The network attacks based on the source address spoofing have become one of the most grievous threats to the network security.
基于源地址欺骗的网络攻击已成为当前网络安全最主要的威胁之一。
The buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area.
缓冲区溢出攻击是网络攻击事件中最常用的一种攻击方式,成为系统和网络安全中亟待解决的重要问题。
Analysis of the impact of service availability in the network attacks lead to abnormal changes in network traffic, based on a host of real-time network flow method to assess the security situation.
在分析影响服务可用性网络攻击导致网络流量异常改变的基础上,提出了一种主机网络实时流量的安全状况评估方法。
That feature was introduced in .NET from the beginning to prevent security attacks coming from network locations.
当初之所以在.NET中引入这个特性,是为了阻止从网络上进行的安全攻击。
Network-based attacks: these attacks rely on low-level access to network packets and attempt to harm the system by altering this traffic or discovering information from these packets.
基于网络的攻击:这些攻击依赖于对网络数据包的低层访问,试图通过修改通信流或者发现这些数据包中的信息来危害系统。
The specification does not cover network layer vulnerability information such as network topology, TCP-related attacks, or other network layer issues.
规范中没有涉及网络层漏洞的信息,比如网络拓扑、TCP 相关的攻击,或网络层的其它问题。
This is where that network and system admin you were being nice to earlier is going to save your site... let them do the work of responding to attacks.
这是您此前与之建立良好合作关系的网络和系统管理员出面拯救您的站点的时机……让他们来负责采取措施应对攻击。
Many other factors in the environment can affect performance, including network utilization, other programs on the server, denial of service attacks, and tripping over the power cord.
环境中有许多其他因素会影响性能,包括网络使用率、服务器上的其他程序、拒绝服务攻击以及电源线被绊断。
At the same time, attacks upon networks are increasing very fast, computer criminal events occur quite often, and network securities are seriously threatened.
与之相伴,对网络的各类攻击与破坏也与日俱增,计算机犯罪越来越多,网络安全受到严重威胁。
These defenses effectively stop any attacks based on the parser making external network connections.
这些防御措施有效地阻止了基于解析器创建外部网络连接的所有攻击。
Availability is assured at the operating system level, allowing for transparent mitigation of active and passive network denial-of-service attacks.
它在操作系统级确保可用性,可以透明地缓解主动和被动网络拒绝服务攻击。
In fact, he notes that within the hacker community, DDoS and similar attacks don't even qualify as true hacking, which involves actually compromising a network, not taking down a site.
他注意到,在黑客界内部,阻断服务攻击以及类似的攻击方式只能算是雕虫小技,甚至还不够格被称作真正的“黑”。真正的“黑”是要对一个网络造成真正的危害,而不是暂时关掉一个网站。
The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
Alzheimer's disease, for instance, specifically attacks the dark network, stranding many of its victims in an endless now, unable to remember their yesterdays or envision their tomorrows.
比如说,一种叫Alzheimer的疾病,会专门的攻击这个“黑暗网络”,导致它的受害者生活在一个无尽的“现在”的时间,他们记不得昨天,也无法想象明天。
Why does anyone think criminals won't be able to use the same system to steal bank account and credit card information, use it to launch other attacks or turn it into a massive spam-sending network?
为什么任何人都觉得犯罪分子不会使用同一个系统来盗取银行账户和信用卡信息,利用它发动其它攻击或者将它变成巨大的垃圾邮件发放网络?
Yet, most SSL deployments are susceptible to network-based attacks, because the technology is widely misunderstood.
然而,大多数SSL部署会受到网络攻击的影响,因为这项技术普遍地都认识不清。
The data transmitted over the network is susceptible to network attacks like snooping the network traffic, non-repudiation, tampering the data, spoofing, hijacking, and capture-replay.
在网络上传输的数据容易受到各种网络攻击,例如嗅探网络传输、不可抵赖性、篡改数据、欺骗、拦截和捕捉回复。
The attacks called for meticulous planning and co-operation among an extended network of conspirators, yet apparently took the authorities entirely by surprise.
恐怖袭击要求密谋者之间建立延伸的网络,在此基础上他们才能进行精心的策划与协作。这使官方机构惊骇非常。
The report claimed the network was behind nearly 1, 300 attacks on computers in more than 100 countries.
该报道声称该网络在100多个国家的电脑上进行过将近1300起袭击。
Wireless hubs make attacks on the shopper's computer network the better choice because most wireless hubs are shipped with security features disabled.
无线hub使攻击购物者计算机网络成为更好的选择,因为大多数无线hub都禁用了安全特性。
As well as the social network site-based attacks will increase, causing more infections.
以网站以及社会网络为基础的攻击将会增多,引起更多的感染。
The box shields against up to 3,000 known content- and network-based threats and against 22 classes of denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.
该盒子可防护3000中已知的基于内容和网络的威胁、22类DoS攻击及DDoS攻击。
There are hidden dangers of information security in the process of network communication in smart cities, such as Trojans, denial of service attacks, spoofing attacks, SQL injection and worms.
智慧城市网络通信过程中存在信息安全隐患,主要有木马程序、拒绝服务攻击、欺骗攻击、SQL注入和蠕虫病毒等。
One reports that the ISI handed 1, 000 motorcycles to the Haqqani network, thought responsible for most suicide bombings and spectacular attacks in Kabul.
其中一份文件提到,三军情报局将1000辆摩托车交给了哈卡尼组织,人们认为该组织应该为在喀布尔发动的大多数自杀性爆炸和大规模袭击负责。
Designing network system from the survivability could manage the DoS attacks positively, and provide essential services as long as possible in the presence of attacks and failures.
从生存性角度来设计网络系统可使网络系统在受到攻击时,能积极地应对攻击,尽可能长时间地提供关键服务。
With the popularity of the Internet of things, equipment virtualization, the scale of network attacks will be growing, means of attack will be more and more, the impact will be more serious.
随着物联网、设备虚拟化的普及,网络攻击的规模将会越来越大,攻击手段也会越来越多,造成的影响会越来越严重。
To defend against network attacks through packet filtering and the enforcement of trusted communication.
通过数据包筛选和执行信任通信来抵御网络攻击。
Among Maimon's more controversial findings is the correlation between the number of foreign students logged into the college network and the frequency and origin of the cyber attacks.
麦农更具争议的结果之一是众多外国学生登录到大学网络与网络攻击频率和来源的相关性。
Among Maimon's more controversial findings is the correlation between the number of foreign students logged into the college network and the frequency and origin of the cyber attacks.
麦农更具争议的结果之一是众多外国学生登录到大学网络与网络攻击频率和来源的相关性。
应用推荐