修改真实的恶意代码来绕开防病毒软件没能让很多安全厂商高兴。
The modification of actual malicious code to bypass antivirus has not pleased many security-software vendors.
由于数字签名方案无法保证谁是经签名的消息的目标接收方,那么也就没有人能确定恶意方声明的真实性。
Because the digital signature scheme guarantees nothing about who is the intended recipient of the signed message, nobody can determine whether the malicious party's claim is true or not.
由于数字签名方案无法保证消息被发送方签名并发送的次数,那么也就没有人能确定恶意接收方声明的真实性。
Because the digital signature scheme guarantees nothing about how many times the message was signed and sent by the sender, nobody can determine whether the malicious recipient's claim is true or not.
他恶意的言词揭露出他真实的自我。
这个一般是由于有一些恶意的客户试图通过代理服务器去访问一些网站,并且不会显示他的真实位置。
This is usually the result of malicious clients trying to exploit open proxy servers to access a website without revealing their true location.
安全电子邮件病毒和其他恶意软件可能隐藏在您的电子邮件无法打破的沙箱,无法感染你真实的系统。
Secure E-mail: Viruses and other malicious software that might be hiding in your email can't break out of the sandbox and can't infect your real system.
恶意篡改文件的类型属性以掩盖文件真实结构达到诱骗用户访问、回避检测、隐藏数据等目的是计算机犯罪行为中最常用的手段。
Malicious tampering with the type of document to conceal identity documents so as to entice users to visit real structure, avoiding detection and hiding data is the most common computer crime means.
这有两层含义:首先是防盗用,即登录的员工是否真实?这一关把住了,可有效拒绝绝大多数恶意破坏行为;
This has two meanings: It is guard against theft above all with, is the stuff that logins namely real?This closes lived, can rejecting great majority ill will effectively to destroy behavior;
这样的“行骗”过程,听起来好像会导致真实犯罪。但是杜马斯似乎并无恶意,只是出于好奇。
This deception may sound like a lead-up to a true-crime story, but Dumas's exploits appear to be harmless, done in a spirit of curiosity.
合理查证是判断事实是否诽谤的基本标准,我国不宜引进真实恶意原则。
Rational investigation is the basic criterion for judging whether the facts constitute defamation, hence it is not proper to introduce the principle of actual malice in China.
毫无恶意,你的真实朋友,是彼得·福求。
分析及仿真实验结果表明,该模型可以有效地识别恶意节点,提高P2P网络的服务质量。
Theoretical analyses and simulation experiments show that the proposed model can distinguish malicious peers and can improve the quality of service in P2P networks efficiently.
最后,在仿真实验中模拟了现实环境中恶意用户的攻击过程,来测试该信誉模型防御SPIT攻击的性能情况。
At last, the thesis USES a simulation experiment which simulates the real environment of malicious voice attack to test the SPIT filter performance of the reputation module.
目前,电信运营企业通过分析欠费详单,查证恶意欠费人员的真实身份,追缴欠费以成为其正常经营活动的重要组成部分。
Currently, telecom operators of communications through a single detail, to verify the true identity of delinquent officers of its normal business activities to become an important part.
目前,电信运营企业通过分析欠费详单,查证恶意欠费人员的真实身份,追缴欠费以成为其正常经营活动的重要组成部分。
Currently, telecom operators of communications through a single detail, to verify the true identity of delinquent officers of its normal business activities to become an important part.
应用推荐