英语人>网络例句>attackers 相关的网络例句
attackers相关的网络例句

查询词典 attackers

与 attackers 相关的网络例句 [注:此内容来源于网络,仅供参考]

This time the gunners got to use their howitzers, firing at pointblank range, and happily, if optimistically, guessed that they had killed or wounded all but about 50 of the estimated 500 to 800 attackers.

这一次炮手们将他们的榴弹炮派上了用场,在直瞄距离内开火,如果按乐观的估计,他们打死打伤了约500到800名进攻者当中的绝大多数,只有50人左右得以逃离。

In a cyber warfare at first the attackers usually cast about for the intelligence of the targets, such as the vendors and versions information about the operating systems and services running on them, so they can get everything ready beforehand and exploit the vulnerabilities efficiently to perform a precision bombing. This paper discusses how to defeat reconnaissance through hiding or disguising the behavior characteristics in Web servers' communications.

文章讨论了侦察活动对系统安全的影响,提出了防风墙、安全时间、攻击距离的概念,并利用Linux 2.4内核提供的Netfilter架构访问、修改和丢弃数据包的功能设计了一个Web站点的防风墙原型系统——WSW2,描述了利用行为控制防范操作系统侦察和Web服务器映射的技术,实验证明这种方法可以有效地抵御侦察。

This may potentially allow attackers to preform a cross site scripting attack.

这样会潜在的让攻击者构造一个跨站脚本攻击。

You can see how it has turned into a proverbial cat-and-mouse game between attackers and computer users.

你可以看见攻击者和电脑用户之间如何变成猫和老鼠的游戏的。

That much was a success, but how to use it to push back his attackers?

这是很大的成功,可是怎样使用它来击退进攻的敌人呢?

Attackers can also use long TTL values for RRs so that DNS resolvers will cache the information received in the query response message for an extended period of time.

攻击者也可以使用长期TTL值的阻力,这样的DNS缓存解析器将收到的信息的查询响应消息在较长的时间。

Attackers analyze the transaction ID values generated by the DNS implementation to create an algorithm that can be used to predict the next DNS transaction ID used for a query message.

攻击者分析交易编号的价值观所产生的DNS实施创造一种算法,可以用来预测下一个DNS交易编号用于查询信息。

Attackers are often indiscriminate in their choice of target computers, purely selecting large IP address blocks to scan at random for a particular exploitable security vulnerability.

攻击者经常不分青红皂白地去选择他们的目标主机,而仅仅是在一个大的 IP 地址空间中随机地扫描,寻找可被利用的特定的安全漏洞。

Spurious timeout is very harmful to TCP. Two kinds of approaches were proposed to mitigate this problem, conservative approach and aggressive approach. In conservative approach, a conservative RTO, minRTO, is used. When RTO estimate form RTT is less than minRTO, it is set to minRTO. This makes RTO become predictable and may be exploited by attackers.

在TCP里,错误的逾期会造成相当大的伤害,而已经存在有两种类的方法来减轻这个问题,我们称他们为保守措施与积进措施,在保守措施里有用到一个保守重送逾期值(RTO, Retransmission Timeout) minRTO,当根据RTT 所估算出来的RTO小於 minRTO 时,RTO就会被设为minRTO,这样的做法会让RTO变成是可预测的,进而可能被攻击者利用。

Five of the attackers were charged with attempted second-degree murder.

五名参与袭击的学生被警方控以二级企图谋杀罪。

第5/17页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Back In Business
Hang Time (Bang Bang Boogie)
Nod Ya Head (Remix)
推荐网络例句

The work of this paper is as follows: 1. Looking back the progressing history of the linear motor, introducing the features of the elevator driven by linear induction motor, radicating the topic of this paper "the digital frequency variable control of the elevator bi-side direct driven by linear induction motor". The research of this paper covers the conventional VVVF control, space vector based VVVF control, vector control and DTC.

本文主要开展了以下几个方面的工作: 1 回顾了直线电机发展历史,电机的驱动技术演变,特别是针对直线电机的驱动,简要介绍了直线感应电机驱动电梯的优点和不同结构类型,对传统的v/f控制,基于空间矢量法的v/f控制,矢量控制,和基于电压空间矢量的直接转矩控制进行了比较,确立了本课题的研究主题:直线感应电机双边直推式驱动电梯的全数字变频控制。

The article combines with the treatment of a superficial civil air defense work to introduce how the grouting method to improve the performance of the backfill soil.

文章从治理漂浮人防工事的角度提出了注浆技术在改善回填土性质方面的应用,并详细阐述了注浆技术的施工流程。

I knew nor shyness nor fear, my life was boisterous.

我不懂得羞怯和惧怕,我的