At the server side, the protocol sets up a maximum trying number to prevent the brute-force attack, and a look-ahead parameter to realize counter resynchronization.
该协议通过在服务器端设置最大认证尝试次数来防止蛮力攻击,并设置前顾参数来实现计数器重同步。
Facebook accounts can be compromised by an attacker who might steal this information from another site-or guess it by trying many combinations in succession (a so-called brute-force attack).
Facebook的账户可以被黑客破解,通常黑客可能从其他网站盗取或是通过尝试很多种组合(所谓的强力攻击)来猜测这些登录信息。
A brute force attack is the most comprehensive form of attack, though it may often take a long time to work depending on the complexity of the password.
蛮力攻击是最全面的攻击形式,虽然它通常需要很长的时间工作,这取决于密码的复杂程度。
When trying to attach over the Internet to the site, the attacker USES a password generator tool, such as L0phtCrack, which launches a brute force attack against the server.
当试图通过因特网连接到该站点时,攻击者使用一个密码发生器工具(如l0phtcrack),它启动对服务器的蛮力攻击。
Dictionary attack — Guessing the password of a valid user using a brute force search through dictionary words.
字典攻击——根据字典词汇,使用蛮力搜索的方式推测一个有效用户的密码。
Of course, to combat against attacks that try to guess and brute force attack these passwords, it is best to ensure the Settings are configured to work with your security policy.
当然,为了阻止入侵者猜密码或者强制攻击这些密码,最好确保该设置与你的其他安全策略一起使用。
Brute force attack on cryptographic algorithm is an important branch of cryptology.
密码算法暴力破解是密码学的一个重要分支。
For any cipher, the most basic method of attack is brute force, which involves trying each key until you find the right one.
对于任何密码,攻击的最基本方法是蛮力,包括在每个键,直到你找到正确的。
As the basis and core of information security, cryptography also attracts more and more attention. Brute force attack on symmetric cipher algorithms is an important direction of cryptography.
密码学作为信息安全的基础和核心,也越来越受到人们的关注,而暴力破解对称密码算法,是密码学研究的一个重要方向。
Although these Numbers seem to be very large, but the speed of SHA-1 destructive attack is still 100 thousand times faster than brute force attacks, which means that the former is indeed feasible.
虽然这些数字看似非常巨大,但SHA - 1破坏性攻击的速度仍然较暴力破解攻击快10万倍,这意味着前者确实具有可行性。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性在很大程度上取决于暴力破解的不可行性。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密算法的安全性在很大程度上取决于暴力破解的不可行性。
应用推荐