攻击的
- 与 攻击的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Arrive from the enterprise government, more and more origanization construction regard individual and organization as to be opposite internally gregarious network diplomatic shedding and collective channel.
利用ActiveX控件进行攻击是最常见的攻击手段,根据赛门铁克的数据,仅去年上半年,就发现了210个ActiveX漏洞,这是IE成为常见攻击目标的主要原因。
-
If you have them all selected and issue an attack order in a traditional game, they will all attack the specified target, but this is not very desirable… as what you really want is a unilateral attack across the entire base.
如果在别的游戏中你全选他们然后下达攻击指令,他们会攻击一个特定的目标,但是这不是非像我们要的那样对整个基地unilateral的攻击。
-
In this paper, we research on the integration technology of attack tools, analyze three typical integration approaches and compare them with each other. After that, we put emphasis on the integration of NASL scripts based on Nessus.
本文对攻击工具集成技术进行了研究,分析了三种典型的攻击工具集成方式,通过对它们进行分析和比较,明确了将基于Nessus的NASL攻击脚本集成技术,作为本文的研究重点。
-
Ok china has one of the best armys but they are not going to attack usa for a long while because china makes all kinds of things and ship it to usa for money if they attack the usa theyr econemy will fall only when they have millions and millions of dollars they will do it but then i hope im already dead.
中国有最好的军队,但他们不会长时间攻击美国,因为中国制造很多东西,并且把这些东西运到美国去赚钱,如果他们攻击美国,他们的经济就会衰败。只有当他们赚足钱的时候才会攻击美国,但那时我可能已经死了。
-
"It is all designed to prevent the unauthorized disclosure of information, be it the simplest piece of information, such as whether or not that e-mail address or user id is actually a valid user ID on the site," Shipman said.
反钓鱼式攻击工作组的Jevans表示,蓝色安全公司的报告表明,一种新的钓鱼式攻击手段正在形成,他认为,网络组织应该采取措施,消灭注册与密码提醒式漏洞攻击。
-
A distributed secure clustering protocol is proposed, in which the secure network initialization, random number broadcast from the base station and one-way hash chain are used to achieve the resiliency against possible attacks including node personating, cluster-head occupying, malicious cluster-member recruiting and multiple cluster-membership attacks.
针对成簇协议所面临的各种安全威胁,提出了一种分布式安全成簇协议,通过网络安全初始化、可信基站的随机数广播和单向密钥链技术来有效地抵御节点伪装和簇首占据攻击、簇成员恶意征募攻击和多重簇成员身份攻击。
-
Once per day, the wielder can reroll a failed attack roll (whether a single attack or one in a series of multiple attacks) as a free action.
每日一次,持用者可以以即时动作重掷失败的攻击骰(无论是单次攻击还是多重攻击中的一次)。
-
Once per day, thewielder can reroll a failed attack roll (whether a single attack or onein a series of multiple attacks) as a free action.
每日一次,持用者可以以即时动作重掷失败的攻击骰(无论是单次攻击还是多重攻击中的一次)。
-
When a boss parries your attack, it reduces the default swing timer of the bosses next main hand attack. There are one of three possible outcomes of a boss parrying your attack
当boss招架你的攻击,将会缩减boss下次主手攻击默认发动时间,当boss招架你的攻击后,有三种可能性存在。
-
The corresponding color weighted diagraph was setup in dependence on the inference relation of the security holes in the intruded machine. With the vulnerability-log relation matrix, we searched different forensic information source and got the corresponding support value which could help to prune the false relation between the nodes and get the remote suspicious host. Then analyzing the suspicious host in the same way.
以漏洞间推理关系为前提,从受害主机入手,构造有色加权有向图,在多日志中查找漏洞被利用的解释信息,并由查找结果对漏洞链动态剪枝,得到主机漏洞攻击链和攻击该受害主机的嫌疑主机,对嫌疑主机迭代分析,推理出网络漏洞攻击链。
- 推荐网络例句
-
Breath, muscle contraction of the buttocks; arch body, as far as possible to hold his head, right leg straight towards the ceiling (peg-leg knee in order to avoid muscle tension).
呼气,收缩臀部肌肉;拱起身体,尽量抬起头来,右腿伸直朝向天花板(膝微屈,以避免肌肉紧张)。
-
The cost of moving grain food products was unchanged from May, but year over year are up 8%.
粮食产品的运输费用与5月份相比没有变化,但却比去年同期高8%。
-
However, to get a true quote, you will need to provide detailed personal and financial information.
然而,要让一个真正的引用,你需要提供详细的个人和财务信息。