• The Design and Implementation of a Hacker Attack Toolkit;

    但是 完全阻止黑客的攻击是不可能

    youdao

  • Program design, network technology, hacker attack and defense, and other e-books.

    程序设计网络技术黑客攻防各种电子书。

    youdao

  • This thesis firstly introduces IDS fundamental, hacker attack principle and common attack methods.

    本文首先介绍了关于入侵检测基本原理黑客攻击原理常用方法

    youdao

  • One form of hacker attack even involves feeding bad data to ARP tables, a practice known as ARP poisoning.

    黑客攻击一种形式包括修改恶意数据ARP映射缓存,即所谓的ARP中毒

    youdao

  • However as hacker attack and network virus emerge in endlessly, the problem of network security has become very serious.

    然而层出不穷黑客攻击网络病毒事件使得网络安全问题突显出来

    youdao

  • He said Sony has not received any reports of illegal USES of stolen information, and the company is continuing its probe into the hacker attack.

    表示索尼没有收到关于非法使用被盗信息报道,公司正在继续黑客攻击事件的调查

    youdao

  • The purpose of the article is to provide the reference model for the research, design and implementation of the precaution system against hacker attack.

    目的我国黑客入侵防范体系研究设计实现提供一个参考模型

    youdao

  • On the other side, hacker attack, virus spreading and mixed network attacks add increasingly, so that the network security defensive line is full frailness.

    一方面,黑客攻击病毒传播以及形形色色网络攻击日益增加,网络安全防线十分脆弱。

    youdao

  • At present constant enlargement in network size and hacker attack means complicated day-by-day, the demands of people for the network security grow with each passing day.

    目前随着网络规模不断扩大黑客攻击手段日益复杂人们对于网络安全需求与日俱增

    youdao

  • But, it has not only its own features, such as interconnected, openning, sharing information, etc. also lots of unsafety factors, such as network virus, hacker attack, ect. exist.

    但是,高校校园网具有互联性开放性共享性特点,具有众多不安全因素网络病毒黑客攻击

    youdao

  • But in Facebook forum, the statement of many player report EA may be complete it is a kind of evadable only, do not have what hacker attack at all, it is the server was hanged only just.

    Facebook论坛中,不少玩家反映EA说法可能完全只是托词根本没有什么黑客攻击,只是服务器掉了而已。

    youdao

  • Media companies only concentrate on the hackers who attack computer systems rather than the defenders, so some people use the term "hacker" to mean only attacking hackers.

    媒体公司关注那些攻击计算机系统黑客往往忽视那些计算机的保卫者所以有些使用术语黑客表示只进行攻击的黑客。

    youdao

  • Mr Kamkar detailed the attack during a presentation at the Black Hat hacker conference.

    卡门先生黑客大会报告会上详细说明了此种攻击

    youdao

  • But always remember that a hacker might compromise an application remotely (via the previous techniques), and then leverage internal attack methods to do even more harm.

    始终要记住黑客可能远程危害一个应用程序(通过前面技术),然后利用内部攻击方法进行更多危害

    youdao

  • This section describes potential security attack methods from an attacker or hacker.

    描述了攻击或者黑客可以使用潜在的安全攻击方法

    youdao

  • The attack, thought up by hacker Samy Kamkar, exploits shortcomings in many routers to find out a key identification number.

    这种黑客萨米·卡门出来攻击方法,利用存在很多路由器中的众多漏洞,查出一个关键身份识别

    youdao

  • The message referred to an attack by hacking outfit Anonymous - the same group which tried to take down Amazon last year - following Sony's lawsuit against another hacker, George Hotz.

    条消息提及黑客组织Anonymous(匿名)发动的攻击——同一组织去年试图令亚马逊宕掉——在索尼起诉另一黑客乔治·霍兹(George Hotz)之后。

    youdao

  • Of the applications, Web sites, and services hosted on the Web, more than a fair share will experience some sort of mischief at the hands of a hacker intent on carrying out some sort of attack.

    对于Web托管应用程序、Web站点以及服务,其中相当一部分都会遭遇意图实施某类攻击黑客带来的破坏。

    youdao

  • Cisco is warning of three vulnerabilities within its Internet Operating System software that could allow a denial-of-service attack or let a hacker run arbitrary code on an affected switch router.

    Cisco已经警告,在InternetOperatingSystem软件具有三个可能引发拒绝服务,运行任意代码系统出错的漏洞. "因为运行IOS的设备跨越数个不同类型的网络,第二轮大型拒绝服务攻击可能因此而起."

    youdao

  • A hacker could use this attack technique to retrieve, corrupt, or delete data.

    黑客可以使用这种攻击技巧检索破坏删除数据

    youdao

  • In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.

    缓冲溢出攻击黑客利用程序执行期间存储分配中的特定计算机程序漏洞

    youdao

  • Within the hacker community there's always been a certain amount of disdain for 'script kiddies' — people who don't really understand the systems they attack but use off-the-shelf tools.

    黑客圈子里,人们向来一定程度鄙视脚本小子”——这些并不真正了解他们攻击系统知道利用现成的工具。

    youdao

  • Now let's modify the message, as a hacker might using a "man in the middle" attack

    现在我们来修改消息就像使用“中间人”攻击黑客那样

    youdao

  • The hacker was acquitted in the trial that ensued, but the judgement revealed flaws in the 1990 Police and Justice Bill, consequently amended to ban any and all denial of service attack.

    虽然随后审判黑客无罪释放,但是揭示出1990年的Policeand JusticeBill(译者注:英国的警察司法法案)存在缺陷,从而通过修正案禁止任何拒绝服务攻击。

    youdao

  • Kocher fully expects that the hacker community to attack BD + and that its backup mechanisms will be needed.

    Kocher完全预料黑客社区攻击BD +,因而必须后备机制

    youdao

  • Since TCP/IP shows less consideration to security, some shortcomings in security are in existence, which provides Hacker opportunities to attack network.

    IP协议由于缺乏安全性考虑存在一定的安全缺陷,黑客攻击网络可乘之机。

    youdao

  • This paper introduced ICMP and its characteristics, analyzing the hacker make use of ICMP but output attack: ICMP flood and redirect, and provided the homologous the method of solution to them.

    介绍ICMP协议及其特性分析黑客利用ICMP协议产生攻击:ICMP洪流重定向提供了相应解决方法

    youdao

  • This paper introduced ICMP and its characteristics, analyzing the hacker make use of ICMP but output attack: ICMP flood and redirect, and provided the homologous the method of solution to them.

    介绍ICMP协议及其特性分析黑客利用ICMP协议产生攻击:ICMP洪流重定向提供了相应解决方法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定