ESET病毒实验室从云端得到实时威胁相关的信息,保持信誉服务能够维持最新对抗互联网威胁防护。
Based on real-time streaming of threat-related information from the cloud, the ESET Virus lab keeps the reputation services up-to-date for a constant level of protection against Internet threats.
化学威胁需要不同的防护手段,因为化学品以雾或蒸气的形式存在,微粒过滤器对它们无效。
A chemical threat needs a different approach, because chemicals come as mists or vapors that are largely immune to particulate filtration.
该设备的IPS可防护超过3000种已知威胁,并包含有协议异常分析。
The Fortinet UTM's IPS protects against more than 3,000 known threats and includes protocol anomaly analysis.
因为他们住在曼哈顿地区的一道为防止水面上升,威胁人们安全的防护墙后面。
They crave a view of nature because the Manhattan they live in sits partly behind a wall, a barricade built to block rising waters.
该盒子可防护3000中已知的基于内容和网络的威胁、22类DoS攻击及DDoS攻击。
The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.
普金认为这样可以更好地防护伊朗的导弹威胁,并且俄罗斯也不会像曾经威胁地那样将核弹头瞄准欧洲。
Mr Putin said this would offer better protection from Iranian missiles, and that Russia would no longer have to aim its warheads at Europe, as he had threatened.
感觉到的意思真正个人防护同“提交国家”特征—最快的也许响应站病毒威胁。
Feel the meaning of Real Personal Protection with the "Submit State" feature-the fastest possible responder to virus threats.
为加强网络的安全稳定运行,特将当前互联网的主要安全威胁及防护策略加以分析。
To enhance the sa fe and stable operation of the network, th is paper describes thema jor security threats and protection strategy of Interne.
在分析无线网络所面临的各种安全威胁的基础上,讨论了构建无线网络安全防护体系的原则和方法。
Based on analyzing various security threats faced by the wireless network, this paper discusses on the principles and methods for constructing the wireless network security protection system.
为了减少敌方武器的威胁,根据敌方武器的构造和工作原理,利用其弱点,可采取综合防护战、多层截击战、摧毁破袭战等多种防范方法。
In order to reduce the threat of foetal weapon, by use of foetal weapons failing, we can adopt many methods such as synthetic defense, multi-layer volley, destroy and smash weapon, and so on.
长输管道腐蚀问题日趋严重,防护层存在的破损、剥离等缺陷对管道安全运行构成极大威胁。
The deterioration of corrosion of long-distance pipeline, the damages and spalling of protecting layer have imposed great threats to the reliable operation of pipeline.
对于当前混合型攻击层出不穷的安全威胁,传统的基于单一设备的网络安全防护技术己显得无能为力了。
For the current mixed-type attacks on an endless stream of security threats, traditional network security based on a single device protection technology has become powerless.
这是保证已经通过一系列的关键测试,以确保客户从最新的病毒威胁的最佳防护。
This is to ensure that the key has been through a series of tests to ensure our customers the latest virus threats from the best protection.
文中主要总结了激光对人眼及光电传感器的威胁,详细综述了激光防护原理和激光防护材料的研究现状,提出了激光防护材料的发展趋势。
The threat of laser on eyes of people and sensor are summarized. Protective principles and study actuality are reviewed, and the developing trends of laser protective materials are briefly commented.
然而,在它们防护区以外的地方,这些狗可以去掉狗链自由的遛而且通常不攻击没有威胁的陌生人。
However, outside the protected area the dogs can be walked off leash and are usually not aggressive with non-threatening strangers.
而遇到特殊情况,如患者发病时,又常常来不及使用专门的防护衣,这对管理人员的健康造成了一定威胁。
Encountered special circumstances, such as patients, he is often too late to use special protective clothing, which the management of the health threat caused some.
为了防御这些与众不同的威胁,需要在端点采用分层防护和智能防护技术。
These distinct threats require layered protection and intelligent security at the endpoint.
而如果医院没有一个健全的患者-处理系统来确保对患者进行消除污染处理,或者没有防护服,医护人员就将直接暴露于毒性物质的威胁之下。
If the hospital does not have a patient-management system that ensures decontamination or protective gear for doctors to wear, they can be exposed to toxic substances.
木马利用HTTP隧道技术打破网络安全防护设备,给网络安全造成了严重白勺威胁。
Some Trojans use HTTP tunnel to pass through a variety of network security devices, which will pose a serious threat to current network security.
木马利用HTTP隧道技术打破网络安全防护设备,给网络安全造成了严重白勺威胁。
Some Trojans use HTTP tunnel to pass through a variety of network security devices, which will pose a serious threat to current network security.
应用推荐