"The evidence for using kites to move large stones is no better or worse than the evidence for the brute force method," Gharib says.
“使用风筝来移动大石头的证据和使用蛮力方式的证据差不多。”Gharib说。
In fact, Monte Carlo techniques are much faster than brute force.
事实上,蒙特卡罗技术要比暴力破解技术快得多。
We can simplify the solution by taking a brute force approach, that is, doing it in two steps.
通过采用“蛮力”方法,我们可以简化这个解决方案,即,采用两个步骤就可以完成。
The blocking of processing HTTP requests for particular IPs prevents brute force password attacks.
通过阻塞特定IP的HTTP请求处理,可以防止暴力破解口令攻击。
This is the brute force approach, where the PHP script is really just pounding out the XML output manually.
这是一种强力(brute force)的方法,php脚本实际上是手动生成XML输出。
Of course, never assume that brute force or blind luck are the only possible ways to guess the correct sequence.
当然,强力攻击或胡乱猜测并不是猜出正确序列的惟一方法。
Dictionary attack — Guessing the password of a valid user using a brute force search through dictionary words.
字典攻击——根据字典词汇,使用蛮力搜索的方式推测一个有效用户的密码。
The games, which have strange rules, involve a spirit that has more to do with brute force than with athletics.
运动会的比赛项目规则奇特,与其说是田径比赛,不如说是大力士的较量。
A computer can win through brute force by taking opening moves that lead to a game it has already played out and won.
计算机可以通过蛮力取胜,采用开局着法,而导致它赢得了此场比赛。
The first is the brute force method, which is to look at all the requests and filter based on different criteria.
第一种是强烈操作方法,它将查看所有的请求,以及基于不同标准的过滤。
The first is the brute force method, which is to look at all of the requests and then filter based on different criteria.
第一个是强力的方法,就是查看所有的请求,然后根据不同的标准进行过滤。
The larger the key, the greater the possible number of values and the harder it is to crack using brute force techniques.
密钥越大,可能值的数量就越大,使用蛮力技术破解它就越难。
However the current dilemma of either brute force search and discard vs caching is dealing in old paradigms of thought.
然而,现在无论使用穷举搜索(brute force search)还是缓存(discardvs caching)都属于陈旧的思维模式。
Set user policy to enforce strong passwords to protect against brute force, social engineering attempts, and dictionary attacks.
设置用户策略,实施强大的密码来防御强力攻击、社会工程企图(social engineering attempts)和字典攻击。
These maybe totally innocent attempts at connecting from a local machine within your network or a brute force attempt from an unknown host.
这些可能是来自您的网络中本地机器的完全无恶意的连接尝试,也可能是来自未知主机的强力连接尝试。
I cannot imagine anyone thinks that caching is a good idea and a permanent solution to search. And clearly brute force hits are too expensive.
笔者不认为,缓存是一个好的、永久的搜索处理方式,但很显然穷举搜索的成本又太高。
This isn't to say it's always best to use brute force, but in Lucene, if there's a simple way to do it, that way probably makes the most sense.
这不是说最好的办法是蛮力,但在Lucene中,如果做一件事有一种简单的办法,它可能是最明智的。
The brute force approach to getting things going is to visit Castor's download page and write down the version of each dependency that you need.
要运行Castor,比较麻烦的方法就是,首先访问 Castor的下载页面并记下所需的每个依赖项的版本。
Put another way, a 64-bit password would require 2 raised to the power of 64 attempts to crack it by brute force—in short, 18 billion billion attempts.
换句话说,一个64字节密码对那种使用蛮力破解密码的尝试从2升到了64,简言之,就是18万万亿次的尝试。
We perform many minor miracles through trial and error, excessive use of brute force, and lots and lots of testing, but--so often--it's not enough.
我们总是通过试错,过度的使用暴力(译者注:可能是指破坏程序结构的代码),大量的测试去完成一项工作;尽管很漂亮,但是常常是不够的。
A brute force attack is the most comprehensive form of attack, though it may often take a long time to work depending on the complexity of the password.
蛮力攻击是最全面的攻击形式,虽然它通常需要很长的时间工作,这取决于密码的复杂程度。
Brute force: You can simply make sure that audit information is populated with the correct values anywhere an object requiring audit information is modified.
生硬的方式:在需要修改审计信息的对象的任何地方,都确保用正确的值填充审计信息。
These changes don't substantially add to the security of your machine, but a common script that just tries brute force attacks at the standard port 22 will fail harmlessly.
这些修改不会显著增强计算机的安全性,但是只尝试强力攻击标准端口22的一般脚本会失败,不会造成损害。
As economies become richer, they can rely less and less on the brute force of capital spending, coupled with a steady flow of cheap rural migrants, to fuel their expansion.
随着新兴经济体越来越富,他们会越来越少地依赖资本支出的强势支撑,再加上廉价农村劳动力源源不断的输入,又刺激了他们的扩张。
When trying to attach over the Internet to the site, the attacker USES a password generator tool, such as L0phtCrack, which launches a brute force attack against the server.
当试图通过因特网连接到该站点时,攻击者使用一个密码发生器工具(如l0phtcrack),它启动对服务器的蛮力攻击。
Of course, to combat against attacks that try to guess and brute force attack these passwords, it is best to ensure the Settings are configured to work with your security policy.
当然,为了阻止入侵者猜密码或者强制攻击这些密码,最好确保该设置与你的其他安全策略一起使用。
Of course, to combat against attacks that try to guess and brute force attack these passwords, it is best to ensure the Settings are configured to work with your security policy.
当然,为了阻止入侵者猜密码或者强制攻击这些密码,最好确保该设置与你的其他安全策略一起使用。
应用推荐