• 入侵检测通过收集各种网络数据,从中分析发现可能入侵攻击行为

    Intrusion detection system can discover potential intrusion behavior by collecting and analyzing various network data.

    youdao

  • 与此同时这些重要信息网络系统面临入侵攻击威胁操作系统应用服务程序漏洞正是攻击实施攻击基础

    Meanwhile, these important information network systems face the threat attacked in invasion, and the loophole of operating systems and applications is the foundation of attack implemented by attacker.

    youdao

  • 论文研究入侵攻击类型主要大类,它们分别HTTP协议相关的典型入侵攻击,与TCP协议相关典型入侵攻击以及ICMP协议相关的典型入侵攻击

    There are three kinds of invading and attacking action in this thesis, they are the model of using HTTP, the model of using TCP, and the model of using ICMP.

    youdao

  • 如果被捕食者或者入侵克林贡人攻击怎么

    What would he have done if attacked by a predator or an invading Klingon?

    youdao

  • 非常攻击蚂蚁——玛蚂蚁,最近入侵一个特定区域它们的有毒,人类往往致命的。

    A very aggressive species of blank ant, the Loma ant, which has recently invaded a certain region, has a venomous sting that is often fatal to humans.

    youdao

  • 大自然保护协会众多入侵物种发起了宣战羊群植物,再到具有攻击性的阿根廷

    The Nature Conservancy has declared war on a multitude of invasive species here, from sheep to plants to the aggressive Argentine ant.

    youdao

  • 根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    Under section 1030(a)(5) of the U. S. Computer Fraud and Abuse Act, it's against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    youdao

  • 人类邪恶一面使得有人滥用计算机技术实施攻击入侵,那么就是试图破坏计算机系统

    That same dark side of human nature ensures that there will always be those who misuse computer technology to attack, intrude, and otherwise attempt to do harm to computer systems.

    youdao

  • CSRF攻击入侵站点恶意代码发起代码欺骗浏览器,使其将无关的请求传输受信任站点。

    CSRF attacks originate from malicious code from an intruder site that tricks a browser into transmitting unprovoked requests to a trusted site.

    youdao

  • 现在攻击者(外部内部仅需入侵系统可以访问所有数据

    Now an attacker (external or internal) needs to compromise only a single system to get access to all master data.

    youdao

  • 有几种不同保护技术可以防范多种形式攻击有时攻击可能利用多种入侵形式达到最终目标

    Several different protection techniques help with multiple forms of attack, and sometimes a single attack can leverage multiple forms of intrusion to achieve the end goal.

    youdao

  • 关键的问题入侵者是使用定义良好的API协议来进行攻击的。

    The key is that the attack is executed using well-defined APIs and protocols.

    youdao

  • 当然为了阻止入侵密码或者强制攻击这些密码最好确保设置其他安全策略一起使用。

    Of course, to combat against attacks that try to guess and brute force attack these passwords, it is best to ensure the Settings are configured to work with your security policy.

    youdao

  • 有几种不同保护技术可以防范多种形式攻击有时攻击可能利用多种入侵形式达到最终目标

    Several different techniques of protection help with multiple forms of attack, and sometimes a single attack may leverage multiple forms of intrusion to achieve the end goal.

    youdao

  • 浏览器同源策略无法阻止CSRF攻击因为攻击请求传输第三方入侵站点代理相同

    The browser's same-origin policy does not prevent CSRF attacks because the attack requests are transmitted to the same origin in proxy for the intruding third-party site.

    youdao

  • unix计算机受到入侵时,常见情况日志文件删除,掩盖攻击者的踪迹

    A common thing that happens when a UNIX machine is broken into is that the log files are deleted to cover the attacker's tracks.

    youdao

  • 百度昨日发表声明,指出黑客并未直接入侵百度服务器而是攻击美国域名注册商。

    In a statement yesterday, Baidu noted that attackers did not try to break into the servers of Baidu but attacked the domain name registrar used by Baidu, which is based in the us.

    youdao

  • 根据美国计算机欺诈滥用法案第1030条(a)(5),故意散布计算机病毒蠕虫进行拒绝服务攻击其他安全入侵的行为是违法的。

    Under section 1030(a)(5) of the U.S. Computer Fraud and Abuse Act, it’s against the law to knowingly disseminate computer viruses, worms, denial-of-service attacks and other security intrusions.

    youdao

  • 攻击目标包括花旗集团洛克希德·马丁(Lockheed Martin),甚至连公司制作令密码防御入侵RSA公司无法避免。

    Targets have included Citigroup, Lockheed Martin and even RSA Security, which makes password tokens that big companies use to protect themselves from intrusion.

    youdao

  • 很多不同类型入侵、很多不同的动机,以及(我们后面将要讨论的)许多不同的攻击类型。

    As you can see, there are many different types of intruders and motivations and, as we will discuss later, many different types of attacks.

    youdao

  • 这样可以防止恶劣攻击类型(入侵可能使用内置管理基础设施恶意应用程序部署的桌面上)。

    This prevents the most egregious types of attack, where an intruder can use the built in administrative infrastructure to deploy rogue applications onto your desktop.

    youdao

  • 另一种狡猾的攻击方法入侵可以修改通过HTTP返回任何页面——甚至包括页面嵌入的URL。

    An even more subtle attack is that any page returned over HTTP can be potentially altered by an intruder — even URLs embedded in the page.

    youdao

  • CSRF攻击过程中,请求源自入侵第三方站点通过一个已验证的浏览器页面传递服务器

    During a CSRF attack, requests originate from an intruding third-party site and are passed through an authenticated browser page to the server.

    youdao

  • CSRF攻击过程中,请求来自入侵站点,然后通过一个经过验证浏览器页面传输服务器

    During a CSRF attack, requests originate from an intruder site and are transmitted through an authenticated browser page to the server.

    youdao

  • 公司提供广泛视点观察各种攻击其中包括侦察入侵破解指挥控制横向运动等

    This provides the Corporation with a full range of vantage points to observe attacks, including: reconnaissance, intrusion, compromise, command and control, and lateral movement.

    youdao

  • 这种攻击想法找出特定目标主机打开端口完成方式非常狡猾,因此被攻击的主机质量低劣入侵检测工具不会发现

    The idea is to find out which ports are open on a specific target host, but it is done in such a tricky way that the attacked host or a poor-quality intrusion detection tool may not notice.

    youdao

  • 器官移植后T细胞捐赠器官当作外来入侵’进行攻击

    After organ transplants, t cells can attack the donor organ as a 'foreign invader'.

    youdao

  • 要点很多不同类型入侵、很多不同入侵动机以及(我们后面将会的)许多不同的攻击类型。

    The point is that there are many different types of intruders, many different motivations for intruding, and, as you will see later, many different types of attacks.

    youdao

  • 某些脂肪酸看上去细菌入侵TLR4的意义,促进正常巨噬细胞误导脂肪酸去敌视攻击炎症

    He says that some fatty acids look like the bacterial invaders that TLR4 senses, prompting normal macrophages to mistake fatty acids for the enemy and turn on inflammation.

    youdao

  • 某些脂肪酸看上去细菌入侵TLR4的意义,促进正常巨噬细胞误导脂肪酸去敌视攻击炎症

    He says that some fatty acids look like the bacterial invaders that TLR4 senses, prompting normal macrophages to mistake fatty acids for the enemy and turn on inflammation.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定