• Upon detecting such a man-in-the-middle attack, appropriate alerting actions are taken.

    检测这样的人中,中间人攻击适当采取警戒行动

    youdao

  • The company finally realizes that their network is suffering a man-in-the-middle attack.

    公司最后发现他们的网络正在遭受中间人攻击

    youdao

  • Predefined client certificates guard against a sophisticated attacker performing a man-in-the-middle attack.

    预定义客户端证书防御执行中间人攻击复杂攻击者。

    youdao

  • Which of the following encryption techniques will BEST protect a wireless network from a man-in-the-middle attack?

    下面哪种加密技术可以最好保护无线网络遭受中间人攻击

    youdao

  • Systems and methods of detecting, and dealing with, a man-in-the-middle attack in wireless communications systems are described.

    系统检测方法处理一个人点上无线通信系统中描述攻击

    youdao

  • The example USES CNG classes, a named pipes transport, and interactive console Windows to demonstrate security solutions for a man-in-the-middle attack.

    范例会使用CNG类别具名管道传输互动式主控台视窗示范拦截式攻击安全性方案

    youdao

  • Another type of session hijacking is known as a man-in-the-middle attack, where the attacker, using a sniffer, can observe the communication between devices and collect the data that is transmitted.

    一类会话劫持叫做中间人攻击攻击利用探测程序可以观测到设备之间通信收集发送出去数据

    youdao

  • This is not part of the SSL standard, but is highly recommended to prevent a man in the middle attack (MITM).

    虽然不是SSL标准一部分但是这个步骤却是高度建议的,它可以防止中间人攻击

    youdao

  • Now let's modify the message, as a hacker might using a "man in the middle" attack

    现在我们来修改消息就像使用“中间人”攻击黑客那样

    youdao

  • Now let's modify the message, as a hacker might using a "man in the middle" attack

    现在我们来修改消息就像使用“中间人”攻击黑客那样

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定