• Port scanning attack.

    端口扫描攻击

    youdao

  • A port scanning attack is performed through the structured and systematic scanning of a host.

    端口扫描攻击通过主机进行系统结构化扫描来实现

    youdao

  • Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.

    黑客进入虚拟之后,可以使用黑客工具启动恶意网络扫描攻击活动,并把这些活动伪装善意的网络扫描

    youdao

  • IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.

    IaaS提供商可能允许基于网络漏洞扫描因为他们无法区分善意网络扫描攻击活动

    youdao

  • Researchers scanning the internet for vulnerable embedded devices have found nearly 21, 000 routers, webcams and VoIP products open to remote attack.

    美国研究人员最近发起了一项研究,找出互联网上易受攻击的网络设备.他们在扫描过程中发现了21000台路由器、网络摄像头VoIP(网络电话)产品

    youdao

  • For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.

    对于防御拒绝服务攻击端口扫描我们网络传输分别采取相应措施进行防范。

    youdao

  • OS scanning is the prelude of hacker's attack by using OS vulnerability. Real-time detection of OS scanning is one main measure against hacker's intrusion using OS vulnerabilities.

    OS扫描黑客进行OS漏洞攻击前奏实时检测OS扫描是防止系统遭受OS漏洞攻击重要手段

    youdao

  • Less study has been performed on three reading strategies including prediction, word-attack skills, skimming and scanning.

    中职生英语阅读策略中的预测、词汇、略读寻读三类策略研究少。

    youdao

  • Less study has been performed on three reading strategies including prediction, word-attack skills, skimming and scanning.

    中职生英语阅读策略中的预测、词汇、略读寻读三类策略研究少。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定