• Out-of-band plug-ins (host spoofing).

    带外插件(主机欺骗)。

    youdao

  • Third, spoofing attacks are difficult to execute.

    第三欺骗攻击难以执行

    youdao

  • This process is sometimes referred to as spoofing.

    这种过程有时也称为欺骗

    youdao

  • The logging framework does not attempt to prevent spoofing.

    日志框架本身无法避免日志输出的欺骗行为。

    youdao

  • This is called email spoofing and is relatively easy to do.

    叫做电子邮件欺骗比较容易的事。

    youdao

  • Spoofing can be interpreted as the network security term used for forging.

    电子欺骗可以解释用于伪造网络安全术语

    youdao

  • These kinds of attacks require the same level of skill as IP spoofing.

    这些类型攻击需要IP欺骗同等级别技巧

    youdao

  • This is not to track everyone's mail, but to prevent bad guys from spoofing good guys.

    这个需要追踪一封信但是能够阻止恶意入侵者的欺骗。

    youdao

  • Only legitimate users can access the services (including the denial of spoofing schemes).

    只有合法用户访问服务(包括拒绝欺诈阴谋)。

    youdao

  • Web site developers should be wary of anyone spoofing the GET and POST requests sent to them.

    网站开发人员应该小心发送给他们GETPOST请求受到欺骗。

    youdao

  • This was demonstrated recently at the Chaos Conference in Berlin by spoofing a real certificate.

    近日柏林举办Chaos会议上,演讲者通过仿冒真实的证书演示一漏洞。

    youdao

  • Form spoofing is when someone makes a post to one of your forms from somewhere you didn't expect.

    表单欺骗有人post某个恰当的位置发到表单中。

    youdao

  • This helps to protect the corporate domain (and the company's reputation) from spoofing and identity forging.

    有助于保护公司(声望)不受盗用身份伪造的侵害。

    youdao

  • The large number of attacking machines and the use of source IP address spoofing make the traceback impossible.

    大量攻击机器使用地址欺骗使得现有跟踪是不可能的。

    youdao

  • As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.

    攻击使用IP欺骗隐藏自己真实地址,因此人们开始研究IP源回溯技术

    youdao

  • Finally, you saw how to extend Ganglia using an in-band script and how to use out-of-band scripts with host spoofing.

    最后看到了如何使用带内脚本扩展Ganglia以及如何使用带有主机欺骗的带外脚本

    youdao

  • This paper expatiate on the theory of network protocol spoofing commonly, the ICMP protocol and its leak are analyzed in details.

    阐述网络协议欺骗一般原理详细分析了ICMP协议及其存在漏洞

    youdao

  • The Prevention of ARP spoofing which has widely spread in campus network is highly paid attention to by network administrators and users.

    如何防范校园网络流行ARP欺骗攻击,成为网络管理员用户高度关注的问题。

    youdao

  • First discovered in the ‘90s, caller ID spoofing allows an unscrupulous sort to choose whatever number he or she would like for their caller ID.

    九十年代时,人们首次发现来电身份伪装可以让用户肆无忌惮选择任意号码作为他们的来电身份。

    youdao

  • In this paper were mainly discussed the process and the guard measure of session hijack technology which is based on ARP spoofing and TCP protocol.

    本文主要讨论了借助ARP欺骗,实现基于TCP协议会话劫持技术全过程及其防范措施

    youdao

  • ARP spoofing and ICMP redirection attack are used frequently, both of them can sniff the Ethernet or attack the target by means of denial of service.

    ARP欺骗ICM P重定向攻击以太网中常用攻击手段两者都达到监听网络目标主机进行拒绝服务攻击的效果。

    youdao

  • For instance, pseudo-random Numbers are used for process IDs and packet IDs, which makes spoofing significantly more difficult for a would-be attacker.

    例如伪随机数可用于进程IDid,使得那些想要进行攻击的人很难进行欺骗

    youdao

  • The DAGR includes a Graphical User Interface (GUI) and incorporates a next-generation security device called the Selective Availability Anti-Spoofing Module.

    DAGR包括图形用户界面GUI),采用新一代安全装置称为可选择有效反干扰模块

    youdao

  • Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.

    针对常见IP地址欺骗、IP路由欺骗、ICM P重定向欺骗、IP劫持网络攻击给予了分析过滤管理模块中给出了防御的方法。

    youdao

  • ARP spoofing attack is a common phenomenon in recent networking industry, the article analyzes the ARP protocol is given several ways to prevent ARP attack.

    ARP欺骗攻击近来网络行业普遍现象文章通过分析ARP协议给出了ARP攻击防范几种方法

    youdao

  • Because the reverse domain lookup can be anything the owner of the address block wants, the second lookup is necessary to ensure that no spoofing is taking place.

    因为反向域名搜索可以地址所有者确定,所以防止ip欺骗发生,必须进行第二查找

    youdao

  • As analysing the principle of the ARP spoofing, some solutions for the spoofing are mentioned, such as the binding of MAC IP address and the configuration of switch.

    随后分析ARP欺骗实现原理给出MACIP绑定交换机设置一系列解决问题方案。

    youdao

  • This paper introduces the definition of ARP and the principle of ARP spoofing, analyses the modes of ARP spoofing and supplies the protecting methods of ARP spoofing.

    文章介绍了ARP协议含义ARP协议欺骗原理分析了ARP欺骗攻击形式提出防范ARP欺骗攻击的一些措施

    youdao

  • This paper analyzes the ARP protocol and its working principle and the existing defense against ARP spoofing attack prevention and detection methods and characteristics.

    本文分析ARP协议及其工作原理现有的ARP欺骗攻击防御方法以及防御检测特点。

    youdao

  • This paper analyzes the ARP protocol and its working principle and the existing defense against ARP spoofing attack prevention and detection methods and characteristics.

    本文分析ARP协议及其工作原理现有的ARP欺骗攻击防御方法以及防御检测特点。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定