At Securosis, we recommend a two-pronged attack, one hard (involving technical controls) and the other softer (process and communication).
我们要说两种形式的攻击,一种比较严重(包括技术控制),另一种温和一些(需要进程和通讯)。
However, because tcpserver doesn't attempt to understand the communication, it is very difficult to attack.
然而,因为tcpserver并不试图理解通讯,所以很难被攻击。
We know that Twitter's architecture has made it more vulnerable to this type of attack than Google or even Facebook, but in situations like this, communication is key.
我们知道Twitter的构架使得Twitter比Google和Facebook更容易遭到攻击,但是在这种情况下,沟通至关重要。
Such an attack could result in loss of communication between the utility and meters-and the subsequent denial of power to your home or business.
这样的攻击可能造成电表与供电设施之间通信的中断——最终造成断电。
And people 'communication, let vie between the people mutually, attack mutually, from Sacrifice other materials and come to be satisfied with themselves.
而人的交流,让人之间相互攀比,相互攻击,从而牺牲其他物质来满足自己。
Two models of statistical attack in anonymous communication system and the quantitative analysis of their attacking abilities are presented in this paper.
提出了匿名通信系统中的两种统计型攻击模型,对两种攻击模型的攻击能力作了定量的分析。
Current anonymous communication systems were analysed and the important attack forms in them were introduced.
在此基础上对于目前不同的匿名通信系统进行了分析和评价,并介绍了重要的攻击形式。
The WEB service secure communication model can satisfy the basic requirements of secure communication, and performs replay attack resistance efficiently.
WEB服务安全通信模型能够满足安全通信的基本要求,并且能够较为高效地抵御重传攻击。
DS, FH or mixing communication system is used in wireless network attack, information transmitted system is used as kernel unit, and many communication means is synthetically used.
主要使用DS、FH或二者混合通信体制,其核心为信息传输系统,可综合采用多种通信手段。
It has features as follows: identity authentication, changeable communication key, secure against active and passive attack.
该方案具有:身份认证、可变密钥、抗主动和被动攻击的优点。
Another type of session hijacking is known as a man-in-the-middle attack, where the attacker, using a sniffer, can observe the communication between devices and collect the data that is transmitted.
另一类会话劫持被叫做中间人攻击,攻击者利用探测程序,可以观测到设备之间的通信,并收集发送出去的数据。
Based on the network communication model and the characters of the worm's propagation, this article gives the attack-tree model of worm.
在网络通信模型的基础上,进一步结合蠕虫传播的特征,本文提出了蠕虫的攻击树模型。
Marketing communication should not unfairly attack or discredit competitors, assault and imitate other brands' names, or imitate the marketing communications of other marketers to mislead consumers.
不应在营销传播活动中诋毁竞争者,不应模仿其他成功品牌的营销传播方式,对消费者产生误导或混淆。
It can resist the leakage of ephemeral secret DH exponent attack while retaining the security of the relative AGKA protocols, and is more efficient in terms of both communication and computation.
该协议除具有相关agka协议的安全性外,还有抗临时秘密指数泄露攻击能力,效率也有所提高。
This paper puts forward a design method of IDL for coordinated attack. The IDL's mode, period, content, and order of communication are discussed in this paper.
提出了一种协同攻击机间互联数据链(IDL)的设计方法,对机间数据链的传输方式、传输周期、传输内容、传输时序等进行了研究。
Nodes attacking is one of the most effective instrumentality to attack the tactical communication network... How to carry out an optimal nodes attack is a puzzled problem for a long time.
节点攻击是战术通信网对抗最有效的手段之一。如何实现最优节点攻击是长期困扰攻击方的难题。
Nodes attacking is one of the most effective instrumentality to attack the tactical communication network... How to carry out an optimal nodes attack is a puzzled problem for a long time.
节点攻击是战术通信网对抗最有效的手段之一。如何实现最优节点攻击是长期困扰攻击方的难题。
应用推荐