部署入侵监测和防入侵系统。
Deploy intrusion-detection and intrusion-prevention systems.
他们的目标是想尽办法入侵系统,所以他们会在您的设计中寻找漏洞。
Their goal is to break your systems any way they can, and look for holes in your design as they do so.
系统调用劫持是黑客入侵系统后保留后门常用的一项技术。
System call hijacking is a common technology used by hackers to keep backdoors on the compromised sys-tem.
而IDS则成为了一个备份系统,因为很少人能入侵系统而激活报警机制。
The IDS will become a backup system, rarely forced to sound an alarm that someone has actually gotten past your secure threshold.
本文提出的算法以及入侵系统模型使用入侵检测数据集kddcup99作为测试集验证性能。
The algorithm proposed in this paper realizes the corresponding module and validates the performance in the KDDCUP99 intrusion detection data set.
按计算机病毒入侵系统的途径可将计算机病毒分为源码病毒、入侵病毒、操作系统病毒和外壳病毒。
According to a computer virus intrusion system approach can be divided into source virus, computer virus virus, operating system viruses and shell viruses.
审计线索不仅突出了网络上脆弱之处,而且还能识别出一次内部作业中用于入侵系统的口令和设备。
The audit trail not only highlights points of vulnerability on a network, but can also identify the password and equipment used to invade the system during an inside job.
但是现在哈佛大学的研究人员表示,这种蛋白的确是有不为人知的功能,它是大脑抵御细菌和其他微生物入侵系统的一部分。
But now researchers at Harvard suggest that the protein has a real and unexpected function - it may be part of the brain's normal defenses against invading bacteria and other microbes.
您知道Snort是一种入侵检测系统,但它是如何检测入侵的呢?
You know that Snort is an intrusion detection system, but how does it detect intrusion?
堡垒的保护更容易因为它构造更简单:它没有窗口、几乎没有几道门,没有天窗或通风系统这些入侵者可能利用的东西。
A fortress is easier to protect because it's simpler: it has no windows, few doors, no skylights, or vent systems through which an intruder might sneak.
这只是对我们的免疫系统试图防御的潜在外来入侵者的分类介绍。
Just an introduction to the classes of potential foreign invaders that our immune system tries to defend us against.
入侵者入侵您的系统可能是出于这两个原因之一:为了获取他们本不应该拥有的信息,或者为了改变系统的行为。
Intruders might invade your systems for one of two reasons: to gain access to information that they should not have or to alter the behavior of a system.
满足这些需求的第一组工具是系统审计和基于主机的入侵检测。
The first tools for meeting these requirements are system auditing and host-based intrusion detection.
当某些黑客入侵您的系统只是为了取乐时,这将是一个问题。
This can be a problem when some hackers break into systems simply for the fun of it.
现在,攻击者(外部或内部)仅需入侵一个系统就可以访问所有主数据。
Now an attacker (external or internal) needs to compromise only a single system to get access to all master data.
美国联邦航空局优先考虑是减少系统内跑道入侵的风险,同时最大限度地提高运营效率,确保机场容量。
One of the FAA's top priorities is to reduce the risk of runway incursions in the system while maximizing operational efficiency and ensuring airport capacity.
在黑客领域,真正的挑战是我可以做得比你更好,我可以清楚掉你的系统上装的所有防入侵安全组件。
In hacking, it is more like a challenge that I can do better than you, I can eliminate all the security components you've installed on your system to prevent hacking.
研究人员希望通过展示如何入侵某些系统的方式,督促计算机行业采取措施使基础设施和消费者更加的安全。
Researchers hope that by showing off how to hack certain systems, the computer industry will take steps to make infrastructure and consumers safer.
冈萨雷斯和他的俄国同伙建立了一套极为先进的系统,用于入侵、下载信用卡号码。
Gonzalez and his Russian helpers are said to have set up a sophisticated system for hacking into and downloading credit card Numbers.
作者很快得出了两个重要的主题:入侵检测系统,IDS,和旁路过滤。
The authors quickly jump into two important topics: problems with Intrusion Detection Systems, or IDSs, and bypassing filters.
使用这一法案进行的诉讼,较为典型的起诉对象是入侵他人电脑系统的黑客。
More typically, prosecutions under the act have involved people who hack into computer systems.
还有一个办法是调整你的IDS(入侵检测系统)和IPS(入侵防御系统)来查找有僵尸嫌疑的行为。
Another approach is to fine-tune your IDS (intrusion detection system) and IPS (intrusion detection and prevention system) to look for botlike activity.
入侵探测系统(IDSes)等现有的安全解决方案不了解探测不正当活动所需的数据库协议和结构。
Existing security solutions, such as intrusion detection systems (IDSes), lack the knowledge of database protocols and structures required to detect inappropriate activities.
这个步骤的目标是以一种特殊方式格式化有效负载,以便它能躲避壁垒森严的入侵探测系统(IDSs)。
The goal of this step is to format the payload in such a way that it can evade entrenched intrusion-detection systems (IDSs).
还有很多入侵检测系统(IDS),例如非常流行的snort和logsnorter。
Then there are a number of intrusion detection systems (IDS) like the very popular snort and logsnorter.
可以证明,Snort是市面上最好、最易用或许也是最便宜的入侵检测系统。
Snort is arguably the best and easiest-to-use, as well as (certainly) the cheapest, intrusion detection system you'll find.
为了加强安全,可以考虑在所有机器上安装和配置入侵检测系统(IDS),例如Snort。
For added security, consider installing and configuring an Intrusion Detection System (IDS), such as Snort, on each machine.
4—决定并找到入侵你的目标系统是非常关键的,这意味着你必须扫描所有的端口,可以用‘Namp’做到这一点。
4 - It is very essential to determine and get an access to the operating system you're targeting towards, this means that you have to run a scan of the ports and for this purpose, 'Nmap' can be used.
4—决定并找到入侵你的目标系统是非常关键的,这意味着你必须扫描所有的端口,可以用‘Namp’做到这一点。
4 - It is very essential to determine and get an access to the operating system you're targeting towards, this means that you have to run a scan of the ports and for this purpose, 'Nmap' can be used.
应用推荐