易攻擊的 的英文怎麼說

中文拼音 [gōngde]
易攻擊的 英文
pregnable
  • : Ⅰ形容詞1. (容易) easy 2. (平和) amiable Ⅱ動詞1. (改變; 變換) change 2. (交換) exchange Ⅲ名詞(姓氏) a surname
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • : 4次方是 The fourth power of 2 is direction
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. Home computers : easy targets for cyber attacks

    家庭電腦:網路選目標嗎?
  2. 2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems

    2 )新一次性口令認證機制。針對postgresql原有認證機制具有遭受口令猜測和服務器端假冒缺陷,本文設計了一種簡單而有效口令認證機制。該認證機制不需要使用任何加密系統,就能有效加強對各種手段防範能力。
  3. The troops had to withdraw to a less exposed position.

    部隊已經撤到不地點。
  4. In the research of secure communication, the thesis analyzes some shortcomings of diffie - hellman ' s crypt key exchanging protocol, presenting a new exchanging method based on the " station to station " protocol and cookie mechanism, realizing the software of crypt key exchanging and secure communication of ip datagram on router

    在對安全通信研究中,本文分析了diffie - hellman密鑰交換協議中地方,提出了基於端對端協議及cookie機制密鑰交換新方法,並在路由器上實現了密鑰交換和ip報文安全通信。
  5. But the mensans don ' t help their 1 ) cause when they call non - members " densans " - as in dense, dumb. pride like that makes mensa an easy 2 ) target for critics

    可是,曼沙人稱呼非會員為愚人? ?愚笨愚? ?這樣做對他們目標毫無幫助。這種驕氣使得曼沙成為批評者容易攻擊的靶子。
  6. Wireless web services are likewise vulnerable targets for various cracking attacks

    無線web服務同樣是招受各種破解目標。
  7. But even in countries ( like america ) without extremist parties on the left or the right, politicians will be tempted to deflect the voters ' wrath away from their corporate paymasters and towards an easier target ? “ foreigners ” of all types

    但即使是在無極左或極右黨派國家(像美國)內,政治家亦傾向于將選民憤怒從公司發薪人員身上移開,而轉向一個更目標? ?所有「外國人」 。
  8. Parts easy to attack in the system are lan and communication link, which need to take link encrypting and point - to - point encrypting

    系統環節是局域網與通信鏈路,需採取鏈路加密和端到端加密措施。
  9. Yet small open economies cannot have an independent monetary policy ( indeed, several have currency boards ) and are vulnerable to external shocks and speculative attacks

    然而,開放小國經濟體不可能擁有一個獨立貨幣政策(確,一些國家有通貨委員會) ,而且,它們極受到外部沖和投機性傷害。
  10. But, the patient if because age is old, or it is to contract the disease with meeting immunize low function ( be like : diabetic, aids ) when, will make hepatic defence function is reduced, and the condition that makes liver exposeds to the open air wu yi suffers attack

    但是,病人假如因為年紀大,或是患有會使免疫功能低下疾病(如:糖尿病、 aids等)時,將會使肝臟防禦功能降低,而使肝臟曝露于狀態。
  11. It is well known that information technology is the most important part in the modern warfare, so how to get the power to control information has already become the primary resource to decide the winner of war

    現代戰爭中信息技術正起著越來越大作用,制信息權和制空權、制海權一樣,是戰爭勝負關鍵。在奪取制信息權信息戰中,通信系統是最容暴露、和受環節。
  12. But there have also been ads like the one in florida [ accusing ] a republican congressman of [ profiting ] from [ so - called ] [ drug ] deal

    但是也有一些正面廣告,佛羅里達州某則廣告指責一位共和黨國會議員從所謂藥品交中牟利。
  13. Up until tuesday, the police had seemed to discount any suggestion that the attackers might be suicide bombers - an idea that would almost certainly deepen apprehensions among britons used to perceiving such attacks as a phenomenon of the middle east or iraq

    直到星期二以前,警方還對襲是自殺性說法還是半信半疑,但這對習慣把人體炸彈看成中東和伊拉克現象大不列顛人來說,是很容接受
  14. Sql critical update scans the computer on which it is running for instances of sql server 2000 and msde 2000 that are vulnerable to the slammer worm, and updates the affected files

    Sql關鍵更新掃描運行容受到slammer蠕蟲程序sql server 2000和msde 2000實例計算機,並更新被感染文件。
  15. Sql scan sqlscan. exe scans an individual computer, a windows domain, or a range of ip addresses for instances of sql server 2000 and msde 2000, and identifies instances that may be vulnerable to the slammer worm

    Sql掃描程序sqlscan . exe可以掃描單獨計算機windows域或特定范圍ip地址,並可以識別出受slammer蠕蟲程序sql server實例。
  16. If you attack with a charged superweapon, then your opponent ' s army will be easily wiped out when he tries to defend against you, since you can just use the superweapon on his army

    如果你用充能好超武配合話,當敵人試圖防禦你時,他們部隊會被你輕而消滅,你只需要在他們軍隊上使用超武就可以了。
  17. Now provides security protection for vulnerable pointer parameters

    現在可對容受到指針參數提供安全保護。現在,
  18. It is easy to see that an attacker could put even an industrial - strength web server out of business due to the amplification effects of the attack

    發現,由於這種放大效應,它甚至能夠使工業強度web服務器癱瘓。
  19. It only updates vulnerable files

    它只更新文件。
  20. Also protects against vulnerable parameters passed into a function

    還可以防止向函數傳入參數。
分享友人