攻擊用病毒 的英文怎麼說

中文拼音 [gōngyòngbìng]
攻擊用病毒 英文
challenge virus
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
  • : Ⅰ名詞1 (疾病; 失去健康的狀態) illness; sickness; disease; malum; nosema; malady; morbus; vitium...
  • : Ⅰ名詞1 (對生物體有害的性質或物質; 毒物) poison; toxin 2 (毒品) drug; narcotics 3 (姓氏) a s...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  • 病毒 : [醫學] virus; inframicrobe (濾過性)
  1. The basic mechanism of viral attack is that the viruses replicate themself using the host ' s ( in this case is " our " ) dna genetic replication system

    濾過性人體的基本機制是能夠通過使人身體中的dna基因復制系統來復制自己。
  2. Build up your own anti - virus server to protect your lan system from virus

    服務器租幫助您建立自己的防服務器,免受
  3. The serious issue of computer software security will be explored in this programme. the programme goes on to discuss three forms of software attacks the virus, the trojan horse and the worm and demonstrates how the use of a firewall installed into a computer network can provide a good measure of protection

    電腦網路究竟有多安全?本節目會探討電腦軟體安全的嚴重性,以及電腦木馬程式和蠕蟲軟體的方式。另外,亦會介紹如何利防火墻保護電腦網路。
  4. Police clew, fund investor does business in the bank on the net when, should open virus real time supervisory system, do not visit doubtful website at the same time, download runs doubtful file and program to prevent virus to atttack, input password should use soft keyboard as far as possible

    警方提示,基金投資者在網上銀行進行交易時,應開啟實時監控系統,同時不要訪問可疑網站,下載運行可疑的文件和程序防止,輸入密碼應盡可能使軟鍵盤。
  5. Save to the extent permitted by this agreement and by law, you will not reverse engineer, disassemble or decompile any of our content or transmit software that may cause damage to or failure of our computer equipment or data or that of any other persons, including without limitation using the service to upload a computer virus or any harmful software application or engage in denial of service attacks

    除本協議及法例許可者外,閣下或任何人士不得顛倒設計、將吾等之任何內容拆離或解裝或傳送軟體而導致吾等之電腦設備或數據遭受破壞或出現故障,包括但不限於使服務上載電腦或任何有害軟體應或參與拒絕服務之事宜;
  6. Using this feature, you can block or allow access for different user groups to certain websites or to sites classified as inappropriate

    使這一個磁盤片,你在能重新開始你的作業系統之後,為懷惡意的物體而且掃描它。
  7. The option of creating a rescue disk has been added. using this disk, you can restart your operating system after a virus attack and scan it for malicious objects

    創造一個援救磁盤片的選項已經被增加。使這一個磁盤片,你在能重新開始你的作業系統之後,為懷惡意的物體而且掃描它。
  8. As the growth of the internet popularize intensity, network traffic anomalies, which are caused by network attacks, worm virus, malicious download, equipment failure, etc, increasingly impact the network performance, some unusual offensive flow disrupts the normal operation of the network order, poses a serious threat to network security. in such situations, how to detect the network traffic anomalies accurately and in time, ensure the normal operation of the network, provide users with a good network environment, become a topic of concern

    但是隨著網路的普及程度越來越高,由網路、蠕蟲、惡意下載、設備異常等因素導致的網路流量異常對網路性能的影響越來越大,某些帶有性的異常流量干擾了正常的網路運行秩序,對網路安全造成了嚴重威脅。在這種情況下,如何及時而準確的檢測出網路流量異常,保證網路的正常運行,為戶提供一個良好的網路環境成為一個備受關注的研究課題。
  9. Many others come from “ botnets ” ? chains of computers that have been hijacked by viruses totake part in such raids without their owners knowing

    而其他一些人則採取「殭屍網路」進行,這種能在電腦戶們毫不知情的情況下讓一連串的電腦被劫持並參與襲活動。
  10. Sony bmg announced it was recalling millions of music cds with copy protection software that experts said could expose personal computers to viruses and hackers

    此前,有專家說該軟體可能使戶的個人電腦易受電腦和黑客的
  11. Intranet attack include : information - detector, ip - deceive, dos, password - attack, man - in - the - middle - attack, application layer attack, network reconnaissance, trust exploitation, port redirection, virus. it is helpful to obtain complete and distinct security requirements with intranet security risk analysis. 2

    主要包括數據包探測器、 ip電子欺騙、拒絕服務、密碼、中間人、應、網路偵察、信任利、埠重定向、和特洛伊木馬。
  12. Jiangmin firewall ( new ) is a solution for individual users of internet security and network security protection design tools, product integration, advanced dynamic network access control technologies, and thoroughly resolve hacker attacks, trojans and viruses and other internet networks dangerous invasion, the comprehensive protection of personal internet security

