• It isn't perfects in the response policy of the network attacks.

    网络入侵行为响应策略完善

    youdao

  • The network attacks based on the source address spoofing have become one of the most grievous threats to the network security.

    基于地址欺骗网络攻击成为当前网络安全主要威胁之一。

    youdao

  • The buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area.

    缓冲区溢出攻击网络攻击事件常用的一种攻击方式,成为系统网络安全中亟待解决重要问题

    youdao

  • Analysis of the impact of service availability in the network attacks lead to abnormal changes in network traffic, based on a host of real-time network flow method to assess the security situation.

    分析影响服务可用性网络攻击导致网络流量异常改变基础,提出了一种主机网络实时流量安全状况评估方法

    youdao

  • That feature was introduced in .NET from the beginning to prevent security attacks coming from network locations.

    当初之所以.NET中引入这个特性为了阻止网络上进行的安全攻击

    youdao

  • Network-based attacks: these attacks rely on low-level access to network packets and attempt to harm the system by altering this traffic or discovering information from these packets.

    基于网络攻击这些攻击依赖于对网络数据包低层访问试图通过修改通信流或者发现这些数据包中的信息危害系统

    youdao

  • The specification does not cover network layer vulnerability information such as network topology, TCP-related attacks, or other network layer issues.

    规范中没有涉及网络漏洞信息比如网络拓扑TCP 相关攻击网络层的其它问题

    youdao

  • This is where that network and system admin you were being nice to earlier is going to save your site... let them do the work of responding to attacks.

    此前与之建立良好合作关系网络系统管理员出面拯救站点的时机……他们来负责采取措施应对攻击

    youdao

  • Many other factors in the environment can affect performance, including network utilization, other programs on the server, denial of service attacks, and tripping over the power cord.

    环境有许多其他因素影响性能包括网络使用率服务器其他程序拒绝服务攻击以及电源线断。

    youdao

  • At the same time, attacks upon networks are increasing very fast, computer criminal events occur quite often, and network securities are seriously threatened.

    之相伴,网络的各类攻击与破坏与日俱增计算机犯罪越来越多,网络安全受到严重威胁。

    youdao

  • These defenses effectively stop any attacks based on the parser making external network connections.

    这些防御措施有效地阻止了基于解析器创建外部网络连接所有攻击

    youdao

  • Availability is assured at the operating system level, allowing for transparent mitigation of active and passive network denial-of-service attacks.

    操作系统确保可用性,可以透明地缓解主动被动网络拒绝服务攻击

    youdao

  • In fact, he notes that within the hacker community, DDoS and similar attacks don't even qualify as true hacking, which involves actually compromising a network, not taking down a site.

    注意到,黑客内部阻断服务攻击以及类似的攻击方式只能算是雕虫小技,甚至还够格被称作真正的“黑”。真正的“黑”是要对网络造成真正的危害而不是暂时关掉一个网站。

    youdao

  • The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.

    BreakingPoint系统提供一个5强度的攻击测试包括了侦测网络蠕虫拒绝服务攻击踩点攻击特洛伊木马后门入侵。

    youdao

  • Alzheimer's disease, for instance, specifically attacks the dark network, stranding many of its victims in an endless now, unable to remember their yesterdays or envision their tomorrows.

    比如说种叫Alzheimer的疾病会专门攻击这个黑暗网络”,导致受害者生活一个无尽的现在”的时间,他们不得昨天无法想象明天

    youdao

  • Why does anyone think criminals won't be able to use the same system to steal bank account and credit card information, use it to launch other attacks or turn it into a massive spam-sending network?

    为什么任何人都觉得犯罪分子不会使用同一个系统来盗取银行账户信用卡信息利用发动其它攻击或者变成巨大垃圾邮件发放网络

    youdao

  • Yet, most SSL deployments are susceptible to network-based attacks, because the technology is widely misunderstood.

    然而大多数SSL部署受到网络攻击的影响,因为这项技术普遍地都认识不清。

    youdao

  • The data transmitted over the network is susceptible to network attacks like snooping the network traffic, non-repudiation, tampering the data, spoofing, hijacking, and capture-replay.

    网络传输数据容易受到各种网络攻击例如嗅探网络传输、不可抵赖性、篡改数据、欺骗拦截捕捉回复。

    youdao

  • The attacks called for meticulous planning and co-operation among an extended network of conspirators, yet apparently took the authorities entirely by surprise.

    恐怖袭击要求密谋之间建立延伸网络,在此基础上他们才能进行精心策划协作。使官方机构惊骇非常。

    youdao

  • The report claimed the network was behind nearly 1, 300 attacks on computers in more than 100 countries.

    报道声称网络100多个国家的电脑上进行过将近1300起袭击

    youdao

  • Wireless hubs make attacks on the shopper's computer network the better choice because most wireless hubs are shipped with security features disabled.

    无线hub使攻击购物者计算机网络成为更好的选择因为大多数无线hub都禁用安全特性

    youdao

  • As well as the social network site-based attacks will increase, causing more infections.

    以网站以及社会网络为基础攻击将会增多引起更多感染

    youdao

  • The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.

    盒子可防护3000中已知的基于内容网络威胁22DoS攻击DDoS攻击

    youdao

  • With the spread of network, attacks on it are more and more serious.

    网络攻击问题随着网络普及日益突出。

    youdao

  • There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.

    智慧城市网络通信过程存在信息安全隐患,主要有木马程序拒绝服务攻击欺骗攻击、SQL注入蠕虫病毒

    youdao

  • One reports that the ISI handed 1, 000 motorcycles to the Haqqani network, thought responsible for most suicide bombings and spectacular attacks in Kabul.

    其中一文件提到,三军情报局将1000辆摩托车交给卡尼组织,人们认为该组织应该喀布尔发动的大多数自杀性爆炸大规模袭击负责。

    youdao

  • Designing network system from the survivability could manage the DoS attacks positively, and provide essential services as long as possible in the presence of attacks and failures.

    生存性角度来设计网络系统可使网络系统受到攻击时,能积极地应对攻击,尽可能长时间提供关键服务

    youdao

  • With the popularity of the Internet of things, equipment virtualization, the scale of network attacks will be growing, means of attack will be more and more, the impact will be more serious.

    随着物联网设备虚拟化普及网络攻击规模越来越大,攻击手段也会越来越多,造成的影响会越来越严重

    youdao

  • With the popularity of the Internet of things, equipment virtualization, the scale of network attacks will be growing, means of attack will be more and more, the impact will be more serious.

    随着物联网设备虚拟化普及网络攻击规模越来越大,攻击手段也会越来越多,造成的影响会越来越严重

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定