攻击技术的一些特点。
图像水印的算法设计和攻击技术是互相促进的对立面。
The image watermarking algorithm design and the attack way are opposite to and promotional of each other.
攻击技术:比赛攻击以旋踢为主,后踢与前踢攻击为辅。
Attack skill: The main attack was turning kick in competition. The auxiliary attacks were back kick and front kick.
本论文对MD5算法的攻击技术进行了深入的分析和研究。
Attack technology of MD5 algorithm is analyzed and researched deeply in this paper.
本文介绍了木马的攻击原理、常用攻击技术以及防范策略。
This article discusses the work principles and attack technology and defending policies on Trojan Horse.
攻击者浪费了他们的时间,更糟糕的是,揭示了他们的攻击技术。
The attacker has wasted their time and, worse, revealed their attack techniques.
其主要方式有:网上教授病毒、木马制作技术和各种网络攻击技术;
Its main means has: online professor viruses, Trojan horses production technology and various network attack technology;
此外,结 合可能无细微先验知识的限制,提出了有限盲攻击技术。
The limited blind interference technology is presented in terms of no subtle priori knowledge.
为了提高检测技术和检测设备的水平,则首先要对攻击技术有非常深入的了解。
In order to improve the level of detection technology and testing equipment, we must first have a deep understanding of the attack technology.
这里,我们对僵尸网络,普遍的攻击技术以及涉及到的个人做一个更贴近的观察。
In this paper we take a closer look at botnets, common attack techniques, and the individuals involved.
为了在未来的信息战中掌握主动权,研究木马型网络攻击技术具有重要的军事战略意义。
To have the initiative in future weapon of information, will study the wooden horse network attack technology to have the important military strategy significance.
该文提出了基于木马的漏洞扫描模型,并对其攻击原理以及关键攻击技术实现作了进一步的研究。
This article proposed scans the model based on wooden horse's crack, and realized to its attack principle as well as the key attack technology has done the further research.
首先对智能卡安全攻击的主要方法进行了研究,分析了几种最新的智能卡攻击技术的原理与关键步骤。
At first, the main methods of smartcard security attacks are discussed, and the principle and key steps of the latest attack technologies are analysed.
信息安全的核心技术在于“攻防”,即攻击技术和防御技术,只有掌握攻击技术才能更好做到安全防御。
The core technology of information security lies in attack and defense, that is, attack technology and defense technology, only to master the attack technology in order to achieve better security.
攻击技术涉及到左直拳、左刺拳、左钩拳、右上钩拳、右交叉拳以及组合拳,如1 - 2连击的组合拳。
Punching involves quite a few skills, such as the straight left, the left jab, the left hook, the right uppercut, the right cross as well as the combination punching like the one-two.
入侵检测是信息安全领域中一个最富挑战性的课题,这其中最重要的原因是入侵检测所面临的是极富智慧的攻击技术。
Intrusion detection is a real challenge in the area of information security. The reason is that it faces the most intelligent hackers.
本论文在信息隐藏方面的主要工作就是围绕这两种应用展开的,内容涉及图像置乱、图像信息隐藏和隐藏分析和攻击技术等方面。
In this dissertation, we study the technologies and application of these two situations, our attentions focused on image scramble, image hiding, hiding analysis and attack.
我自然而然地披上“杀死技术员”的铠甲,准备向这个混蛋发起嘹亮但难以理解的攻击。
I naturally started to don my "kill the technician" armor, preparing for a loud but unintelligible assault on the jerk.
但是你可以运用以下技术来防止ARP攻击。
But you can help prevent ARP attacks using the following techniques.
这项能攻击单个基因的技术也许会催生应对75%的缺乏任何特殊疗法癌症基因的药物,还包括其他的疾病。
The technique's ability to attack single genes could lead to drugs for the 75 percent of cancer genes that lack any specific treatment, as well as for other illnesses.
人类邪恶的一面使得总有人会滥用其计算机技术去实施攻击和入侵,那么就是试图去破坏计算机系统。
That same dark side of human nature ensures that there will always be those who misuse computer technology to attack, intrude, and otherwise attempt to do harm to computer systems.
演习模拟了一次协同网络攻击,目标是信息技术、通信、化学和交通系统与设施。
The exercise simulated a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.
有一个女人曾经使用类似于MITM攻击的技术抢劫了很多家的很多钱(请参阅参考资料)。
A woman used a technique similar to the MITM attack to rob families out of a lot of money (see Resources).
然而,大多数SSL部署会受到网络攻击的影响,因为这项技术普遍地都认识不清。
Yet, most SSL deployments are susceptible to network-based attacks, because the technology is widely misunderstood.
您还了解了密码破解者如何在内部和外部使用技术攻击您的基础结构。
You also saw how password crackers use techniques both internally and externally to your infrastructure.
他每天使用不同的工具和技术来攻击网上银行。
He USES different sets of tools and techniques everyday to target an online bank.
为了帮助您将这些技术与刚才提到的攻击类别联系起来,我们将使用以下图形解释各种技术。
To help you tie these techniques back to the classes of attack just presented, for each technique we will include the following graphic.
为了帮助您将这些技术与刚才提到的攻击类别联系起来,我们将使用以下图形解释各种技术。
To help you tie these techniques back to the classes of attack just presented, for each technique we will include the following graphic.
应用推荐