    江民防火墻(新)是一款專為解決個人戶上網安全而設計的網路安全防護工具,產品融入了先進的網路訪問動態監控技術,徹底解決黑客、木馬程序及網際網路等各種網路危險的入侵,全面保護個人上網安全。
  13. The first so - called " viruses " have already attacked wireless users in spain and also ntt docomo s imode phones in japan

    在西班牙,第一個所謂的「」已經了無線戶,同樣在日本, ntt docomo的imode手機也受到了
  14. These include three denial of service vulnerabilities, one of which is exploited by the code red worm, and two vulnerabilities that could enable an attacker with the ability to load low - privilege code on the server to gain higher privileges

    這些包含三個拒絕服務弱點,其一是利紅色警戒,另外兩個弱點則有可能使者有能力從伺服器中載入低權限的程式碼,藉此獲得較高的權限。
  15. In this paper, by studying the feature of the netflow data and the mib status of the network equipments, at the same time, in terms of analyzing the characteristics of network attack, worm spread, virus infection and network misuse behaviors, our work is based on the facts that most of the anomaly traffic in campus network has influences of the netflow data and network equipment status. an approach is present to assess the threats of the traffic in terms of five factors : the traffic bytes distribution, flow number distribution, packets number distribution, equipment cpu utilization and the memory utilization. the weight of each factor is computed and determined by fuzzy relation matrix 。 an prototype system is designed to test the method and the results are analyzed to evaluate the availability of our method

    本文研究了netflow流數據的特徵和網路設備運行狀態數據,分析了校園網網路異常、蠕蟲和網路濫行為的特點,基於大多數的網路流異常必然反映在網路網路流量數據特徵的變化以及網路設備運行狀態的改變這樣一個事實,提出了一套基於網路流量和網路設備運行狀態的異常威脅評估方法,確定了5種威脅評估因素:網路流帶寬分佈、網路流數量分佈、網路流包數量分佈、網路設備cpu利率、網路設備內存利率,並採模糊關系矩陣方法計算和分配這5種評估因素在評估函數中的權重。
  16. Seattle reuters - apple computer inc., long considered to be relatively immune to the security holes and viruses that plague longtime rival microsoft corp. ' s windows, said on friday a security hole in its s vulnerable to attack

    一直以來都被認為相對微軟的windows操作系統不會面臨安全漏洞或是受到的蘋果公司表示,其軟體當中出現的一個安全漏洞使得戶的電腦很容易受到
  17. In this text the basic theories and the applied truss of the network monitor and control the system are discussed firstly, the inevitability is also analyzed about monitor and control network facing with the frequent safety threaten. then i research each safety aspect of network remote monitor and control system through academic study, engineering practice and a lot of simulation experiment. at the same time i research deeply and systemically in the popular virus problems and the dangerous hacker ' s attack

    本文討論了網路監控系統的基本理論和應構架,分析了監控網路面臨經常的安全威脅的必然性,然後通過理論研究、工程實踐以及大量的模擬實驗,對網路遠程監控系統安全性問題的各個方面進行了廣泛的研究,對其中最常見的計算機問題以及最可能造成嚴重危害的黑客問題進行了深入系統的研究。
  18. The patches that plug these holes are usually available months before the viruses that exploit them have run rampant, but in a multi - machine environment how can you identify which machines are vulnerable

    堵住這些漏洞的補丁程序通常在那些利漏洞的猖獗運行之前的幾個月就可獲得,但是在一個多機器的環境中,您如何能識別哪些機器易受呢?
  19. Then the problem now is how to make filter in smtp with various filtering engine ( virus engine, keyword engine and rbl, etc. ). this article describes the mechanism of smtp and the process of mail transfer systematically. compare some main popular mail filtering ways from several aspects

    因此,要保障郵件的安全傳輸,使你的網路避免通過郵件實現的網路,就要從smtp入手,使不同的過濾引擎及過濾策略(如引擎,關鍵字引擎,以及rbl ( realtimeblackholelist )等) ,在smtp中實現過濾,從各個方面保證郵件傳輸的安全性。
  20. In this thesis we gave the advisable security requirements to the agent business of the industrial and commercial bank of shijiazhuang through the attack path analysis and the threatening elements analysis. moreover we designed the project of the security protection for the agent business by using the various security equipments such as vpn, firewall, ids, security management center, security kernel, antivirus equipment and so on. by the way, we made some suggestions in the aspect of the security management

    筆者通過對石家莊市工商銀行中間業務現狀的分析,採「安全路徑分析」和「安全威脅因素分析」方法對該行中間業務的安全威脅進行了詳細的分析,提出了適當的安全需求,採多種安全設備如vpn設備、防火墻、 ids 、安全管理中心、安全內核、防等,設計出了保護中間業務的技術安全防護方案,並提出了安全管理方面的措施建議,最後,給出了保證中間業務正常運行的安全服務方案。
分享友人