It is particularly dangerous because the attacker does not need a powerful machine or a powerful network connection to perform this attack.
因为攻击者不需要功能强大的机器或高速的网络连接来执行这种攻击,所以它特别危险。
Once he is inside a virtual machine, he can use a hacker's tool to launch malicious network scanning attack activity in the guise of friendly network scans.
黑客进入虚拟机之后,他可以使用黑客工具启动恶意的网络扫描攻击活动,并把这些活动伪装成善意的网络扫描。
The last scheme for adding security to your machine is the boldest one. You will close the open port making your machine virtually impregnable to any attack.
增强计算机安全性的最后一种方案是最激进的:关闭打开的端口,这会让任何攻击都无法攻破您的计算机。
If there are other users of your test machine, they must be aware of your test plans — otherwise they may think they are experiencing some severe problem such as a denial-of-service attack.
如果您的测试计算机上有其他用户,则他们必须知道您的测试计划——否则他们可能认为他们遭遇某种严重的问题,例如拒绝服务攻击。
One of the first steps you should take when hardening a machine is to reduce its attack surface. The more code that's running on a machine, the greater the chance that the code will be exploitable.
进行系统加固应该采取的首要步骤之一是降低其受攻击面:机器上运行的代码越多,代码被利用的机会更越大。
In the sharpest attack in the debate, Clinton said that Obama's message was not "change you can believe in, it's change you can Xerox" — a reference to a well-known photo copy machine.
这次辩论中最尖锐攻击是,希拉里说奥巴马给的信息并不是“一种大家相信的变化,而是一种大家可以象施乐影印机一样复印的变化——这里所提到的施乐影印机是一种著名的照片影印设备。”
The German Cap Trafalgar removed one of her great funnels and disguised herself as the British liner Carmania so that she might get close to an enemy ship and attack it with short-range machine guns.
德国的特拉法加角号把一个大烟囱拆去,乔装为英国邮轮卡曼尼亚号,希望有机会靠近敌船,近距离以机枪攻击。
You'll jump out of your seat as the mortars go off, the machine guns fire, and the platoon's comrades fall under enemy attack.
当你看到片中混凝土、开枪走火、一个团的战士受到敌军,你很可能会从椅子上跳起来。
You'll jump out of your seat as the mortars go off, the machine guns fire, and the platoon's comrades fall under enemy attack.
当你看到片中混凝土、开枪走火、一个团的战士受到敌军,你很可能会从椅子上跳起来。
应用推荐