Useful information could be abstracted from audit log of computers by most of host-based intrusion detection systems. Therefore, audit system become a target to be compromised by hackers or attackers.
审计日志是多种入侵检测系统的重要信息来源,因而审计系统就成为黑客或攻击者对付的主要目标。
So the effective data transfer method must be taken into account during the design of the embedded testing tool to upload data and reduce the intrusion to the target system as many as possible.
因此,嵌入式分析测试工具在设计上也必须考虑有效的数据上传方法,解决数据信息的传输问题,并且尽量减小对被测程序的影响。
So the effective data transfer method must be taken into account during the design of the embedded testing tool to upload data and reduce the intrusion to the target system as many as possible.
因此,嵌入式分析测试工具在设计上也必须考虑有效的数据上传方法,解决数据信息的传输问题,并且尽量减小对被测程序的影响。
应用推荐