Detailed attack Logging - HDIV logs information abut every attack it detects, providing information such as URL, username, IP address, and attack type.
详细的攻击日志——HDIV记录它检测到的每次攻击的信息,信息包括:url、用户名、IP地址和攻击类型。
Traditional intrusion detection methods lack extensibility in face of changing network configurations as well as adaptability in face of unknown attack type.
传统的入侵检测方法在面对多变的网络结构时缺乏可扩展性,而且在未知的攻击类型面前也缺乏适应性。
If Distance is lower than 2500, show a number equal to the extra damage on top of the target for 3 seconds and damage it with Attack Type Hero, Damage Type Fire.
假如双方距离在2500以下,在目标上方显示附加的伤害,持续3秒,并且以英雄攻击火焰伤害给与它伤害。
This type of attack is only possible if the database or password store is already compromised.
这种类型的攻击只可能在数据库或密码存储已经暴露的情况下进行。
In another type of attack, the attacker might modify the stylesheet to hide information from users.
在另一种攻击类型中,攻击者可能会修改样式表,把信息隐藏起来不让用户发现。
The appropriate key(s) will be shaded to indicate the type of attack(s) each technique helps to prevent.
对于每种技术,适当的方块将加上底纹,表示这种技术有助于防范的攻击类型。
While polyinstantiation will not prevent every type of attack, it is a useful addition to your security toolkit that is straightforward to configure.
尽管多实例化不能防止所有攻击,但它是您的安全工具包的一个有用的补充,而且配置十分简单。
Systems used in this type of attack can be compromised in any number of ways and infected with a worm or virus.
此类型攻击中使用的系统可能以多种方式被破坏并受到蠕虫或病毒感染。
The best way to prevent this type of attack is to enforce policies that make passwords difficult to guess.
防止这种类型攻击的最佳方法是加强策略,使口令很难被猜中。
The four squares will be shaded as appropriate to represent the type of attack this technique helps to prevent
这四个方块加了适当的底纹,以代表这种技术有助于防范的攻击类型
If you are concerned about this type of attack, which is easily prevented through code inspections, you can prevent untrusted clients from connecting to the Web container.
如果您担心这种类型的攻击(可以通过代码检查轻松地加以防止),则可以阻止任何不受信任的客户端连接到web容器。
The focus of this article is a specific type of code injection attack: the Blind XPath injection.
本文主要介绍代码注入攻击的一种特殊类型:XPath盲注。
One common type of malware, called a buffer overflow attack, overwhelms programs that accept input, like the address line in a Web browser or a search window for a database.
恶意软件的一种常见攻击类型,所谓的缓冲区溢出攻击,会使接受输入的程序崩溃,如web浏览器的地址栏或数据库的搜索窗口。
This type of attack was what Albert Gonzalez used to steal 130 million credit card Numbers.
这就是AlbertGonzalez用来盗取1.3亿信用卡号的那类攻击。
If the server CPU and memory seem to be running excessively high, the Domino Web logs should be checked for a Denial of Service type of attack.
如果服务器CPU和内存的运用率极高,那么应该检查DominoWeb日志是否存在拒绝服务型攻击。
Consider Example 1 (a), which is paraphrased from the Windows exploit, of course, that forms the basis for this type of attack vector.
考虑示例1 (a),当然,这改写自Windows攻击,它构成了此类攻击载体的基础。
We know that Twitter's architecture has made it more vulnerable to this type of attack than Google or even Facebook, but in situations like this, communication is key.
我们知道Twitter的构架使得Twitter比Google和Facebook更容易遭到攻击,但是在这种情况下,沟通至关重要。
So I immediately type up the paragraph, see what it looks like on a clean sheet of paper, and then attack that sheet of paper with my pencil again.
所以我会立刻把写好的一段打印出来,看看它在一张干净的白纸上是什么样子,然后再用铅笔在纸上涂涂改改。
For example, if you look at the drugs people take for Type 2 diabetes, certain drugs have recently been linked to increased risk of heart attack.
例如,如果留心人们为治疗2型糖尿病服用的药物,某些药物近来已与加剧心脏病发作的风险联系起来。
In addition to the overflow exploits, SQL injection is one other type of attack that relies on developer oversight by not testing incoming data.
除了溢出的利用以外,SQL注入是另一类依赖于开发人员没测试输入数据的疏漏的攻击。
In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.
在缓冲溢出攻击中,黑客利用了程序执行期间存储分配中的特定计算机程序漏洞。
A type of statistical analysis used to study high-energy physics and stock market fluctuations could yield a new Angle of attack in the fight against the virus that causes AIDS.
一种统计方法主要用于研究高能物理和股市波动,现在有可能在人类对抗艾滋病的战役中开辟新的战场。
In other words, your type a co-workers who are annoyingly ambitious and dutiful are no more likely to have a heart attack than you are.
换句话说,你那些被有进取心和使命感的人包围的同事得心脏病的可能性比你低。
So just how prepared are London and other European cities for this type of an attack?
那么,伦敦和欧洲其他城市有没有做好准备应对这种类型的袭击呢?
LM Hash is vulnerable to this type of attack because it does not use today's common method of introducing "salt" to the encryption process.
LMHash容易被此类攻击攻破,是因为它没有使用现今常用的给加密过程引入“salt”的方式。
One of the most famous instances of this type of attack is the Windows animated cursor attack, and it's this pattern that I examine here.
此类攻击最著名的示例之一就是Windows动画光标攻击,这正是本文要讨论的模式。
In 2002, the White House described 9/11 as “a new type of attack that had not been foreseen.”
白宫在2002年形容911是“无法预料的新型袭击”。
In recent years, there has been an increase of a particular type of attack: client-side attacks.
在最近几年,网络上出现一种新的攻击类型:客户端攻击,攻击的对象是客户端应用程序。
In recent years, there has been an increase of a particular type of attack: client-side attacks.
在最近几年,网络上出现一种新的攻击类型:客户端攻击,攻击的对象是客户端应用程序。
应用推荐