• 黑客进入虚拟之后,可以使用黑客工具启动恶意网络扫描攻击活动,并把这些活动伪装善意网络扫描

    Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.

    youdao

  • IaaS提供商可能允许基于网络漏洞扫描因为他们无法区分善意网络扫描攻击活动

    IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.

    youdao

  • 此外标准的技术,基于网络漏洞扫描通常IaaS提供商禁止原因之一是无法友好的扫描攻击者的活动区别开来。

    Also, standard tech-niques such as network-based vulnerability scanning are usually forbidden by IaaS providers because, for example, friendly scans can't be distinguished from at-tacker activity.

    youdao

  • 这种病毒是安装目标设备内存中的,一旦病毒目标设备中安装完成,病毒会马上屏蔽设备的远程通信端口开始扫描网络其它攻击的目标。

    Once installed in the router's memory, the bot blocks remote communication ports and begins to scan the network for other vulnerable machines.

    youdao

  • 对于防御拒绝服务攻击端口扫描我们网络传输分别采取相应措施进行防范。

    For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.

    youdao

  • 美国研究人员最近发起了一项研究,找出互联网上易受攻击网络设备.他们在扫描过程中发现了21000台路由器网络摄像头VoIP网络电话)产品

    Researchers scanning the internet for vulnerable embedded devices have found nearly 21, 000 routers, webcams and VoIP products open to remote attack.

    youdao

  • 总结扫描技术持续进化不断攻击网络探测安全漏洞弱点

    New scanning techniques will continue to evolve and bombard your network, probing for holes and weak spots in your security.

    youdao

  • 总结扫描技术持续进化不断攻击网络探测安全漏洞弱点

    New scanning techniques will continue to evolve and bombard your network, probing for holes and weak spots in your security.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定