他说,组织的名字并不重要,他们仍然有能力实施攻击。
'the name of the group is not important. They still have the capability,' he said.
非授权访问,实施攻击的技术包括目录攻击和伪造消息。
Unauthorized access using techniques such as dictionary attack and falsified message.
系统损害,实施攻击的技术包括破坏内存空间或xml病毒。
System compromise using methods such as memory space breach or XML virus.
应用推荐