黑客进入虚拟机之后,他可以使用黑客工具启动恶意的网络扫描攻击活动,并把这些活动伪装成善意的网络扫描。
Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.
IaaS提供商可能不允许基于网络的漏洞扫描,因为他们无法区分善意的网络扫描和攻击活动。
IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.
此外,标准的技术,如基于网络的漏洞扫描通常被IaaS提供商所禁止,原因之一是无法把友好的扫描从攻击者的活动区别开来。
Also, standard tech-niques such as network-based vulnerability scanning are usually forbidden by IaaS providers because, for example, friendly scans can't be distinguished from at-tacker activity.
这种病毒是安装在目标设备的内存中的,一旦病毒在目标设备中安装完成,病毒会马上屏蔽设备的远程通信端口,并开始扫描网络中其它可攻击的目标。
Once installed in the router's memory, the bot blocks remote communication ports and begins to scan the network for other vulnerable machines.
对于防御拒绝服务攻击与端口扫描,我们在网络层与传输层分别采取相应的措施进行防范。
For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.
美国研究人员最近发起了一项研究,要找出互联网上易受攻击的网络设备.他们在扫描过程中发现了近21000台路由器、网络摄像头和VoIP(网络电话)产品。
Researchers scanning the internet for vulnerable embedded devices have found nearly 21, 000 routers, webcams and VoIP products open to remote attack.
总结新扫描技术将持续进化并不断攻击贵网络,探测安全上的漏洞和弱点。
New scanning techniques will continue to evolve and bombard your network, probing for holes and weak spots in your security.
总结新扫描技术将持续进化并不断攻击贵网络,探测安全上的漏洞和弱点。
New scanning techniques will continue to evolve and bombard your network, probing for holes and weak spots in your security.
应用推荐