目的为网络攻击技术研究策略提供文献依据。
Aim Provide a literature basis for research strategy of the network attack technology.
缓冲区溢出攻击技术是一项十分有效的网络攻击技术。
Buffer overflow attack technology is a very efficient attack technology based on network.
网络隐蔽通道技术是一种被广泛应用的网络攻击技术。
Network covert channel has been widely used for network attack.
信息安全防护是一个博弈过程,黑客攻击技术魔高一尺,防护技术就道高一丈。
Information security is a process of game, hacking technology MoGaoYiChe, protection technology on a high.
这种技术的不同之处是:它既有攻击性,又有说服力。
There's something different about this technology: it is both invasive and persuasive.
要防止这些各种形式的攻击,您可以应用许多众所周知的技术。
To prevent these various forms of attack, you can apply a number of well-known techniques.
阻止这种类型的攻击的技术有。
Long说:“任何新的技术都使得新的攻击出现。”
"Any new technology allows for a new attack vector," Long said.
这种技术常常用于帮助防御基于ARP的中间人攻击。
It can often help prevent ARP-based Man-in-the-Middle attacks.
“拒绝服务(denial of service)”这种攻击的技术很粗糙,但却具有破坏性。
DDoS攻击是惊人的低技术。
与中国过去的攻击的特点相比,此次攻击即复杂,技术又先进。
The attack was complex and technically sophisticated both hallmarks of past attacks attributed to China.
一技术将使低音字面上攻击你引诱?
One Technique That Will Make Bass Literally Attack Your Lure?
这些产品中的优秀技术可在相当长的一段时间内防止攻击。
The good technology in these products can go a long way in preventing vulnerabilities.
信息隐藏分析技术就是对信息隐藏系统进行攻击的技术。
Information hiding analysis is a technology attacking on information hiding system.
但目前电脑黑客的技术,有可能使电脑病毒攻击人类大脑功能成为现实。
However, computer hackers, computer viruses are likely to attack human brain functions become a reality.
但目前电脑黑客的技术,有可能使电脑病毒攻击人类大脑功能成为现实。
However, computer hackers, computer viruses are likely to attack human brain functions become a reality.
应用推荐