BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
MuDynamics部分,测试了被测系统(SUT)保护网络免受已知木马威胁的能力,甚至是在被测系统打补丁之前。
The MuDynamics unit tested the ability of the system under test (SUT) to protect a network from threats with published threat signatures even before patches are applied.
电子商务便成为了攻击热点,针对网络银行的攻击也更加明显,木马病毒紧盯在线交易环节,从虚拟价值盗窃转向直接金融犯罪。
E-commerce became an attack against the network bank hot spots, the attack also more apparent, Trojan virus staring online trading links from virtual value theft to direct financial crime.
位于僵尸网络中的电脑被一种名为Torpig的木马程序控制,它的目的是窃取Windows用户的隐私及财务信息。
The botnet in question is controlled by Torpig (also known as Sinowal), a malware program that aims to gather personal and financial information from Windows users.
在作为垃圾邮件平台使用网络情况下,木马代理服务器将渗透到受害者的电脑。
In the case of networks used as spamming platforms, a Trojan proxy server will penetrate the victim machines.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
为了在未来的信息战中掌握主动权,研究木马型网络攻击技术具有重要的军事战略意义。
To have the initiative in future weapon of information, will study the wooden horse network attack technology to have the important military strategy significance.
ASP木马其功能强大,隐蔽性强,不易发现,在网络中具有很大的破坏性和危险性,对网站、服务器有很大的威胁。
ASP Trojan horse is powerful, the disguise is strong, difficult to find, has very great destructiveness and dangerous in the Internet, the threat very great to the website and server.
垃圾邮件、网络钓鱼、炒股诈骗、数据窃取、木马和键盘记录器能够为它们的制造者带来巨额的收入。
Spam, phishing, pump-and-dump schemes and data-stealing Trojans and keyloggers can net their creators an enormous amount of income.
绿色网络技术条件(恶意信息、病毒、木马、漏洞、垃圾软件);
The Element of Green Network Technology: Rejection and Block of Malicious Information, Virus, Trojan, System Hole and Software Garbages.
实验结果表明,蠕虫型木马可以在网络攻防中发挥积极作用。
The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.
其主要方式有:网上教授病毒、木马制作技术和各种网络攻击技术;
Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;
网络上充斥了病毒、木马,对正常使用网络的用户造成了巨大的损失。
The internet is full of viruses, Trojans, on the normal use of the network user has caused tremendous losses.
木马作为一种危害性大、隐蔽性高的远程控制工具,是目前比较常用的网络入侵技术。
As a highly dangerous and covert remote control tool, trojan horse is commonly used techniques on network intrusion.
网络“挂马”行为充分利用了互联网的高效便捷的特性,进而提高了利用木马进行网络犯罪的运作效率。
The behavior of "Hanging horse" on the internet fully takes advantage of high efficiency of internet, and has improved the efficiency of committing crimes through internet viruses.
Rootkit的后门-通常被称为特洛伊木马-通常可以分为两类:本地节目和网络服务。
Rootkit backdoors — often called trojan horses — can typically be divided into two categories: local programs and network services.
恶意代码的检测技术主要分为基于主机的和基于网络节点的检测,本文主要研究针对基于主机的高隐藏性木马的检测技术。
Malware detection techniques can be divided into host-based and network-based, this paper mainly focuses on studies of host-based deep hidden Trojan detection techniques.
如今网络黑客窃取数据的花样很多:非法接入、木马攻击、IP欺骗、网页仿冒、僵尸网络、网络嗅探、网址嫁接等。
Now the network hackers to steal data many tricks: illegal access, Trojan attacks, phishing, spoofing, IP Botnet, network sniffer, pharming etc...
本文提出的木马查杀设计思想在该领域是具有一定的指导意义,为计算机网络安全提供了一种全新的探索方法。
The design idea of detecting Trojan which presents in this paper has a guiding significance in the concerned field. This paper introduces a new exploration method for the computer network's security.
木马利用HTTP隧道技术打破网络安全防护设备,给网络安全造成了严重白勺威胁。
Some Trojans use HTTP tunnel to pass through a variety of network security devices, which will pose a serious threat to current network security.
针对该问题,提出一种利用木马操作行为检测网络中HTTP隧道木马的方法。
This paper presents a new method to detect the HTTP tunneling Trojans by using operation behavior characteristics.
去年,我国有超九成网民碰到过网络钓鱼网站,遭遇网络安全事件的网民中77.5%是在网络下载或浏览时遭遇病毒或木马攻击。
More than 90 percent of netizens have encountered a phishing Web site, while 77.5 percent responded that they have received a computer virus while surfing or downloading material online.
去年,我国有超九成网民碰到过网络钓鱼网站,遭遇网络安全事件的网民中77.5%是在网络下载或浏览时遭遇病毒或木马攻击。
More than 90 percent of netizens have encountered a phishing Web site, while 77.5 percent responded that they have received a computer virus while surfing or downloading material online.
应用推荐