• So far, RSA said it has only witnessed one instance of the attack and has seen no evidence that stolen credentials are being used to log in to compromised accounts in real time.

    幸运目前为止,RSA组织表示他们目击到类似的攻击而且也没有证据表明有犯罪分子使用这种被窃取的信用卡帐号登录网银系统

    youdao

  • If users suspect somebody implemented illegal attack, he can check log so as guaranteeing data packets which submit upper levels are legal ones.

    如果用户怀疑有人在实施非法攻击查看日志确认,确保向上层递交合法的数据包

    youdao

  • On this foundation, we are again compensatory "log" function and "ARP active defence" function, ARP attack is OK also by perfect settlement.

    基础上我们补充日志功能ARP主动防御”功能,ARP攻击可以完美的解决

    youdao

  • If there is log function inside the net, go commanding observation through ARP again, had discovered attack trace very hard.

    如果没有日志功能再去通过ARP命令观察已经很难发现攻击痕迹

    youdao

  • The most important way is that the attack packet is collected to analyses and log through the packet capture mechanism.

    然后,利用数据包捕获机制攻击数据进行了收集分析记录

    youdao

  • The most important way is that the attack packet is collected to analyses and log through the packet capture mechanism.

    然后,利用数据包捕获机制攻击数据进行了收集分析记录

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定