honeypots
- honeypots的基本解释
-
n.
[体]抱膝跳水( honeypot的名词复数 )
- 更多网络例句与honeypots相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Using a GenII Honeynet containing some Windows honeypots and snort_inline enables us to collect this information.
如上面所述,我们需要一些来自僵尸网络的敏感信息让我们把一个虚假的僵尸工具混入僵尸网络,需要的信息包括
-
In the second part, we describe how to configure VMware and install your honeypots.
第二部分,我们将描述怎样配置VMware和安装你的honeypots。
-
In this section we introduce our methodology to track and observe botnets with the help of honeypots.
在这节中,开始介绍我们在蜜罐的帮助下跟踪、观察僵尸网络的方法。
-
In the first part of this section we thus want to introduce our techniques to retrieve the necessary information with the help of honeypots.
本节的第一部分,介绍我们在蜜罐的帮助下提取所需要信息的技术。
-
A honeynet can contain different kinds of honeypots, in different numbers, set up many different ways.
一个蜜网能包含不同的部分,安装起来就会有不同的途径。
- 加载更多网络例句 (25)
- 更多网络解释与honeypots相关的网络解释 [注:此内容来源于网络,仅供参考]
-
tourist honeypots; tourist attractions:旅游暖点
scenic spots; tourist destinations 旅游景点 | tourist honeypots; tourist attractions 旅游暖点 | the Mausoleum of Emperor Qinshihuang 秦始皇陵
-
tourist honeypots; tourist attractions:旅游热点
scenic spots; tourist destinations 旅游景点 | tourist honeypots; tourist attractions 旅游热点 | the Mausoleum of Emperor Qinshihuang 秦始皇陵
-
IDS Firewalls and Honeypots:入侵偵測系統,防火牆與網路誘陷系統
18. Hacking Linux 入侵 Linux 系統 | 19. IDS Firewalls and Honeypots 入侵偵測系統,防火牆與網路誘陷系統 | 20. Buffer Overflows 緩衝區溢位
-
Evading Firewalls, IDS and Honeypots:(逃避防火墙、入侵侦测系统和网络诱陷系统)
18. Hacking Linux (入侵Linux系统) | 19. Evading Firewalls, IDS and Honeypots (逃避防火墙、入侵侦测系统和网络诱陷系统) | 20. Buffer Overflows (缓冲区泛滥)
-
Evading Firewalls, IDS and Honeypots:躲避防火墙,ids和蜜罐
17 Linux Hacking Linux黑客学 | 18 Evading Firewalls, IDS and Honeypots 躲避防火墙,ids和蜜罐 | 19 Buffer Overflows 缓冲溢出