It's Security agents for network Traffic Analysis USES mobile software agents for intrusion detection in a network of computers.
它的“网络流量分析的安全代理”使用了移动的软件代理,检测计算机网络中的入侵。
The extraordinarily high estimate was revealed by the security minister, Baroness Neville-Jones, and reflects the spread of computers into many aspects of domestic and business life.
安全部长内维尔·琼斯男爵夫人透露了这项高得离谱的估计,反映了计算机在家用和商用生活的多方面传播。
Another important component of cyber defense is to improve security on the computers themselves.
网络防御的另外一个重要的方面是提高计算机自身的安全性。
Like many other security updates, this one triggered a wave of attacks presumably coming from people who wanted to exploit vulnerabilities made public on computers not patched.
和许多其它的安全更新一样,该更新通知引发了一波攻击,大概是有些人想利用还没打补丁的计算机上的漏洞。
The way that we assemble complicated networks of computers until recently hasn't been done at all with security in mind except in a cursory way, and that's the fundamental problem.
直到最近还,我们在安装电脑网络时,没有一点安全意识,都是敷衍了事,那才是根本问题所在。
This is a useful security precaution, but if you need to administer your Samba server from another computer or a set of computers, you can specify other addresses.
这是一个非常有用的安全预防措施,但是如果您需要从另一台计算机或一组计算机管理您的Samba服务器,那么您可以指定其他地址。
Windows-based computers utilize two methods for the hashing of user passwords, both having drastically different security implications.
运行Windows的计算机使用两种方法对用户密码创建哈希,这两种方法在本质上有着不同的安全意义。
Because of such security concerns (see chart 8), many firms block access to such sites as Facebook on company computers.
公司出于这样的担心(图8),不让员工从公司电脑访问Facebook等网站。
UNIX's method of handling file systems and volumes provides you with an opportunity to improve your computers' security and performance.
通过利用UNIX处理文件系统和卷的方法可以提高计算机的安全性和性能。
And armed with desktop computers, they uploaded video of Honda Lock's security guards roughing up employees.
他们通过笔记本电脑上传本田保全人员粗暴对待雇员的视频。
They have created a system for testing computer-security networks by making computers themselves simulate the sorts of human error that leave networks vulnerable.
他们设计了一个系统用来测试计算机的安全网络,在这个系统中,计算机将会模拟人类的各种错误行动,正是这些导致了网络的脆弱。
In a security advisory, the company warned of a loophole that could be used by malicious hackers to steal private information or hijack computers.
该公司在一项安全警告中称,一个漏洞有可能会被恶意黑客用来偷窃私人信息或是劫持电脑。
In this article we will investigate 5 of the more important security Settings that need to be audited to protect your computers at the highest level.
本文中,我们将仔细研究windows系统中的5种比较重要的安全设置。监听这些设置能够保证你的系统处在最高安全级别。
The small, embedded computers at the centre of the internet of things do not have as much processingpower or memory as, say, a smartphone, so security software on them tends to berudimentary.
物联网中心的小型嵌入式计算机没有像只能手机那样的多处理能力或内存,所以往往需要安全软件。
For all those who use computers on the network security measures to have sufficient knowledge of it, it is very important.
让所有使用电脑的人对网络安全防护措施有足够的认识,这一点是很重要的。
In considering security, you have to protect your development computers from attacks of malicious code and data corruption, and also protect your servers.
出于安全考虑,您必须保护开发计算机和服务器,使其免受恶意代码的攻击,并防止数据损坏。
However, security is now the third pillar of Intel's philosophy and the company is looking for ways for make computers more secure on a chipset level.
然而,安全是目前英特尔的理念的第三大支柱,而本公司为使计算机更多的芯片组级安全的途径。
With the rapid development of computers and the Internet, information security has received increasing attention.
随着计算机和互联网的飞速发展,信息安全问题越来越受到关注。
Users - both regular staff and members of the information - often disable security features of their computers, because those features slow things down or make the computer more complicated to use.
包括正式员工及懂行的信息技术人员在内的计算机用户通常会关闭电脑安全功能,因为这些功能会让系统变慢,或是电脑更复杂难用。
Examples of other security precautions include disconnecting from public networks, physically securing computers, and so on.
其他的安全防范措施包括与公共网络断开连接、从物理上保证计算机的安全等等。
Additionally, you might want to produce a specific machine policy that considers the security needs of specialized computers, like the servers in your enterprise.
另外,您可能希望创建考虑专用计算机(如企业中的服务器)的安全需求的特定计算机策略。
Along with the comprehensive application of computers and network, many protocols and software which seem to be safe and correct show serious security problems.
随着计算机和网络的广泛应用,很多貌似安全和正确的协议或软件呈现出严重的安全问题,这些问题来自设计和实现等多个方面。
Some of the problems related to computer security technology are discussed here and several methods for ensuring the secure operation of individual computers are illustrated with examples.
本文主要介绍了计算机安全技术所需要注意的一些问题,同时举例说明实现单机运行安全的几种方法。
Even with all those detections, there could be even more unwanted malware going undetected on users' computers, according to researcher Doug Camplejohn, CEO of security firm Mi5 Networks.
甚至与所有这些侦测,则有可能更不受欢迎的恶意软件去未被发现的用户计算机上,根据研究员道格·卡普·雷杰恩,总裁兼首席执行官保安公司的MI5网络。
Computer security experts have cautioned that an Internet worm which infected millions of computers around the world may target PC users with a new variation on April 1.
电脑安全专家近日提醒大家,一种曾在全球入侵数百万台电脑的蠕虫病毒,可能于今年愚人节变种袭击个人电脑用户。
With MasterPass, consumers can avail of payment facilities in a high security framework through computers, tablets or smart phones.
有了MasterPass,消费者可以通过台式机、平板电脑或是智能手机在高安全性的框架内使用支付设备。
With MasterPass, consumers can avail of payment facilities in a high security framework through computers, tablets or smart phones.
有了MasterPass,消费者可以通过台式机、平板电脑或是智能手机在高安全性的框架内使用支付设备。
应用推荐