安全操作系统
- 与 安全操作系统 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Become to avoid the personal computer of the user " fryer ", policeman clew: Zhuang of appearance of emperor live abroad provides dinner for fine glucoside of そ of V of ? of 3 approach pointing to ? steps on north of low gallopping extensive ⒍ of Luo of ? of avoid of shovel of badger of acenaphthene of ? of ? of collect of Nai of Cong Chuanghuan Jian of summary Ji of Pi of play of grey ? of dispatch of joyous ? of ? shaddock boundless and indistinct seeks chaste tree of ? of ┑ blade
为防止用户的个人电脑成为"肉鸡",民警提示:一是让操作系统一直保持更新,保证较高安全设置;二是不要随意下载来源不明的文件,避免登录色情、赌博等小网站;对生疏人发来的邮件保持警惕,不打开或直接删除是最明智的选择;三是安装正版的杀毒软件和防火墙,并及时更新病毒库。
-
The company became an early adopter of Microsoft SQL Server 2005 to create a new data warehouse and business intelligence tools.
Microsoft 已发布了一个修补程序,它可消除随某些 Microsoft 操作系统提供的超级终端应用程序中的安全漏洞。
-
This method has been proved to be effective and prone to be carried out.
1概述审计追踪就是对有关操作系统、系统应用或用户活动所产生的一系列的计算机安全事件进行记录和分析的过程。
-
ESET Recovery CD is a utility which enables you to create a bootable disk containing ESET NOD32 Antivirus or ESET Smart Security. The main advantage of ESET Recovery CD is the fact that ESS or ENA runs independent of the host operating system, while it has a direct access to the disk and the entire filesystem.
ESET恢复光盘是一种实用性工具,它能帮助你创建含有ESET NOD32反病毒或者是ESET安全套装的引导磁盘,实际上,ESET恢复光盘最大的好处是:ESS或者是ENA独立运行于主机操作系统之外,这使得它可以直接访问磁盘和所有的系统文件。
-
The loophole that the virus such as shock wave, bow wave uses an operating system often is browbeating the information of people is safe.
震荡波、冲击波等病毒利用操作系统的漏洞不时威胁着人们的信息安全。
-
In fact, from the point of view of dialectic, there is none of system with utterly security.
实际上,从辩证的角度看,没有哪一种操作系统是绝对安全的。
-
In addition, the road of whole Internet bar optimizes strategy of deploy of the politic, software that reduce toxin by politic, ARP strategy, operating system also is need the consideration that has unity in deploy of whole Internet bar, the safety that just can let an Internet bar so defends efficiency is taller, defend performance is better.
此外,整个网吧的路由策略、ARP策略、操作系统优化策略、杀毒软件部署策略也都是需要在整个网吧部署中进行统一的考虑,这样才能让网吧的安全防护效率更高、防护性能更好。
-
In a cyber warfare at first the attackers usually cast about for the intelligence of the targets, such as the vendors and versions information about the operating systems and services running on them, so they can get everything ready beforehand and exploit the vulnerabilities efficiently to perform a precision bombing. This paper discusses how to defeat reconnaissance through hiding or disguising the behavior characteristics in Web servers' communications.
文章讨论了侦察活动对系统安全的影响,提出了防风墙、安全时间、攻击距离的概念,并利用Linux 2.4内核提供的Netfilter架构访问、修改和丢弃数据包的功能设计了一个Web站点的防风墙原型系统——WSW2,描述了利用行为控制防范操作系统侦察和Web服务器映射的技术,实验证明这种方法可以有效地抵御侦察。
-
It includes the security problems resulted from excessive root privilege, the excessive authorization problem resulted from SetUID and SetGID, the Trojan horse problem resulted from discretionary access control, and the buffer overflow problem endemic to C programs.
第一,全面深入地分析了Linux操作系统现存的安全问题,包括root权限过大引起的安全问题,SetUID和SetGID带来的过度授权问题,自主访问控制可能引起的特洛伊木马问题,以及C语言内在缺陷所引起的缓冲区溢出问题。
-
The system is suitable for trans-platform motion, it has very excellent portability, expansion and flexibility, especially fit for checking and analyzing of variable platform network s leak and vulnerability.
在此基础上本文对基于自治代理模型的安全检测系统进行了工程实践,形成了一个可跨操作系统平台运行的网络安全漏洞测试软件产品。
- 推荐网络例句
-
Neither the killing of Mr Zarqawi nor any breakthrough on the political front will stop the insurgency and the fratricidal murders in their tracks.
在对危险的南部地区访问时,他斥责什叶派民兵领导人对中央集权的挑衅行为。
-
In fact,I've got him on the satellite mobile right now.
实际上 我们已接通卫星可视电话了
-
The enrich the peopling of Deng Xiaoping of century great person thought, it is the main component in system of theory of Deng Xiaoping economy, it is a when our country economy builds basic task important facet.
世纪伟人邓小平的富民思想,是邓小平经济理论体系中的重要组成部分,是我国经济建设根本任务的一个重要方面。