• Here's a map of the spam-sending botnets in 2010.

    以下便是2010年整理垃圾邮件制造者——僵尸网络的分布地图

    youdao

  • As we mentioned above, 88% of all spam is sent from botnets.

    正如前面提到,88%的垃圾邮件来自于僵尸网络。

    youdao

  • Botnets continue to proliferate, despite recent botnet takedowns.

    虽然近期在拆卸僵尸网络,但它仍旧继续激增

    youdao

  • They send the spam from "botnets", networks of hacked personal computers.

    他们利用僵尸网络(就是被挟持个人电脑组成的网络)发送垃圾邮件

    youdao

  • Botnets are typically controlled by an attacker via Internet Relay Chat.

    僵尸网络通常攻击通过Internet多线交谈(IRC)控制

    youdao

  • Botnets using Web 2.0 technology via social networks also are on the rise.

    使用Web2.0技术通过社会化网络传播的僵尸网络数量不断增长

    youdao

  • Another interesting application was created to identify botnets for email spam.

    另外一个有趣的应用程序创建用于识别僵尸网络垃圾邮件。

    youdao

  • In this paper, we introduce a methodology to analyze and mitigate P2P botnets.

    本文中,我们介绍了分析处理P 2 P僵尸网络的一种方法

    youdao

  • In response, senders started using botnets (networks of otherwise innocent computers).

    作为对策,垃圾邮件发送者们开始使用僵尸网络(由另外一些“无辜”的计算机构成的网络)。

    youdao

  • It is becoming easier to identify botnets and to spot the clever and scary ones quickly.

    识别进而迅速发现那些狡猾令人害怕的“僵尸网络”变得愈加容易

    youdao

  • As you can see, Europe, especially Eastern Europe, has become a major hotbed for botnets.

    正如欧洲尤其是东欧已经逐步成为僵尸网络的聚合之地

    youdao

  • Since botnets pose such a powerful threat, we need a variety of mechanisms to counter it.

    由于僵尸网络造成了这样大的威胁我们需要各种机制应对它们

    youdao

  • Botnets, viruses, keyloggers and other malware became an increasing threat to operations.

    僵尸网络病毒键盘记录器其它恶意软件运营带来越来越大的威胁

    youdao

  • Even in unskilled hands, it should be obvious that botnets are a loaded and powerful weapon.

    即使是熟练的新手,僵尸网络显然一个强有力的攻击武器。

    youdao

  • The number of global spam is growing, often spread through the rapid growth of large botnets.

    全球垃圾邮件数量不断增长,经常通过快速壮大大型僵尸网络进行传播。

    youdao

  • Akamai also looked at where most of the traffic from botnets and other attack traffic originated from.

    Akamai研究了僵尸网络网络攻击主要流量来源地。

    youdao

  • In this paper we take a closer look at botnets, common attack techniques, and the individuals involved.

    这里我们对僵尸网络,普遍攻击技术以及涉及到的个人一个更贴近观察

    youdao

  • Organized and controlled as botnets, these systems are essentially Internet weapons of mass destruction.

    有组织受控作为僵尸网络这些系统本质上Internet大规模杀伤武器

    youdao

  • The infected machines thus comprise one of the biggest "botnets" – a network of "robot" computers – in internet history.

    受到感染的机器将会组成Internet史上最大"Botnets"(僵尸网络) - 由"机器人"电脑组成的网络。

    youdao

  • Initially the FBI said it wanted to track down infected computers in the botnets it had identified and warn their owners.

    最初FBI表示希望僵尸网络追捕到它确定警告过拥有人的那些受感染电脑

    youdao

  • In the future, we hope to develop more advanced honeypots that help us to gather information about threats such as botnets.

    将来我们希望开发高级蜜罐来帮助我们收集关于僵尸网络这样威胁

    youdao

  • When filters blocked mail from suspect network addresses, the spammers used botnets (networks of hijacked computers) instead.

    过滤器开始阻拦嫌疑网络地址发来的邮件发送者开始其中放入僵尸网络劫持电脑网络)。

    youdao

  • It provide a clear example for how smartphones are prime targets to become botnets once connected to a user's personal computer.

    说明一旦智能手机用户个人电脑上之后,很容易成为僵尸网络的主要攻击对象

    youdao

  • Most troubling of all, Botezatu predicts that unsecured XP machines of all kinds will be compromised by hackers to form new botnets.

    博泰扎图认为令人担忧是,各种不安全的XP电脑可能黑客改造成新的僵尸网络。

    youdao

  • Every article that I read about botnets mentions that this problem is here for the long haul, stating simple economics as the reason.

    阅读每一有关僵尸网络的文章都提到这个问题有关僵尸阅读这里很久说明了简单经济学原因。

    youdao

  • Botnets are mention problem reason big business, making people a great deal of money, and as long as that's the case botnets aren't going away.

    僵尸网络经济学说明僵尸业务使发财,只要这种情况持续,僵尸网络不会消业务发财这种失。

    youdao

  • The main problem with hashcash is that many spammers use "botnets", or hacked computers that have been reprogrammed to obey the spammer's commands.

    hashcash主要问题很多垃圾信息散布者都会使用botnet”,或是黑客攻击了的计算机,这些计算机已经重新编程服从垃圾信息散布者的命令。

    youdao

  • To improve the confidentiality of Botnet, the authors proposed a dynamic Botnet model described with directed graph, which can accommodate various Botnets.

    提高僵尸网络隐秘性,提出了一种动态僵尸网络模型,利用进行描述可以表示不同类型的僵尸网络。

    youdao

  • In this paper we have attempted to demonstrate how honeynets can help us understand how botnets work, the threat they pose, and how attackers control them.

    本文中,我们试图说明蜜网如何帮助我们理解僵尸网络的工作方式,它们造成威胁攻击者如何控制它们等。

    youdao

  • In this paper we have attempted to demonstrate how honeynets can help us understand how botnets work, the threat they pose, and how attackers control them.

    本文中,我们试图说明蜜网如何帮助我们理解僵尸网络的工作方式,它们造成威胁攻击者如何控制它们等。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定