• BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵

    The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    youdao

  • MuDynamics部分,测试了被测系统SUT保护网络免受已知木马威胁能力甚至是在被测系统打补丁之前

    The MuDynamics unit tested the ability of the system under test (SUT) to protect a network from threats with published threat signatures even before patches are applied.

    youdao

  • 电子商务便成为攻击热点针对网络银行攻击更加明显木马病毒紧盯在线交易环节虚拟价值盗窃转向直接金融犯罪

    E-commerce became an attack against the network bank hot spots, the attack also more apparent, Trojan virus staring online trading links from virtual value theft to direct financial crime.

    youdao

  • 位于僵尸网络中的电脑种名为Torpig木马程序控制目的是窃取Windows用户的隐私财务信息

    The botnet in question is controlled by Torpig (also known as Sinowal), a malware program that aims to gather personal and financial information from Windows users.

    youdao

  • 作为垃圾邮件平台使用网络情况木马代理服务器渗透受害者电脑

    In the case of networks used as spamming platforms, a Trojan proxy server will penetrate the victim machines.

    youdao

  • 智慧城市网络通信过程存在信息安全隐患,主要有木马程序拒绝服务攻击欺骗攻击、SQL注入蠕虫病毒

    There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.

    youdao

  • 为了未来信息战掌握主动权研究木马网络攻击技术具有重要军事战略意义

    To have the initiative in future weapon of information, will study the wooden horse network attack technology to have the important military strategy significance.

    youdao

  • ASP木马功能强大隐蔽性不易发现网络具有很大破坏性危险性网站服务器有很大威胁

    ASP Trojan horse is powerful, the disguise is strong, difficult to find, has very great destructiveness and dangerous in the Internet, the threat very great to the website and server.

    youdao

  • 垃圾邮件网络钓鱼炒股诈骗、数据窃取木马键盘记录器能够它们制造者带来巨额的收入

    Spam, phishing, pump-and-dump schemes and data-stealing Trojans and keyloggers can net their creators an enormous amount of income.

    youdao

  • 绿色网络技术条件(恶意信息病毒木马漏洞垃圾软件);

    The Element of Green Network Technology: Rejection and Block of Malicious Information, Virus, Trojan, System Hole and Software Garbages.

    youdao

  • 实验结果表明蠕虫木马可以网络攻防发挥积极作用

    The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.

    youdao

  • 主要方式网上教授病毒木马制作技术各种网络攻击技术;

    Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;

    youdao

  • 网络充斥病毒木马正常使用网络用户造成巨大的损失

    The internet is full of viruses, Trojans, on the normal use of the network user has caused tremendous losses.

    youdao

  • 木马作为一种危害性大隐蔽性远程控制工具目前比较常用网络入侵技术

    As a highly dangerous and covert remote control tool, trojan horse is commonly used techniques on network intrusion.

    youdao

  • 网络行为充分利用互联网高效便捷的特性,进而提高了利用木马进行网络犯罪的运作效率

    The behavior of "Hanging horse" on the internet fully takes advantage of high efficiency of internet, and has improved the efficiency of committing crimes through internet viruses.

    youdao

  • Rootkit的后门-通常被称为特洛伊木马-通常可以分为本地节目网络服务

    Rootkit backdoorsoften called trojan horses — can typically be divided into two categories: local programs and network services.

    youdao

  • 恶意代码检测技术主要分为基于主机基于网络节点的检测,本文主要研究针对基于主机的高隐藏木马的检测技术。

    Malware detection techniques can be divided into host-based and network-based, this paper mainly focuses on studies of host-based deep hidden Trojan detection techniques.

    youdao

  • 如今网络黑客窃取数据花样很多非法接入木马攻击IP欺骗、网页仿冒僵尸网络网络嗅探网址嫁接

    Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...

    youdao

  • 本文提出木马查杀设计思想领域是具有一定指导意义计算机网络安全提供了一种全新的探索方法

    The design idea of detecting Trojan which presents in this paper has a guiding significance in the concerned field. This paper introduces a new exploration method for the computer network's security.

    youdao

  • 木马利用HTTP隧道技术打破网络安全防护设备网络安全造成严重白勺威胁

    Some Trojans use HTTP tunnel to pass through a variety of network security devices, which will pose a serious threat to current network security.

    youdao

  • 针对问题,提出利用木马操作行为检测网络HTTP隧道木马方法

    This paper presents a new method to detect the HTTP tunneling Trojans by using operation behavior characteristics.

    youdao

  • 去年,我国超九成网民碰到过网络钓鱼网站,遭遇网络安全事件的网民中77.5%网络下载浏览遭遇病毒木马攻击。

    More than 90 percent of netizens have encountered a phishing Web site, while 77.5 percent responded that they have received a computer virus while surfing or downloading material online.

    youdao

  • 去年,我国超九成网民碰到过网络钓鱼网站,遭遇网络安全事件的网民中77.5%网络下载浏览遭遇病毒木马攻击。

    More than 90 percent of netizens have encountered a phishing Web site, while 77.5 percent responded that they have received a computer virus while surfing or downloading material online.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定