漏洞扫描技术是一门新兴的技术,它从另一个角度解决网络安全问题。
Vulnerability scanning technology is an emerging technology, to solve it from another angle issue of network security.
最后,作为对网络漏洞扫描技术的补充,简要介绍和讨论了系统脆弱性分析技术。
Finally, as a complement to the leak scan technology, vulnerability analysis technology is also introduced and discussed briefly in the paper.
主机安全正成为每一个计算机用户都面临的紧迫问题,主机漏洞扫描技术就是为主机安全提供保证的一项重要的安全技术。
Host security is becoming an urgent problem that every computer user has to face. Host hole scanning technique is an important security technology to provide security guarantee for host.
然后,介绍了现阶段安全扫描软件所采用的安全扫描技术,介绍了远程操作系统识别技术、端口扫描技术,并分析研究了基于插件的漏洞扫描技术。
Then, we introduced the technology of network security detection in common secure scanner including the remote OS detection, port scanning and vulnerability scanning based on using plug-in.
此外,标准的技术,如基于网络的漏洞扫描通常被IaaS提供商所禁止,原因之一是无法把友好的扫描从攻击者的活动区别开来。
Also, standard tech-niques such as network-based vulnerability scanning are usually forbidden by IaaS providers because, for example, friendly scans can't be distinguished from at-tacker activity.
毕竟物联网涉及多个层次的安全,需要持续扫描漏洞的技术。
After all, the Internet of things involves multiple levels of security, the need for continuous scanning vulnerability technology.
总结新扫描技术将持续进化并不断攻击贵网络,探测安全上的漏洞和弱点。
New scanning techniques will continue to evolve and bombard your network, probing for holes and weak spots in your security.
该文提出了基于木马的漏洞扫描模型,并对其攻击原理以及关键攻击技术实现作了进一步的研究。
This article proposed scans the model based on wooden horse's crack, and realized to its attack principle as well as the key attack technology has done the further research.
利用多线程技术实现了CGI漏洞扫描器,扫描速度快且易于漏洞扩展。
A scanner of holes in CGI is implemented in multi-thread technology. Its scan speed is very quick and holes are easily extended.
利用多线程技术实现了CGI漏洞扫描器,扫描速度快且易于漏洞扩展。
A scanner of holes in CGI is implemented in multi-thread technology. Its scan speed is very quick and holes are easily extended.
应用推荐