Collecting evidence from compromised systems is the job of computer forensics experts, the Sherlock Holmes of the digital age.
从遭遇安全威胁的系统中搜集证据是计算机“取证”专家(数字时代的福尔摩斯)的工作。
So far, RSA said it has only witnessed one instance of the attack and has seen no evidence that stolen credentials are being used to log in to compromised accounts in real time.
幸运的是,目前为止,RSA组织表示他们只目击到一次类似的攻击,而且也没有证据表明有犯罪分子使用这种被窃取的信用卡帐号登录过网银系统。
Just over the course of a single academic term, procrastinating college students had such evidence of compromised immune systems as more colds and flu, more gastrointestinal problems.
仅通过一个学期的大学课程,拖延的大学生的免疫系统明显受到威胁,会更容易出现伤风,感冒以及肠胃问题。
The levels below are based on the best available evidence, but are probably higher than the level at which the infant is compromised.
血压水平以下是基于现有的最佳证据,但很可能较那一水平高的婴儿受到损害。
Though Lulz made claims that it attacked the CIA website, there was no evidence that sensitive data in the agency's internal computer network had been compromised.
虽然LulzSecurity声称他们对中情局网站发动了攻击,但没有证据显示中央情报局内部电脑网络中的敏感资料被窃取。
I have already described important structures of the kernel memory, so now we can use this knowledge to find evidence in the physical memory of the compromised machine.
到目前为止,我已经把所有内核进行内存管理的重要的数据结构介绍了一遍,接下来,我们就可以用前面所讲的知识来对目标计算机进行物理内存镜像的分析了。
I have already described important structures of the kernel memory, so now we can use this knowledge to find evidence in the physical memory of the compromised machine.
到目前为止,我已经把所有内核进行内存管理的重要的数据结构介绍了一遍,接下来,我们就可以用前面所讲的知识来对目标计算机进行物理内存镜像的分析了。
应用推荐