The BreakingPoint system delivered a strike level 5 test that included exploits, network worms, denial-of-service attack, reconnaissance attacks, Trojan horse and backdoor intrusions.
BreakingPoint的系统提供了一个5级强度的攻击测试,包括了侦测、网络蠕虫、拒绝服务攻击、踩点攻击、特洛伊木马和后门入侵。
This article discusses the work principles and attack technology and defending policies on Trojan Horse.
本文介绍了木马的攻击原理、常用攻击技术以及防范策略。
The experiment result shows that the worm-kind Trojan horse can play positive role in the network attack and defense.
实验结果表明,蠕虫型木马可以在网络攻防中发挥积极作用。
NVS is based on Trojan horse architecture and facing to network attack.
在此基础之上,本文提出了一个基于木马体系结构的漏洞扫描模型。
NVS is based on Trojan horse architecture and facing to network attack.
在此基础之上,本文提出了一个基于木马体系结构的漏洞扫描模型。
应用推荐