这些人都可能成为入侵者,而且由于他们在内部,他们访问网络更方便。
These people are all possible intruders, and since they are on the inside, they have better access to the network.
WEP理论上被认为会使您的网络很安全;实际上,它只会略微减缓入侵者的入侵速度。
In theory, WEP is supposed to make your network secure; in practice, it will only slow down intruders a little bit.
它并不一定是反击能力。我们知道,正如入侵者可以破坏一个公司的网络一样,反过来也完全有可能发生。
It doesn't have to be an offensive capability, but it's perfectly possible, as we know, just as an intruder can screw up a company's network, the reverse can happen.
虽然公司尽最大努力阻止入侵者入侵网络和敏感数据,但是超过70%的数据泄露是由雇员造成的。
Despite companies' best efforts to keep intruders out of networks and sensitive systems, more than 70 percent of data breaches are carried out by employees.
追踪用户的ID并不能使我们抓住或者阻止恶意入侵者,而且这样会导致网络瘫痪。
Tracking user IDs will not enable us to catch or stop bad guys, and it will render the Internet impossible to use.
然而,它却不把新进入网络的电脑报告为潜在入侵者,熊猫互联网安全2008却报告。
It doesn't, however, report new computers on the network as possible intruders, as Panda Internet Security 2008 does.
黑客是网络系统常见的非法入侵者。
任何对该节点的攻击或者与该节点不适当的无线连接都意味着入侵者已深入到网络内部。
Any hacking or improper wireless connectivity to it means that the intruder is deeply in the network.
但“删除”键仍是网络使用者用于对付垃圾广告入侵者最惧怕的杀敌武器。
The "delete" key may still be Internet user's greatest weapon against these inbox invaders.
比如说,对付一个正试图检索私人数据或客户数据库的入侵者和对付一个正试图瘫痪网络的入侵者很可能要采取极不同的斗法。
For example, an intruder who is trying to retrieve proprietary data or customer databases probably should be combated much differently from an intruder who is trying to shut down a network.
一个无线访问点对内部的所有用户都是公开的,入侵者及不受信任的用户可以很容易的进入无线网络访问各种资源。
Because a wireless access point is public to all inside user, intruder and distrustful user can enter wireless network to access all kinds of source easily.
对目标系统进行端口扫描,是网络系统入侵者进入目标系统的第一步。
Scanning a port of the target system is the first step that network intruders will do before entering the system.
对目标系统进行端口扫描,是网络系统入侵者进入目标系统的第一步。
The first step that network system intruders enter the target system is the port scanning of the system.
在无线传感器网络中,通过为进攻的入侵者寻找入侵轨迹来实现栅栏覆盖控制是比较有效的方法。
Searching the attacking locomotion trajectory is a valid method for the barrier-coverage control in wireless sensor networks.
用于网络入侵检测系统(IDS)的特征(变量)数量太多或太少都会降低IDS识别入侵者的正确率。
Using too many or too too few characters(variable) in Intrusion Detection System(IDS) leads to reduce recognizing correctness of IDS.
提出并实现了一个基于网络入侵检测的入侵者定位系统。
This paper presented an intruder locating system based on network intrusion detection, which can trace back the indirect attack in controlled network environment.
文章介绍了计算机网络系统IP层安全概况和入侵者对IP层常采用的入侵手段,以及为防止这种入侵所采取的措施。
This paper introduces IP layer security of computer system, incidences often use invading method to IP layer. In order to prevent the invading, should take the measure.
文章介绍了计算机网络系统IP层安全概况和入侵者对IP层常采用的入侵手段,以及为防止这种入侵所采取的措施。
This paper introduces IP layer security of computer system, incidences often use invading method to IP layer. In order to prevent the invading, should take the measure.
应用推荐