端口扫描攻击。
A port scanning attack is performed through the structured and systematic scanning of a host.
端口扫描攻击通过对主机进行系统的结构化扫描来实现。
Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.
黑客进入虚拟机之后,他可以使用黑客工具启动恶意的网络扫描攻击活动,并把这些活动伪装成善意的网络扫描。
IaaS providers may not allow network-based vulnerability scanning because they have no way of distinguishing friendly network scans from attack activity.
IaaS提供商可能不允许基于网络的漏洞扫描,因为他们无法区分善意的网络扫描和攻击活动。
Researchers scanning the internet for vulnerable embedded devices have found nearly 21, 000 routers, webcams and VoIP products open to remote attack.
美国研究人员最近发起了一项研究,要找出互联网上易受攻击的网络设备.他们在扫描过程中发现了近21000台路由器、网络摄像头和VoIP(网络电话)产品。
For defending denial of service attack and ports scanning, we adopt corresponding measures in network layer and transport layer.
对于防御拒绝服务攻击与端口扫描,我们在网络层与传输层分别采取相应的措施进行防范。
OS scanning is the prelude of hacker's attack by using OS vulnerability. Real-time detection of OS scanning is one main measure against hacker's intrusion using OS vulnerabilities.
OS扫描是黑客进行OS漏洞攻击的前奏,实时检测OS扫描是防止系统遭受OS漏洞攻击的重要手段。
Less study has been performed on three reading strategies including prediction, word-attack skills, skimming and scanning.
而对中职生英语阅读策略中的预测、词汇、略读与寻读三类策略研究的更少。
Less study has been performed on three reading strategies including prediction, word-attack skills, skimming and scanning.
而对中职生英语阅读策略中的预测、词汇、略读与寻读三类策略研究的更少。
应用推荐