• 攻击使用密码破解渗透攻击破坏系统

    This attack USES password cracking to penetrate the systems that the attacker wants to deface.

    youdao

  • 新的程序旨在恶意软件施加压力程序可以网络攻击开始之前禁用渗透变换的方法阻止计算机在不知情的情况下成为僵尸电脑。

    A new program aims to put the squeeze on malicious software that can disable, infiltrate or transform a computer system into an unwitting zombie - before the cyber attack ever materializes.

    youdao

  • 还有另外一些攻击者完全出于寻求刺激性挑战目的,想渗透保护良好系统

    And still other attacks are motivated by the sheer challenge of penetrating a well-secured system.

    youdao

  • 这个横跨公海上形状酷似飞机棚的建筑容纳60艘“攻击气垫艇”,用来渗透登陆作战”。

    The hangar-shaped buildings spotted across the international waters will house 60 "attack hovercraft", to be used for "infiltration attacks and landing".

    youdao

  • 同时表示,他知道有任何关于F - 35敏感数据已经网络攻击渗透

    He said he was not aware of any sensitive F-35 technology having been compromised by a cyber-attack.

    youdao

  • 通过这种方式CEH可以获取外部攻击者在尝试渗透环境之前需要了解实际场景

    In this way, the CEH gets a real-world scenario of what an outside hacker would need to discover before attempting to infiltrate the environment.

    youdao

  • 安全性优势很显著的;例如渗透虚拟攻击根本没有办法影响另一台虚拟机。

    The security and administrative advantages are significant; for instance, there's simply no way for an attacker who's penetrated one virtual machine to affect another.

    youdao

  • 美国国家安全局需要网络安全专家强化更新网络防卫进行渗透测试”来盘查安全漏洞,密切注意任何网络攻击迹象

    The NSA needs cyber security experts to harden networks, defend them with updates, do "penetration testing" to find security holes and watch for any signs of cyber attacks.

    youdao

  • 加州大学河滨分校科学家已经发现防晒霜中能阻挡紫外线辐射分子时间一长就会渗透皮肤里,使体表容易受紫外线攻击

    Scientists at the University of California at Riverside have found that molecules(6) that block UV radiation in sunscreen can, over time, penetrate(7) into the skin, leaving the outer body vulnerable.

    youdao

  • 他们不仅使用传统手段收集情报而且越来越多地部署复杂的技术攻击利用互联网渗透电脑网络

    They do not only use traditional methods to collect intelligence but increasingly deploy sophisticated technical attacks, using the internet to penetrate computer networks, " he said."

    youdao

  • 迈克菲最近项关于资料隐攻击(一种用来渗透数据库技术)调查显示,2011年一季度50%左右黑客攻击都是来自中国

    A recent study by McAfee of "SQL injections", a technique used to penetrate databases, showed that around half of the reported attacks in the first quarter of 2011 originated from China.

    youdao

  • 基于渗透模型的网络攻击路径挖掘方法,通过匹配知识库定义的基本渗透过程,模拟攻击过程中网络安全状态变迁,挖掘可能达到特定攻击目标攻击路径

    An infiltration model-based attack path analysis method was proposed which can simulate network security state changes and give out attack paths that may lead to certain attack goals.

    youdao

  • 渗透测试模型是渗透测试关键技术,但现有的渗透测试模型难以模拟网络攻击过程。

    Penetration testing has important actual application value for network security, as a kind of new technique keeping away network security.

    youdao

  • 渗透测试模型是渗透测试关键技术,但现有的渗透测试模型难以模拟网络攻击过程。

    Penetration testing has important actual application value for network security, as a kind of new technique keeping away network security.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定