• 通过阻塞特定IPHTTP请求处理可以防止暴力破解口令攻击

    The blocking of processing HTTP requests for particular IPs prevents brute force password attacks.

    youdao

  • 仿真实验表明身份认证模型能够承受各种口令攻击有效过滤非法用户的登录请求,具有好的棒性可用性

    Simulation tests show that the identity authentication model can stand with password attacks, filtrate out invalid login requests availably, and have advantages of good robustness and reliability.

    youdao

  • 防止这种类型攻击最佳方法加强策略使口令很难猜中

    The best way to prevent this type of attack is to enforce policies that make passwords difficult to guess.

    youdao

  • 通过修改url攻击可以数据库结构逆向开发有可能找到用户姓名口令甚至信用卡

    By modifying the URL, attackers can reverse-engineer the database structure and potentially find users' names, passwords, or even credit card Numbers.

    youdao

  • 利用这些方案计算机系统不仅监测控制口令的使用,而且可以抗击许多对口令伪造攻击

    By using these schemes, computer system can not only supervises and controls all passwords, but also withstand all attack of forging password.

    youdao

  • 如果有人攻击一次交易,他不要破译加密口令IS P层面上得到所需一切

    If someone wanted to attack a transaction, they could get everything they need at the ISP level, without breaking an encrypted password.

    youdao

  • EKE协议基于口令密钥交换协议通过使用对称密钥加密体制公钥加密体制,能够很好地抵抗离线字典攻击

    EKE is a kind of key exchange protocol based on week password and can resist offline dictionary attacks by use of symmetric key encryption and public key encryption.

    youdao

  • 他们的方案中,用户随意更改口令远程系统需要存储用户口令验证表,防止重放攻击

    In their scheme users can change their passwords freely and the remote system does not need the directory of passwords or verification tables, and replay attack can be avoided.

    youdao

  • 这样增加了安全性因为攻击需要知道用户口令并且能够提供第二因子客户端进行访问,如e -mail账号移动电话等。

    Security is increased because an attacker needs to know the user's password and have access to whatever provides the second factor, such ane-mail account or cell phone.

    youdao

  • 基于验证元口令认证密钥交换协议基本安全目标抵抗字典攻击服务器泄露攻击

    The fundamental security goal of verifier-based password-authenticated key exchange protocol is security against dictionary attack and server compromise attack.

    youdao

  • 由于每次登录时用户提交认证信息都是固定不变传统口令认证机制容易遭受回放攻击

    Traditional password authentication schemes are vulnerable to replay attacks because of the fixed password and unchanged messages submitted by users for verification.

    youdao

  • 利用漏洞对系统进行攻击成为了黑客们惯用本文针对管理员账号口令一安全漏洞,采用了一些基本攻击方法,详细描述了具体地攻击过程

    In this paper, we focus on the vulnerability that the administrator account and password are empty, using some basic methods of attack, describing in detail the process of attacks.

    youdao

  • 传统身份认证只是一种用户口令的简单组合充满黑客和攻击网络环境下这种认证方式已经不能充分保证应用系统安全

    Traditional ID authentication combines a user name and a password, which is not sufficient enough to assure the security of application systems in an environment full of hackers network attacks.

    youdao

  • 针对服务器泄漏攻击给出抵抗这种攻击方法提出了一个新的基于口令认证密钥协商协议

    Attack, a method of resisting server compromise attack is given and a new password-based authenticated key agreement protocol is proposed.

    youdao

  • 方法保持原有协议基本体系不变的前提下,较大地提高安全性,有效地防范口令猜测攻击口令泄漏等。

    This way improved its security against password guessing attacks and password leaking without any change of the original protocol framework.

    youdao

  • 主要手法有:口令漏洞攻击SQLServer扩展存储过程攻击、SQL注入(SQLInjection)、窃取备份

    The main way: password loophole attack, SQL Server extended stored procedure attack, SQL Injection (SQL Injection), steals backup, etc.

    youdao

  • 特点是网络用户可以自由选择口令,通过口令增加时间抵抗重放攻击

    Not only can the network users freely choose their preferred passwords, but the network system can also be protected against replaying by time stamping the password.

    youdao

  • 特点是网络用户可以自由选择口令,通过口令增加时间抵抗重放攻击

    Not only can the network users freely choose their preferred passwords, but the network system can also be protected against replaying by time stamping the password.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定