Out-of-band plug-ins (host spoofing).
带外插件(主机欺骗)。
Third, spoofing attacks are difficult to execute.
第三,欺骗攻击难以执行。
This process is sometimes referred to as spoofing.
这种过程有时也称为欺骗。
The logging framework does not attempt to prevent spoofing.
日志框架本身无法避免日志输出的欺骗行为。
This is called email spoofing and is relatively easy to do.
这叫做电子邮件和欺骗是比较容易的事。
Spoofing can be interpreted as the network security term used for forging.
电子欺骗可以解释成用于伪造的网络安全术语。
These kinds of attacks require the same level of skill as IP spoofing.
这些类型的攻击需要与IP欺骗同等级别的技巧。
This is not to track everyone's mail, but to prevent bad guys from spoofing good guys.
这个不需要追踪每一封信,但是能够阻止恶意入侵者的欺骗。
Only legitimate users can access the services (including the denial of spoofing schemes).
只有合法用户能访问服务(包括拒绝欺诈阴谋)。
Web site developers should be wary of anyone spoofing the GET and POST requests sent to them.
网站开发人员应该小心发送给他们的GET和POST请求受到欺骗。
This was demonstrated recently at the Chaos Conference in Berlin by spoofing a real certificate.
近日在柏林举办的Chaos会议上,演讲者通过仿冒一份真实的证书演示了这一漏洞。
Form spoofing is when someone makes a post to one of your forms from somewhere you didn't expect.
表单欺骗是指有人把post从某个不恰当的位置发到您的表单中。
This helps to protect the corporate domain (and the company's reputation) from spoofing and identity forging.
这有助于保护公司域(及声望)不受盗用和身份伪造的侵害。
The large number of attacking machines and the use of source IP address spoofing make the traceback impossible.
大量的攻击机器且使用源地址欺骗使得现有的跟踪是不可能的。
As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.
攻击者使用IP欺骗来隐藏自己的真实地址,因此人们开始研究IP源回溯技术。
Finally, you saw how to extend Ganglia using an in-band script and how to use out-of-band scripts with host spoofing.
最后,您看到了如何使用带内脚本扩展Ganglia以及如何使用带有主机欺骗的带外脚本。
This paper expatiate on the theory of network protocol spoofing commonly, the ICMP protocol and its leak are analyzed in details.
阐述了网络协议欺骗的一般原理,详细分析了ICMP协议及其存在的漏洞。
The Prevention of ARP spoofing which has widely spread in campus network is highly paid attention to by network administrators and users.
如何防范校园网络流行的ARP欺骗攻击,已成为网络管理员与用户高度关注的问题。
First discovered in the ‘90s, caller ID spoofing allows an unscrupulous sort to choose whatever number he or she would like for their caller ID.
在九十年代时,人们首次发现,来电身份伪装可以让用户肆无忌惮的选择任意号码作为他们的来电身份。
In this paper were mainly discussed the process and the guard measure of session hijack technology which is based on ARP spoofing and TCP protocol.
本文主要讨论了借助ARP欺骗,实现的基于TCP协议的会话劫持技术的全过程及其防范措施。
ARP spoofing and ICMP redirection attack are used frequently, both of them can sniff the Ethernet or attack the target by means of denial of service.
ARP欺骗及ICM P重定向攻击是以太网中常用的攻击手段,两者都可达到监听网络或对目标主机进行拒绝服务攻击的效果。
For instance, pseudo-random Numbers are used for process IDs and packet IDs, which makes spoofing significantly more difficult for a would-be attacker.
例如,伪随机数可用于进程ID和包id,这使得那些想要进行攻击的人很难进行欺骗。
The DAGR includes a Graphical User Interface (GUI) and incorporates a next-generation security device called the Selective Availability Anti-Spoofing Module.
该DAGR包括一个图形用户界面(GUI),并采用了新一代安全装置称为可选择有效反干扰模块。
Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.
针对常见的IP地址欺骗、IP源路由欺骗、ICM P重定向欺骗、IP劫持等网络攻击给予了分析并在过滤管理模块中给出了防御的方法。
ARP spoofing attack is a common phenomenon in recent networking industry, the article analyzes the ARP protocol is given several ways to prevent ARP attack.
ARP欺骗攻击是近来网络行业普遍的现象,文章通过分析ARP协议,给出了ARP攻击防范的几种方法。
Because the reverse domain lookup can be anything the owner of the address block wants, the second lookup is necessary to ensure that no spoofing is taking place.
因为反向域名搜索可以由地址块所有者确定,所以要防止ip欺骗的发生,必须进行第二次查找。
As analysing the principle of the ARP spoofing, some solutions for the spoofing are mentioned, such as the binding of MAC IP address and the configuration of switch.
随后分析了ARP欺骗的实现原理,给出了MACIP绑定、交换机设置等一系列解决问题的方案。
This paper introduces the definition of ARP and the principle of ARP spoofing, analyses the modes of ARP spoofing and supplies the protecting methods of ARP spoofing.
文章介绍了ARP协议的含义及ARP协议欺骗原理,分析了ARP欺骗攻击的形式,并提出了防范ARP欺骗攻击的一些措施。
This paper analyzes the ARP protocol and its working principle and the existing defense against ARP spoofing attack prevention and detection methods and characteristics.
本文分析了ARP协议及其工作原理和现有的ARP欺骗攻击的防御方法以及防御和检测特点。
This paper analyzes the ARP protocol and its working principle and the existing defense against ARP spoofing attack prevention and detection methods and characteristics.
本文分析了ARP协议及其工作原理和现有的ARP欺骗攻击的防御方法以及防御和检测特点。
应用推荐