Of course, there may be a time when you were malicious access to your computer intrusion, and placed a Trojan horse.
当然,还有一种可能是当你上网时被人恶意侵入了你的计算机,并放置了木马程序。
He (Mark Abene) adhere to a self - styled "hack ethic", which justified any computer intrusion as long as the motive is pure.
他(马克·艾伯尼)坚守自称的“黑客理论”,认为只要是动机纯洁,任何入侵电脑的行为都是正常的。
Via floppy disk, wired and wireless networks, hardware devices such as multi-channel automatic computer intrusion, and continue to spread.
可通过软盘、有线和无线网络、硬件设备等多渠道自动侵入计算机中,并不断蔓延。
Recently the computer-security company RSA (a division of EMC) was penetrated by an intrusion which appears to have stolen the secret sauce behind the company's SecureID.
近期,计算机安全公司RSA(美国EMC分公司)的网络遭到非法侵入,侵入者目的像是要窃取公司安全ID后的秘密系统。
According to a computer virus intrusion system approach can be divided into source virus, computer virus virus, operating system viruses and shell viruses.
按计算机病毒入侵系统的途径可将计算机病毒分为源码病毒、入侵病毒、操作系统病毒和外壳病毒。
The main goal of intrusion detection is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.
入侵检测的主要目标是用于检测非授权误用以及系统内部与外部的入侵行为。
Intrusion tolerance system (ITS) is a new approach of computer security which has slowly emerged during the past decade, and obtained more attention in recent years.
入侵容忍系统(its)是一个新的计算机安全方法,在过去几年中逐渐显现出来,近期引起了许多学者的关注。
Intrusion Detection System (IDS) plays an important role in the field of computer network security, its degree of application has expanded a lot.
入侵检测系统(IDS)在计算机网络安全领域起着举足轻重的作用,应用程度比以前有了很大的扩展。
The main goal of Intrusion Detection system (IDS) is to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders.
入侵检测系统(IDS)的主要目标是检测计算机系统内部或外部入侵者的非授权使用、误用和滥用。
Intrusion detections are the behaviors that someone wants to occupy, seize or destroy other people's computer resource.
网络入侵是指企图占用、偷窃或者毁坏他人的计算机信息资源的行为。
In computer security, an intrusion detector; a thin rubber or vinyl mat, with pressure sensors, used to detect intrusions.
计算机安全用语,指用以检测入侵行动的一种设备,通常是一块带有压力传感器的薄橡皮,或乙烯垫子,用以检测入侵行动。
Intrusion Detection technology is rational supplement of original computer network security system. The application of it considerably strengthens network and system security.
入侵检测技术是对原有计算机网络安全机制的合理补充,它的应用极大地扩展了网络和系统安全的防御纵深。
The intrusion detection system running on each node computer can prune functions which are not necessary and cooperate with others by sharing their analysis work.
运行于节点计算机上的入侵检测系统,具有功能剪裁能力,并且可以通过分担分析工作的方式进行协作。
As the second line of defense for computer and network systems, intrusion detection systems (IDSs) have been deployed increasingly wider.
作为保护计算机和网络系统的第二道防线,入侵检测系统的应用的越来越广泛。
Methods, systems, and computer-readable mediums containing programmed instructions are also disclosed for preventing an intrusion in a communications network.
方法,系统和计算机程序指令包含可读乩还透露,为防止在一个通信网络的入侵。
The intrusion way of over-voltage like lightning into computer (electronic system) was intro- duced, and the protection methods against over-volt- age from circuits and ground were studied.
介绍了雷电等过电压侵入计算机(或电子设备)系统的途径,研究了如何防止由线路和地线进入的过电压。
Intrusion detection technology is one of the hot spots in the information security areas as the important means to insure the computer network information security.
入侵检测技术作为确保计算机网络信息安全的一个重要手段正成为信息安全领域的研究热点之一。
Computer forensic is a dynamic security technology. It collects the proofs of intrusion and finds the source of hacker with the active methods, so it can prevent hacker intrusion effectively.
计算机取证技术是当今一种热门的动态安全技术,它采用主动出击的方法,搜集入侵证据,查出黑客的来源,有效地防范黑客入侵。
Network security can be considered as immunity of a computer, because the mechanism of network intrusion is similar as that of biological viruses in essence.
因为网络入侵检测的机制和生物学上的病毒在本质上是相似的,所以可以把网络安全看作计算机的免疫。
In a modern computer system, intrusion detection system has become an essential component.
在现代计算机系统中入侵检测系统已经变成了一个很重要的组成部分。
Intrusion detection as a new security means is used to detect unwanted attempts at accessing, manipulating, or disabling of computer systems thus can greatly enhance the network security.
入侵检测作为一种全新的安全手段,用于检测对电脑系统非预期的访问、控制和破坏尝试,可以使网络的安全性得到很大的提高。
Intrusion detection is an active defense measure that can monitor the dynamic behavior characteristic of network or computer system and then examine whether there is any intrusion.
入侵检测是监控网络或计算机系统的动态行为特征,并据此判断是否有入侵的主动防御措施。
In this paper, the architecture and the detection principle of adaptive model generation systems are studied, then the adaptive model for intrusion detection of computer network is established.
本文介绍了该模型的体系结构,并对其工作原理进行了分析,在此基础上建立自适应入侵检测模型。
The paper proposes the model of IDS and computer forensic system. It connects intrusion detection and computer forensic.
文中提出了一种入侵检测取证系统模型,它考虑把入侵检测和计算机取证技术结合在一起。
The intrusion detection technique is an important method to insure the computer network security. It is becoming one of hot research topics in information security field.
入侵检测技术作为确保计算机网络信息安全的一个重要手段正成为信息安全领域的研究热点之一。
Information of OS types is very important to the research on intrusion behaviors against computer networks.
操作系统的类型信息对于研究针对计算机网络的入侵行为和安全防护措施是非常重要的。
A liquid-tight strain-relief connector is a special electrical connector or jacket used in cabling for electronic and computer systems where water or contaminant intrusion is a concern.
一个不透液溢放口连接器是一种特殊的电气连接器或夹克在电缆用于电子和计算机系统,水或污染物入侵是一个问题。
Intrusion-detection systems are used to detect unusual activity in a network of computer systems, to identify that activity as unfriendly or unauthorized and to enable a response to that intrusion.
入侵探测系统是用来探测计算机系统网络上不寻常的活动,以识别出此活动是不友好的或者未经授权的,以便能够对此入侵作出响应。
A comprehensive, yet easy to use network protection software, you can ensure that your computer is not by any hacker intrusion.
一个全面,却又简单易用的网络防护软件,可以确保你的计算机不被任何黑客侵扰。
A comprehensive, yet easy to use network protection software, you can ensure that your computer is not by any hacker intrusion.
一个全面,却又简单易用的网络防护软件,可以确保你的计算机不被任何黑客侵扰。
应用推荐