This is a handy thing to look for when investigating a compromised system because attackers often delete logs to hide their tracks.
在遭到破坏的系统中查找相关内容时,这是非常有用的内容,因为攻击者通常会删除日志以隐藏他们的踪迹。
When you find a compromised system, simply download the clean binaries, set your PATH environment variable to use them, and start looking for backdoors.
当你发现一个隐患的系统,只要下载二进制文件的清理,设置你的PATH环境变量来使用他们,并开始寻找后门。
But this time the financial system is compromised: one Scottish bank is already down; Edinburgh fund managers will suffer; and Scottish firms too need bank loans.
但这一次金融系统妥协了:一家苏格兰银行已经倒下;爱丁堡的基金经理们将迎来寒冬期;苏格兰的各家公司也亟需银行的贷款。
There are other circumstances where the system can already be so compromised that no more design debt can be tolerated or the lack of correctness of the software can cause financial loss (or worse).
还有其他的状况:系统已经糟糕到一定地步,不允许再发生任何技术债务,软件再有任何差池,都将会导致财务上的损失(甚至更差)。
By restricting the permissions that each component has, both attacking the system as well as achieving much with a single compromised component is made significantly more difficult.
通过限制每个组件的权限,使得攻击系统或通过攻击一个组件来获取更多都变得极其困难。
With the system compromised, the attacker carries out whatever the next step may be-whether it's to gather data or compromise another system.
系统被破坏后,攻击者将实施以下任一步骤——收集数据或破坏另一个系统。
This is significant if the compromised password belongs to an administrator of the system.
系统管理员的密码也是非常重要的。
This kind of safety can be provided to applications even if their operating system is fundamentally compromised by malware.
即使安装应用程序的操作系统从根本上已经被黑客软件所劫持,此类的安全措施仍能被加载于运用程序上。
When the body has too much toxic burden from chemotherapy and radiation the immune system is either compromised or destroyed, hence.
当身体因化疗、放疗有太多毒性负担时,免疫系统要么妥协,要么被摧毁,所以。
However, if you have technical debt already, you must work around those compromised parts of the system to add new features.
但是,如果您已经拥有技术债务,则必须解决系统中那些折衷部分才能添加新功能。
His weight had dropped to barely 84 pounds, he suffered from anemia, and his immune system was seriously compromised.
他的体重一度降至84英镑以下,免疫系统受到了严重伤害,而且他还患有贫血。
But what do you do if a system has been compromised and used for illegal or unauthorized activities?
但若系统已遭遇安全威胁并被用于非法或未经授权的活动,又该怎么办呢?
Should an ID become compromised, a new public key can be generated by the creation of a new ID, locking the old ID out of the system.
如果一个ID存在安全危险,那么应该通过创建一个新的ID生成一个新的公钥,在系统中锁定老的ID。
Not for healthy people, insists Dr Pace, but those with a compromised immune system or who are at risk of pulmonary diseases—the elderly, say—may want to take precautions.
对健康人自然没什么,佩斯博士强调,但是对于那些免疫系统缺陷或者那些易患肺部疾病的人群——就是老人——最好做好预防工作。
But successful outcomes also depend greatly on the extent of the drug resistance, the severity of the disease and whether the patient's immune system is compromised.
但是,成功的结果还极大地取决于耐药程度、疾病的严重程度以及患者的免疫系统是否受到损害。
By putting together a backup and recovery strategy for an instance, you can potentially avoid having to do a complete operating system restore when faced with a compromised instance.
通过为实例准备备份与恢复策略,可在遇到实例损坏问题时,不必进行整个操作系统恢复。
If it occurs at other times, it's a red flag warning that the system has been compromised.
如果它出现在其他时候,则就是系统受到危害的危险警报。
Similarly, storing the database or database-access information on the machine on which the Web server is running can introduce security problems if that system is penetrated and compromised.
同样,如果系统被侵入并受到破坏,那么将数据库或数据库访问信息存储在正在运行Web服务器的机器上会引发安全性问题。
By providing strong, standards-based encryption and integrity algorithms, SSL provides system developers and users with confidence that data will not be compromised in the Internet.
通过提供强大的、基于标准的加密和完整性算法,ssl向系统开发人员和用户保证数据在Internet上不会受到危害。
Linux locks down certain files and directories so that even if a user account is compromised, that user can't run system critical applications.
Linux锁定了某些文件和目录,这样即使帐户被盗,该用户也无法运行系统的关键程序。
"Probably not, if your immune system is not compromised in some way," lead author Norman R. Pace says.
主作者Normanr .Pace说:“大概不会,如果你的免疫系统正常的话”。
Usually when my digestive system is compromised it is because I have given it away to another.
通常的,当我的消化系统被损伤时,这是由于我已经将它送给了别人。
China's choice of the corporation capital mode based on the analysis of the Sino-American system should be compromised capital system.
以中美制度分析为基础看公司资本制度模式选择,中国应采取折衷授权资本制。
Finally led to the efficiency of the system compromised, a significant number of users complain about spam over and run the system slow and incomplete features.
最后导致系统的运行效率大打折扣,相当多的使用者都抱怨系统垃圾信息过多和运行速度缓慢,而且功能不齐全。
But he warned that children and people who have compromised immune system should be aware of the risks.
但他也警告说,免疫系统有问题的孩子和大人应当对此风险有所警惕。
The paper goes through step by step on a system that was compromised, with system logs and keystrokes to verify each step.
这个文档根据系统日志和击键记录一步步地看这个被入侵的系统上发生了些什么。
You have likely been compromised through some means and the attacker has persistent access to your system, or has planted some malware (possibly a root-kit) that is molesting your server.
你有可能被破解攻击者通过某种手段和持续访问您的系统,或者种植一些恶意软件(可能是一个根工具包),骚扰你的服务器。
Useful information could be abstracted from audit log of computers by most of host-based intrusion detection systems. Therefore, audit system become a target to be compromised by hackers or attackers.
审计日志是多种入侵检测系统的重要信息来源,因而审计系统就成为黑客或攻击者对付的主要目标。
Additionally, having one insecure account on your system can result in your entire network being compromised.
另外,不安全的账号会对您的整个网络造成威胁。
Programs that log system activities can be similarly modified, so that when the systems administrator checks the logs, everything looks normal despite the fact that the system has been compromised.
记录系统活动的程序也能做类似的修改,从而当系统管理员检查日志时,尽管系统已处于危险之中,但一切看来都正常。
应用推荐