• 了解了密码破解者如何在内部外部使用技术攻击基础结构

    You also saw how password crackers use techniques both internally and externally to your infrastructure.

    youdao

  • 他们不仅使用传统手段收集情报而且越来越多地部署复杂的技术攻击利用互联网渗透电脑网络

    They do not only use traditional methods to collect intelligence but increasingly deploy sophisticated technical attacks, using the internet to penetrate computer networks, " he said."

    youdao

  • 尽管本文提出的想法假设性,但也许能刺激出各种关于如何纳米技术攻击其它癌症的新想法。

    Although the scenarios outlined in this article are hypothetical, they might stimulate ideas about how other cancers could be attacked using nanotechnology.

    youdao

  • 注意,这里没有考虑一种技术攻击形式拒绝服务(Denialof Service,DoS)攻击

    Be aware that one other form of technical attack is not considered here: denial of service (DoS) attacks.

    youdao

  • 请注意我们没有考虑一种其他形式技术攻击拒绝服务(Denialof Service,DoS)攻击

    Note that we will not be considering one other form of technical attack, Denial of Service (DoS) attacks.

    youdao

  • 自然而然披上杀死技术”的铠甲准备这个混蛋发起嘹亮难以理解攻击

    I naturally started to don my "kill the technician" armor, preparing for a loud but unintelligible assault on the jerk.

    youdao

  • 但是可以运用以下技术防止ARP攻击

    But you can help prevent ARP attacks using the following techniques.

    youdao

  • 这项攻击单个基因技术也许会催生应对75%缺乏任何特殊疗法癌症基因药物,包括其他疾病

    The technique's ability to attack single genes could lead to drugs for the 75 percent of cancer genes that lack any specific treatment, as well as for other illnesses.

    youdao

  • 始终要记住黑客可能远程危害一个应用程序(通过前面技术),然后利用内部攻击方法进行更多危害

    But always remember that a hacker might compromise an application remotely (via the previous techniques), and then leverage internal attack methods to do even more harm.

    youdao

  • 人类邪恶一面使得有人滥用计算机技术实施攻击入侵,那么就是试图破坏计算机系统

    That same dark side of human nature ensures that there will always be those who misuse computer technology to attack, intrude, and otherwise attempt to do harm to computer systems.

    youdao

  • 演习模拟了一次协同网络攻击,目标是信息技术通信化学交通系统设施

    The exercise simulated a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.

    youdao

  • 有一个女人曾经使用类似MITM攻击技术抢劫很多的很多(请参阅参考资料)。

    A woman used a technique similar to the MITM attack to rob families out of a lot of money (see Resources).

    youdao

  • 然而大多数SSL部署受到网络攻击的影响,因为这项技术普遍都认识不清

    Yet, most SSL deployments are susceptible to network-based attacks, because the technology is widely misunderstood.

    youdao

  • 每天使用不同工具技术攻击网上银行

    He USES different sets of tools and techniques everyday to target an online bank.

    youdao

  • SQL注入这种技术使攻击可以利用应用程序未仔细检查输入机会执行未经授权的SQL命令,而应用程序的本意是使用输入来构造动态sql查询。

    SQL injection is a technique which enables an attacker to execute unauthorized SQL commands by taking advantage of non-scrutinized input opportunities in applications that build dynamic SQL queries.

    youdao

  • 有几种不同保护技术可以防范多种形式攻击有时攻击可能利用多种入侵形式达到最终目标

    Several different protection techniques help with multiple forms of attack, and sometimes a single attack can leverage multiple forms of intrusion to achieve the end goal.

    youdao

  • 有几种不同保护技术可以防范多种形式攻击有时攻击可能利用多种入侵形式达到最终目标

    Several different techniques of protection help with multiple forms of attack, and sometimes a single attack may leverage multiple forms of intrusion to achieve the end goal.

    youdao

  • 为了帮助这些技术刚才提到攻击类别联系起来,我们使用以下图形解释各种技术

    To help you tie these techniques back to the classes of attack just presented, for each technique we will include the following graphic.

    youdao

  • 防范DoS攻击需要不同技术超出应用服务器提供的范围。

    Preventing DoS attacks require different techniques that go well beyond what an application server can provide.

    youdao

  • 四个方块加了适当的底纹代表这种技术有助于防范攻击类型

    The four squares will be shaded as appropriate to represent the type of attack this technique helps to prevent

    youdao

  • 通常程序员使用拙劣技术进行攻击留下后门没有严格地定义Web服务所需输入数据类型

    Often, programmers will leave the door open to attacks by using poor technique, like not strictly defining the types of data they expect as input to Web services.

    youdao

  • 可以使用以下几种技术阻止iframe片段标识符攻击

    You can use several techniques to prevent iframe fragment-identifier attacks.

    youdao

  • 单个多个消息XML拒绝服务XDoS),实施攻击技术包括元素megatag强制性解析 XML 流

    Single- and multiple-message XML Denial of Service (XDoS) using techniques such as recursive elements, megatags, coercive parsing, and XML flood

    youdao

  • 如果提供加密攻击通常仍然可以通过修改客户机攻击技术

    If you provide encryption, then an attacker can generally still attack the technique by modifying your client.

    youdao

  • 本文中,我们讨论了攻击如何使用跨站点脚本编制作为网站发动攻击技术

    In this article, we discussed how attackers use cross-site scripting as a technique to launch attacks against Web sites.

    youdao

  • 通过使用这种技术攻击可以获得诸如密码信用卡以及用户输入任意信息等敏感数据2

    Using this technique, the attacker can gain sensitive data such as passwords, credit card numbers, and any arbitrary information the user inputs as shown in Figure 2.

    youdao

  • 通过使用这种技术攻击可以获得诸如密码信用卡以及用户输入任意信息等敏感数据如图2所示。

    Using this technique, the attacker can gain sensitive data such as passwords, credit card Numbers, and any arbitrary information the user inputs as shown in Figure 2.

    youdao

  • 使用这些技术组合只使用单项技术更好地保护SOA攻击

    A combination of these technologies can better protect SOAs from attack than a single item can.

    youdao

  • 使用这些技术组合只使用单项技术更好地保护SOA攻击

    A combination of these technologies can better protect SOAs from attack than a single item can.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定