• Also referred to as TCP session hijacking, a security attack on a user session over a protected network.

    TCP会话劫持,它是保护的网络用户的会话进行安全攻击

    youdao

  • By scanning the protected network actively and gathering necessary information, this system can dynamically configure IDS to improve detection efficiency.

    通过主动扫描保护网络获取有效信息动态地配置入侵检测系统提高检测效率。

    youdao

  • Information gathered by social network applications needs to be protected by policies which control access to information.

    应该使用控制信息访问策略保护社交网络应用程序收集到的信息。

    youdao

  • The network USES a secure RF link, protected through exportable encryption for joint and coalition operations.

    网络使用安全RF链路通过出口加密保护联合作战行动。

    youdao

  • Traditionally structures have been protected by the use of air terminals (Franklin Lightning Rods) and a network of downconductors connecting to an integrated grounding system.

    传统上,我们使用根置于空气中的金属终端富兰克林避雷针一条与集成接地装置在一起的下导线路来保护建筑物

    youdao

  • Typically, when configuring a SEA on a VIOS, you would deploy SEA fail Over to ensure network connectivity was protected in the event of a VIOS failure.

    通常VIOS配置SEA部署SEAFailOver以便在发生VIOS故障保护网络连接

    youdao

  • The cable is owned by the Georgian railway network. It is heavily protected, but landslides or heavy rain may have exposed it to scavengers.

    电缆属于格鲁吉亚铁路网所有。被高度保护的,但是山体滑坡暴雨可能使其被拾荒者发现

    youdao

  • If information is over-protected, the power of the social network is decreased.

    如果信息过度保护,社交网络功能必定减弱。

    youdao

  • The overall management portion must be protected from intrusion at the network level.

    整个管理部分必须受到保护,防止网络入侵

    youdao

  • All MPCs are password protected, run on secure in-house wireless networks and are compatible with common wireless network standards.

    所有MPC都有密码保护有安全措施的内部无线网络中使用,符合公众无线网络标准。

    youdao

  • It is implemented on the host's network interface card and managed by a protected, central policy server located elsewhere on the network.

    主机网络插件实现位于网络其他地方受保护中心策略服务器管理

    youdao

  • GPRS system and service data can be separated and protected through VPN, ensuring the safety of GPRS network and service.

    VPN可以对各种GPRS系统业务数据进行合理分离保护保证GPRS网络和业务的安全

    youdao

  • System security is that the hardware, software and system of the network system are protected, and the system runs normally and reliably.

    系统安全——系统安全网络系统硬件软件及其系统受到保护,系统连续可靠正常运行,网络服务不中断。

    youdao

  • According to the type of network to be protected, boundary protection system adopted and different protection rank, the mode of entering into detection system is ranked either.

    依据保护网络类型采用边界防护系统保护级别采取不同方式入侵检测系统。

    youdao

  • Meanwhile, partially trusted code can be barred from general access to the network and file systems, access to the registry, and other protected resources of the system.

    同时可信代码可以访问网络以及文件系统,访问注册表,以及其他系统保护资源

    youdao

  • With the explosion protected computers and can field bus, the underground control substations and control center can be linked into network.

    采用防爆计算机CAN现场总线井下各控制分站与井上控制中心进行联网

    youdao

  • This network is password protected.

    网络密码保护。

    youdao

  • However, in the online shopping process, the legitimate rights and interests of the network shopping consumers can not be effectively protected due to the lack of the law.

    然而网上购物过程中由于法律缺失,使得网络消费者合法权益不能得到切实的保障

    youdao

  • Therefore, the network should be vested in the property to personal property inside, protected by law.

    因此网络财产应该归属个人财产里面,受到法律保护

    youdao

  • Centralised management provides enterprise level control and management over all disk encryption protected machines Easy to manage any machines on the network with no disruption to users.

    集中管理提供企业级控制管理的所有磁盘加密保护易于管理网络任何机器没有中断用户

    youdao

  • As the technology of network developed fast and the estate of net games sprained up, the fictitious property in the net games needs to be regulated and protected by legislating.

    互联网技术飞速发展网络游戏产业的崛起呼唤立法网络游戏虚拟财产支持保护

    youdao

  • Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.

    针对常见IP地址欺骗、IP路由欺骗、ICM P重定向欺骗、IP劫持网络攻击给予了分析过滤管理模块中给出了防御的方法。

    youdao

  • Users can be protected but do not have to take a long time, and produce large amounts of updated network load.

    用户可以获保护不必长的时间产生大量更新网络负载。

    youdao

  • Thus the security of the digital image on Internet can be protected and the digitisation and the network application of the industry of Packaging and Printing can be accelerated.

    这样包装印刷图像网络传输安全问题得到了初步解决,从而有助于包装印刷业数字网络化的实现。

    youdao

  • The author suggests that the network subject has right of honor as well as realistic subject, and he should be protected by law.

    笔者认为网络主体现实主体一样享有名誉权,受法律保护

    youdao

  • Not only can the network users freely choose their preferred passwords, but the network system can also be protected against replaying by time stamping the password.

    特点是网络用户可以自由选择口令,通过口令增加时间抵抗重放攻击。

    youdao

  • Not only can the network users freely choose their preferred passwords, but the network system can also be protected against replaying by time stamping the password.

    特点是网络用户可以自由选择口令,通过口令增加时间抵抗重放攻击。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定