- 更多网络例句与攻击者相关的网络例句 [注:此内容来源于网络,仅供参考]
-
It summed up the attackers discarding information, generating information, linking information and cryptographical computational capabilities.
在串空间理论中,攻击者具有的原子行为用定义的攻击者迹描述,它总结了攻击者丢弃消息、生成消息、连接消息,以及攻击者的密码运算能力。
-
In the strand spaces, atomic behavior of the attackers is the definition of the attackers trace description. It summed up the attackers discarding information, generating information, linking information and cryptographical computational capabilities.
在串空间理论中,攻击者具有的原子行为用定义的攻击者迹描述,它总结了攻击者丢弃消息、生成消息、连接消息,以及攻击者的密码运算能力。
-
Raff expresses, metacafe website is put in flaw of an alternant script, this also is a common process designing error, but Raff can pass this flaw to run JavaScript scenario on Metacafe.com, this explains this flaw is used completely possibly to run baleful program by aggressor.
在Raff的攻击演示中,攻击者首先必须向Metacafe 和Dailymotion网站其中之一发布经过恶意编辑的视频文件然而Metacafe 网站本周二却表示,恶意攻击者突破该网站的内容过滤发布包括恶意代码视频文件的事"几乎不可能"。
-
Aggressor can pretend him the famous bank, orgnaization such as online shopkeeper and credit card company normally, send the email that come over from aggressor when online user when corresponding link is being opened directly in content, for instance aggressor is sent to the user with the legal status of such-and-such commercial bank came over an account remaining sum knows postal matter really, and after the user opens designation network to link from inside this mail content, all banks that the user inputs in this webpage page block bugle call / password information will by self-recording in the mailbox that can send aggressor automatically to appoint.
攻击者通常会将自己伪装成知名银行。在线零售商和信用卡公司等机构,当上网用户从攻击者发送过来的电子邮件内容中直接打开相应链接时,比如攻击者以某某商业银行的合法身份给用户发送过来了一封账户余额的确认邮件,而用户从该邮件内容中打开指定的网络链接后,用户在这个网页页面输入的所有银行卡号/密码信息就将被自动记录并会自动发送到攻击者指定的邮箱中。
-
Wrong. By attacking the attacker, you are stooping to his level.
对吗?错了。攻击攻击者,你就停留在了攻击者的水平上。
-
From the martial standpoint the previous level of training is limited in that it cedes considerable power to the attacker by allowing him to decide what and when an attack will be.
从武术的观点,上述的阶段受限於转移力量到攻击者,在转移力量之前,攻击者可以选择攻击方式及何时攻击。
-
Techniques against information obscurity Disassemble, decompile, or reverse engineering Fault injection – the technique of providing a program input that it does not expect. Fuzzing – the attacker's process of systematically trying various input string that may result in an exploit. Blackmail or buy off insiders. If you want your systems to be more secure, you may want to assume that the attacker knows exactly how the target system works.
用来对付资讯隐匿的技术反组译、反编译、或逆向工程错误注入–提供程式不受预期的输入模糊化–攻击者透过系统化的方式尝试各种输入的组合,其结果可能导致成功的攻击威胁或是收买内部人员如果你希望系统更加安全,你必须假设攻击者针对系统的了解跟你一样深入。
-
Second, a successful attack will also give the attacker a percentage of the defending player's credits, due to the attacking ships ransacking the resources and materials stored there.
第二,一次成功的攻击将会给攻击者带来一定比率的防御者的信用点,这是攻击者的舰队洗劫了资源和原料贮备。
-
While some honeypots are used to divert the attention of attackers from legitimate systems, the purpose of a honeynet is to learn the tools and tactics of the black-hat community.
一些&蜜罐&是用来分散攻击者攻击真正主机的注意力,另外一些是用来学习攻击者所使用的工具和策略的,我们这里所提到是属于后者。
-
Where contact is deemed by the referee to be too strong, but does not diminish the competitor's chances of winning, a warning may be given. A second contact under the same circumstances will be penalised by KEIKOKU and IPPON, given to the opponent. A third offence will be given HANSOKU CHUI and NIHON, to the injured competitor. A further offence will result in disqualification by HANSOKU.
如果裁判认为接触太重,但并不影响被攻击选手获胜的机会,攻击者将被判处口头警告﹝忠告〝CHUKOKU〞﹞,同样的情况下第二次触击,攻击者将被判处警告﹝KEIKOKU﹞,被攻击者获得一胜〝IPPON〞﹝一分﹞,第三次犯规者将被判处犯规注意,被攻击者获得二胜〝NIHON〞,第四次犯规者将被判处犯规而失去资格。
- 更多网络解释与攻击者相关的网络解释 [注:此内容来源于网络,仅供参考]
-
Aggressor:侵略者;攻击者
accuracy 精确,准确( | aggressor 侵略者;攻击者; | alter 改变,更改(
-
Aggressor:攻击者
aggressiveness /侵略/攻势/ | aggressor /攻击者/ | aggrieve /使悲伤/使委屈/使苦恼/
-
assailant:攻击者 攻击者
assassin 刺客,暗杀凶手 刺客,暗杀凶手 | assailant 攻击者 攻击者 | assault 攻击 攻击
-
assailant:攻击者,行凶者
189.assailant 攻击者,行凶者 | gallant 豪杰,时髦人物,求爱者,情夫 | installant 任命者libellant 诽谤者
-
assaulter:攻击者
assaultable 可攻击的 | assaulter 攻击者 | assaultive 喜好攻击的
-
assaulter:攻击者, 殴打者
assaultable | 可攻击的, 可袭击的 | assaulter | 攻击者, 殴打者 | assaultive | 喜好攻击的, 好动武的
-
Telekinetic Shocker:念动攻击者 变为
精神防护者 变为 Mind Protector | 念动攻击者 变为 Telekinetic Shocker | 超能破坏者 变为 Destructotron
-
DNS spoofing:(域名服务器电子欺骗)攻击者用来损害域名服务器的方法,可通过欺骗DNS的高速
data-driven attack(数据驱动攻击)依*隐藏或者封装数据进行的攻击,那些数据可不被察觉 | DNS spoofing(域名服务器电子欺骗)攻击者用来损害域名服务器的方法,可通过欺骗DNS的高速 | eavesdropping 窃听、窃取
-
DNS spoofing:(域名服务器电子欺骗)攻击者
data-driven attack(数据驱动攻击)依靠隐藏或者封装数据进行的攻击,那些数据可不被察觉的通过防火墙. | DNS spoofing(域名服务器电子欺骗)攻击者 | eavesdropping 窃听、窃取
-
attackers:攻击者
一些攻击者(attackers)暗中监视互联网的多个部分,使用高级的统计技术追踪许多不同的组织和个人的通信模式. 加密并不能抵御这些攻击者,因为加密隐藏的仅仅是流量的内容而不是报头. 一旦一条电路建立完成,多种类型的数据可以进行交换,