1030 (a) (5) of the U. s. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.
这种软件是为了保护电脑防止蠕虫病毒的攻击而设计的。
This software is intended to protect the computers from being attacked by a kind of virus called worm.
网络蠕虫作为一种典型的互联网攻击手段,具有攻击范围广、破坏力强并且难于清除的特点,近来已受到了高度的关注。
Internet worm attacks, as a typical attack method of the Internet, with a wide range of attacks and difficult to remove, recently drew a high degree of attention.
CGI攻击,不同类型的病毒和蠕虫。
USB快速检查是一个小而易于使用的应用程序,这将有助于保护您的计算机免受病毒,木马,蠕虫和其他恶意攻击。
USB Quick Check is a small and easy to use application that will help protect your computer against viruses, trojans, worms and other malicious attacks.
利用攻击树模型对蠕虫攻击进行检测。
Carrying the detection on worm attack out by the attack-tree model.
禁用代码访问安全性会使系统容易受到恶意代码(如病毒和蠕虫)的攻击。
Disabling code access security makes the system vulnerable to attacks by malicious code such as viruses and worms.
禁用代码访问安全性会使系统容易受到恶意代码(如病毒和蠕虫)的攻击。
Disabling code access security makes the system vulnerable to attacks by malicious code such as viruses and worms.
应用推荐