查询词典 spoofing
- 与 spoofing 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
IP spoofing: IP Spoofing is a complex technical attack that is made up of several components.
IP欺骗: IP欺骗是一项复杂的攻击技术,有几部分构成。
-
In the past, ARP spoofing principle is often applied to a simple denial of service attack.
ARP欺骗原理在过去常被运用到简单的拒绝服务攻击中。
-
Internet security issues include DDOS attacks, domain name hijacking, Trojan program, control of zombie host, webpage defacement and network spoofing.
互联网安全问题包括DDOS攻击、域名劫持、木马和僵尸控制主机、网页篡改、网络仿冒等。
-
Office Mode also provides enhanced anti-spoofing by ensuring that the IP address encountered by the gateway is authenticated and assigned to the user.
Office 模式也提供了反地址欺骗,确保网关遇到的 IP 地址是授权和指派给用户的。
-
The clothes he sent out were a parody of couture designs of the last century, spoofing Dior's New Look and Givenchy's little black Audrey Hepburn dresses, as well as their reinventions by new designers at those companies in the last decade — himself included.
他将衣服用来模仿上世纪的时装设计,欺骗了迪奥焕然一新的面貌和纪梵希的小奥黛丽赫本的黑色礼服,以及这两家公司在过去的十年中再创造新的设计师。
-
Spoofing doesn't mean someone fooling you, it means you fooling palladium.
欺骗不是意味着某人愚弄你,它的意思是你在愚弄钯。
-
The data capture mainly gathers the data from the network. Protocol analysis can analyse every segment of the data packet according to protocol standard. Data recover can recover all the data of the application layer of the TCP connection. IP spoofing can construct all kinds of packets and realize the network attack. Real-time interruption can interrupt the TCP connection of Both sides of communication as the third party. Fire wall can realize network access control. Then the system can protect the network information safety from many aspects.
数据捕获主要完成从网络采集数据的功能;分析还原包括协议分析和数据还原两部分内容,协议分析可以对捕获到的数据包按照网络协议规范分别进行各协议字段分析,数据还原功能可以将每条TCP连接中传输的所有应用数据进行重新组合,还原出原来数据的内容;IP欺骗指构造各种功能的数据包,实现网络攻击;实时阻断指第三方实时阻断通信双方的TCP连接,禁止他们进行数据通信;防火墙主要实现网络访问控制,保护内部子网的功能。
-
It can be used to securely login to a remote host or copy data between hosts, while preventing man-in-the-middle attacks and DNS spoofing.
可用于远程主机的安全登录或两台主机间的数据传送,以防止中间人攻击和 DNS 欺骗。
-
The large number of attacking machines and the use of source IP address spoofing make the traceback impossible.
大量的攻击机器且使用源地址欺骗使得现有的跟踪是不可能的。
-
ACGA method can overcome the shortcomings of CGA(Cryptographically Generated Addresses) and suppress all kinds of IPv6 source address spoofing attacks.
ACGA能够克服原始密码生成地址算法即CGA算法的不足,抑制各种情况下的IPv6源地址假冒攻击。
- 相关中文对照歌词
- CopKiller
- 推荐网络例句
-
The circulation, consumption and reproduction of the trilogy have not only testified to its historical significance and literariness, but also invested it with new meanings.
该三部曲的流通、消费与再生产不仅验证了其历史意义及文学性,而切还赋予它以新的意义。
-
If he thought that he could buy me off, he would be wrong.
如果他认为他可以收买我,那他就大错特错了。
-
Can I be excused today's lesson?
我可以不上今天的课吗?