易攻擊的 的英文怎麼說
中文拼音 [yìgōngjīde]
易攻擊的
英文
pregnable- 易 : Ⅰ形容詞1. (容易) easy 2. (平和) amiable Ⅱ動詞1. (改變; 變換) change 2. (交換) exchange Ⅲ名詞(姓氏) a surname
- 攻 : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
- 的 : 4次方是 The fourth power of 2 is direction
- 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
-
Home computers : easy targets for cyber attacks
家庭電腦:網路攻擊的易選目標嗎?2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems
2 )新的一次性口令認證機制。針對postgresql原有認證機制具有易遭受口令猜測攻擊和服務器端假冒攻擊的缺陷,本文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用任何加密系統,就能有效加強對各種攻擊手段的防範能力。The troops had to withdraw to a less exposed position.
部隊已經撤到不易受攻擊的地點。In the research of secure communication, the thesis analyzes some shortcomings of diffie - hellman ' s crypt key exchanging protocol, presenting a new exchanging method based on the " station to station " protocol and cookie mechanism, realizing the software of crypt key exchanging and secure communication of ip datagram on router
在對安全通信的研究中,本文分析了diffie - hellman密鑰交換協議中易受攻擊的地方,提出了基於端對端協議及cookie機制的密鑰交換新方法,並在路由器上實現了密鑰交換和ip報文的安全通信。But the mensans don ' t help their 1 ) cause when they call non - members " densans " - as in dense, dumb. pride like that makes mensa an easy 2 ) target for critics
可是,曼沙人稱呼非會員為愚人? ?愚笨的愚? ?這樣做對他們的目標毫無幫助。這種驕氣使得曼沙成為批評者容易攻擊的靶子。Wireless web services are likewise vulnerable targets for various cracking attacks
無線web服務同樣是易招受各種破解攻擊的目標。But even in countries ( like america ) without extremist parties on the left or the right, politicians will be tempted to deflect the voters ' wrath away from their corporate paymasters and towards an easier target ? “ foreigners ” of all types
但即使是在無極左或極右黨派的國家(像美國)內,政治家亦傾向于將選民的憤怒從公司發薪人員身上移開,而轉向一個更易受攻擊的目標? ?所有的「外國人」 。Parts easy to attack in the system are lan and communication link, which need to take link encrypting and point - to - point encrypting
系統易受攻擊的環節是局域網與通信鏈路,需採取鏈路加密和端到端加密措施。Yet small open economies cannot have an independent monetary policy ( indeed, several have currency boards ) and are vulnerable to external shocks and speculative attacks
然而,開放的小國經濟體不可能擁有一個獨立的貨幣政策(的確,一些國家有通貨委員會) ,而且,它們極易受到外部沖擊和投機性攻擊的傷害。But, the patient if because age is old, or it is to contract the disease with meeting immunize low function ( be like : diabetic, aids ) when, will make hepatic defence function is reduced, and the condition that makes liver exposeds to the open air wu yi suffers attack
但是,病人假如因為年紀大,或是患有會使免疫功能低下的疾病(如:糖尿病、 aids等)時,將會使肝臟的防禦功能降低,而使肝臟曝露于易受攻擊的狀態。It is well known that information technology is the most important part in the modern warfare, so how to get the power to control information has already become the primary resource to decide the winner of war
現代戰爭中信息技術正起著越來越大的作用,制信息權和制空權、制海權一樣,是戰爭勝負的關鍵。在奪取制信息權的信息戰中,通信系統是最容易暴露、和受攻擊的環節。But there have also been ads like the one in florida [ accusing ] a republican congressman of [ profiting ] from [ so - called ] [ drug ] deal
但是也有一些正面攻擊的廣告,佛羅里達州的某則廣告指責一位共和黨國會議員從所謂的藥品交易中牟利。Up until tuesday, the police had seemed to discount any suggestion that the attackers might be suicide bombers - an idea that would almost certainly deepen apprehensions among britons used to perceiving such attacks as a phenomenon of the middle east or iraq
直到星期二以前,警方還對襲擊是自殺性攻擊的說法還是半信半疑,但這對習慣把人體炸彈看成中東和伊拉克現象的大不列顛人來說,是很容易接受的。Sql critical update scans the computer on which it is running for instances of sql server 2000 and msde 2000 that are vulnerable to the slammer worm, and updates the affected files
Sql關鍵更新掃描運行容易受到slammer蠕蟲程序攻擊的sql server 2000和msde 2000實例的計算機,並更新被感染的文件。Sql scan sqlscan. exe scans an individual computer, a windows domain, or a range of ip addresses for instances of sql server 2000 and msde 2000, and identifies instances that may be vulnerable to the slammer worm
Sql掃描程序sqlscan . exe可以掃描單獨的計算機windows域或特定范圍的ip地址,並可以識別出易受slammer蠕蟲程序攻擊的sql server實例。If you attack with a charged superweapon, then your opponent ' s army will be easily wiped out when he tries to defend against you, since you can just use the superweapon on his army
如果你用充能好的超武配合攻擊的話,當敵人試圖防禦你的攻擊時,他們的部隊會被你輕而易舉的消滅,你只需要在他們的軍隊上使用超武就可以了。Now provides security protection for vulnerable pointer parameters
現在可對容易受到攻擊的指針參數提供安全保護。現在,It is easy to see that an attacker could put even an industrial - strength web server out of business due to the amplification effects of the attack
容易發現,由於這種攻擊的放大效應,它甚至能夠使工業強度的web服務器癱瘓。It only updates vulnerable files
它只更新易受攻擊的文件。Also protects against vulnerable parameters passed into a function
還可以防止向函數傳入易受攻擊的參數。分享友人