最后,提供了有关如何适当保护您自己和您的系统避免可能受到密码破解攻击的一些想法。
Finally, some ideas on how to properly secure yourself and your systems from the possibility of a password cracking attack were offered.
通过并列运行成千上万个处理器,超级计算机不仅仅可以帮助设计武器系统,还可以模拟气候变化,破解密码,甚至帮助开发新的救命药。
By running thousands of processors in parallel supercomputers not only help design weapons systems they also model climate change crack codes and help develop new and life-changing drugs.
通过并列运行成千上万个处理器,超级计算机不仅仅可以帮助设计武器系统,还可以模拟气候变化,破解密码,甚至帮助开发新的救命药。
By running thousands of processors in parallel, supercomputers not only help design weapons systems, they also model climate change, crack codes, and help develop new and life-changing drugs.
因而,管理员必须选择非常难于破解的密码,以免被他人破解而影响系统的安全性。
Hence, administrators must choose a very hard to break password so that nobody can crack it, thus compromising system security.
这一攻击使用密码破解来渗透攻击者想破坏的系统。
This attack USES password cracking to penetrate the systems that the attacker wants to deface.
密码破解是用以描述在使用或不使用工具的情况下渗透网络、系统或资源以解锁用密码保护的资源的一个术语。
Password cracking is a term used to describe the penetration of a network, system, or resource with or without the use of tools to unlock a resource that has been secured with a password.
一旦有密码系统安装,斯托曼就将它破解,然后设为空密码并发邮件告诉同事们。
When a password system was installed, Stallman broke it down, resetting passwords to null strings, then sent users messages informing them of the removal of the password system.
计算:量子密码理论上是无法破解的。但和任何安全系统一样,在实践中其安全度取决于系统里最薄弱的一环。
Computing: Quantum cryptography is unbreakable in theory. But like any security system, in practice it is only as safe as its weakest link.
精通破坏防御计算机系统。使用密码破解模组的必需技能。每级技能增加数据修复的几率5%。
Proficiency at breaking into guarded computer systems. required skill for the use of codebreaker modules. 5% Increase in chance of data retrieval per level %.
旁路攻击是一种新的密码分析方法,其利用了密码设备在运算时泄漏的信息破解密码系统。
Side-channel attack is a new cryptanalysis, and it utilizes the run-time leakages to extract the secret.
旁路攻击是一种新的密码分析方法,其利用了密码设备在运算时泄漏的信息破解密码系统。
Side-channel attack is a new cryptanalysis, and it utilizes the run-time leakages to extract the secret.
应用推荐