这一攻击使用密码破解来渗透攻击者想破坏的系统。
This attack USES password cracking to penetrate the systems that the attacker wants to deface.
一种新的程序旨在对恶意软件施加压力,该程序可以在网络攻击开始之前以禁用,渗透或变换的方法阻止计算机在不知情的情况下成为一个僵尸电脑。
A new program aims to put the squeeze on malicious software that can disable, infiltrate or transform a computer system into an unwitting zombie - before the cyber attack ever materializes.
还有另外一些攻击者完全出于寻求刺激性的挑战目的,想渗透保护良好的系统。
And still other attacks are motivated by the sheer challenge of penetrating a well-secured system.
这个横跨在公海上形状酷似飞机棚的建筑将容纳60艘“攻击型气垫艇”,用来“渗透式登陆作战”。
The hangar-shaped buildings spotted across the international waters will house 60 "attack hovercraft", to be used for "infiltration attacks and landing".
同时他表示,他不知道有任何的关于F - 35的敏感数据已经被网络攻击所渗透。
He said he was not aware of any sensitive F-35 technology having been compromised by a cyber-attack.
通过这种方式,CEH可以获取外部攻击者在尝试渗透环境之前需要了解的实际场景。
In this way, the CEH gets a real-world scenario of what an outside hacker would need to discover before attempting to infiltrate the environment.
安全性和优势是很显著的;例如,渗透到一台虚拟机的攻击者根本没有办法影响另一台虚拟机。
The security and administrative advantages are significant; for instance, there's simply no way for an attacker who's penetrated one virtual machine to affect another.
美国国家安全局需要网络安全专家来强化更新网络防卫,进行“渗透测试”来盘查安全漏洞,密切注意任何网络攻击的迹象。
The NSA needs cyber security experts to harden networks, defend them with updates, do "penetration testing" to find security holes and watch for any signs of cyber attacks.
加州大学河滨分校的科学家已经发现防晒霜中能阻挡紫外线辐射的分子时间一长就会渗透到皮肤里,使体表更容易受紫外线攻击。
Scientists at the University of California at Riverside have found that molecules(6) that block UV radiation in sunscreen can, over time, penetrate(7) into the skin, leaving the outer body vulnerable.
他们不仅使用传统手段收集情报,而且越来越多地部署复杂的技术攻击,利用互联网渗透电脑网络。
They do not only use traditional methods to collect intelligence but increasingly deploy sophisticated technical attacks, using the internet to penetrate computer networks, " he said."
迈克菲最近一项关于资料隐码攻击(一种用来渗透数据库的技术)的调查显示,2011年第一季度50%左右的黑客攻击都是来自中国。
A recent study by McAfee of "SQL injections", a technique used to penetrate databases, showed that around half of the reported attacks in the first quarter of 2011 originated from China.
基于渗透模型的网络攻击路径挖掘方法,通过匹配知识库定义的基本渗透过程,模拟攻击过程中网络安全状态变迁,挖掘可能达到特定攻击目标的攻击路径。
An infiltration model-based attack path analysis method was proposed which can simulate network security state changes and give out attack paths that may lead to certain attack goals.
渗透测试模型是渗透测试的关键技术,但现有的渗透测试模型难以模拟网络攻击过程。
Penetration testing has important actual application value for network security, as a kind of new technique keeping away network security.
渗透测试模型是渗透测试的关键技术,但现有的渗透测试模型难以模拟网络攻击过程。
Penetration testing has important actual application value for network security, as a kind of new technique keeping away network security.
应用推荐