这样军人和平民界限的进一步模糊是否会增加在美国本土上针对家庭和学校的攻击?
Would an increasingly sketchy line between warrior and civilian invite attacks on U. S. soil against homes and schools?
这样军人和平民界限的进一步模糊是否会增加在美国本土上针对家庭和学校的攻击?
Would an increasingly sketchy line between warrior and civilian invite attacks on U.S. soil against homes and schools?
系统被破坏后,攻击者将实施以下任一步骤——收集数据或破坏另一个系统。
With the system compromised, the attacker carries out whatever the next step may be-whether it's to gather data or compromise another system.
除了供应商FUD(担心、不确定性和怀疑影响产品销售)外,确实没有那么多攻击工具提供一步到位并且不需动脑的欺骗解决方案。
Vendor FUD (fear, uncertainty, and doubt spread to sell product) aside, there are really not that many attack tools that present a complete one-stop, no-brains-required spoofing solution.
他说,并进一步补充道:以色列完全有能力制造Stuxnet,而且这样的攻击几乎没有任何弊端,因为要证明病毒制造者是谁几乎不可能。
Israel certainly has the ability to create Stuxnet, he adds, and there is little downside to such an attack, because it would be virtually impossible to prove who did it.
持枪者还攻击了Gamaand Albless医院和GT医院,导致更进一步的恐慌。
Gunmen also attacked Cama and Albless hospital and GT hospital, causing fresh panic.
该团队使用这些信息来建立一个完善的攻击者行为认知,研发方案以防止进一步的攻击。
This team USES the information to build a thorough understanding of the attacker's behaviours and develops methods to prevent further attacks.
知道主机上哪些端口是打开的,对于攻击者推断目标主机上可能存在的弱点是重要的第一步。
Knowing which ports are open on a host is an important first step for an attacker to deduce possible vulnerabilities to the target host.
目前这些策略还是在研究阶段,并且我们正专注于下一步该如何堵住网络的攻击潮水。
Currently these strategies are the domain of research and we are focused on what we must do next to stem the tide of attack.
最近我前往加兹温省,他们更进一步攻击我,并对我的车子开火,之后又突然搜查我的房子。
During a recent visit I had to Qazvin province, they went further in attacking me and opened fire on my car and later raided my house.
第一步是确定易遭到恶意攻击的关键系统资产——无形的或者有形的。
The first step is to identify critical system assets — intangible or tangible — that are vulnerable to malicious attacks.
第二步是确定电脑黑客或攻击者可能恶意攻击的漏洞。
The second step is to identify vulnerabilities that a hacker or attacker could maliciously exploit.
第一步表示您需要识别(有形或无形的)关键系统资产,这些资产罪可能受到恶意攻击。
The first step says you need to identify critical system assets-tangible and intangible-that are most likely vulnerable to malicious attacks.
世行的发言人称,在未清楚该次电脑攻击的严重性和性质之前,采取这一步措施的是出自“多方面谨慎考虑”。
A World Bank spokesman said the step had been taken out of “an abundance of caution” until the severity and nature of the cyberattack on the I.M.F. is understood.
Twitter是不是因为这个原因受到攻击尚不得而知:官方博客在下午3点40分更新时并未进一步透露详情。
Whether that is the aim of this attack on Twitter is not known: the status blog, updated at 3.40pm BST, gives no other details.
让我们进一步假设主机a位于网络192.168.2.0,并且攻击者将该数据报发送到这个网络的网络广播地址而不是某台特定主机。
Let's further assume that host a is located in network 192.168.2.0, and that the attacker sends the datagram to the network broadcast address of this network instead of to a particular host.
攻击 sticky目录以及您创建的文件的受限权限只是第一步。
Sticky directories and limited permissions on the files you create are only the first step.
设备上的操作系统遵循“JustEnoughOperatingSystem”原则来进一步减少了攻击面。
The operating system in the appliance follows "Just Enough operating system" principles to further decrease the attack surface.
Metasploit比常规漏洞扫描器更进一步:它支持您研究自己的攻击和交付机制。
Metasploit goes a step beyond regular vulnerability scanners: it provides you the ability to develop your own exploits and delivery mechanisms.
“社会工程”的有关计算机或通过向天真的问题,计算机网络用户的信息收集,往往是在计算机网络上进行恶意攻击的第一步。
"Social engineering," the gathering of information about a computer or computer network via questions to naive users, is often the first step in a malicious attack on computer networks.
我们希望自己针对SHA - 1完成的实际攻击能够进一步巩固这一结论,让更多人意识到其已经不再安全可靠。
We hope to complete the actual attack against SHA-1 to further consolidate this conclusion, so that more people realize that it is no longer safe and reliable.
正如我们已经看到的,航空公司正在十分富有攻击性地进一步降低成本,他们下一步认真处理的问题将是GDS费用。
As we have seen, airlines are aggressively looking to further cut costs, and the next area to be seriously tackled will be the GDS fees.
有时,受侵电脑会被进一步用于其他欺诈活动,例如网络钓鱼攻击,这种攻击往往会说服用户透露银行密码等敏感信息。
Compromised computers are sometimes used to further other scams, such as "phishing" attacks that try to persuade users to reveal sensitive information such as bank passwords.
堆栈步旨在防止引诱攻击;在这种攻击中,受信程度较低的代码调用高度信任的代码,并使用高度信任的代码执行未经授权的操作。
The stack walk is designed to help prevent luring attacks, in which less-trusted code calls highly trusted code and USES it to perform unauthorized actions.
但下一步又该怎么办呢?难道接下来我们就要任凭无人机完全按照自己的数据分析发动攻击吗?
But what about the next step? Does it follow that an unmanned aircraft should be allowed to fire a weapon based entirely on its own data analysis?
但下一步又该怎么办呢?难道接下来我们就要任凭无人机完全按照自己的数据分析发动攻击吗?
But what about the next step? Does it follow that an unmanned aircraft should be allowed to fire a weapon based entirely on its own data analysis?
应用推荐