蠕蟲的 的英文怎麼說
中文拼音 [rúchóngde]
蠕蟲的
英文
helminthic-
But microsoft removed a link between the targeted page, which was actually an incorrect address, and the rest of its website in an effort to fend off the attack
但是,微軟公司移開了蠕蟲真正想要攻擊的一些連接,事實上,蠕蟲攻擊的網點都是微軟提供的假地址,假網點.而其他微軟的網站都成功的避開的蠕蟲的攻擊Adding some soil with worms in it can also help
加一些有蠕蟲的土壤也有助於加快速度。An agent used to kill worms
殺蠕蟲劑用來殺蠕蟲的一種藥劑Superficial view on methods of defending the computer worm
淺談防範計算機蠕蟲的一些方法Many children also suffer from worms
許多孩子都遭受蠕蟲的危害。Fig. 5 the proportion of infected machines re - detected
始檢測到的感染蠕蟲的計算機中80 %被清除。Experimental research on treatment of waste water from a coking plant by swollen graphite
膨脹石墨蠕蟲的紅外衰減性能研究The average time it take until an ip address is targeted by a worm
,即某個ip地址成為某個蠕蟲的目標之前所經歷的平均時間。Firstly, we have a review of the internet worm history, and propose the definition of friendly worm
首先給出良性蠕蟲的定義、功能結構以及工作機制。You may also visit hong kong computer emergency response team coordination centre for more details
有關此蠕蟲的更多詳情,請瀏覽香港電腦保安事故協調中心。Msg to avs : the first av who detect this worm will be the first killed in the next 24hours ! !
翻譯:最先偵測到這個蠕蟲的反病毒者將會在以後的24小時之內被幹掉! !By combining spreading models, population data extracted from real internet worm epidemics, and measured models of internet topology, we have shown that any reactive worm defense will require extremely widespread deployment and very short reaction times ( a few minutes or less )
通過結合傳播模式、數量等從實際的網際網路蠕蟲的傳播得來的數據,以及對網際網路拓撲結構的測量,發現任何反應式的蠕蟲防禦需要廣泛的部署和非常短的反應時間(即分鐘或更少) 。The worm author can then use this worm extension to start denial of service ( dos ) attacks on irc channels, servers andor users connected to the same irc channel as the infected user
蠕蟲的創造者能夠利用這附加功能來進行阻斷服務( denialofservice )攻擊irc頻道上在線的機器,伺服器和或其他連接受感染的使用者相同頻道的使用者。The microscopic appearance of this vascular malformation reveals the dilated, tortuous, worm - like vascular channels. such lesions may bleed a small amount and be the cause for a seizure disorder
血管畸形顯微鏡圖像顯示出擴張、扭曲、類蠕蟲的血管通道,這種病變可能只引起少量出血,還是癲癇發作的一個原因。In this dissertation, we make comprehensive researches on network worm containment technologies based on active countermeasure
本文針對這種情況對蠕蟲的主動防禦技術進行了深入的研究。For example, donoghue says, it ' s possible scan the length of a tiny worm ' s digestive tract, determining the shape of its organs and the arrangement of its teeth
例如,多納說,現在可以掃描細小蠕蟲的消化道,以確定它的器官形狀與牙齒的排列方式。The paper introduces the definition of worm according to the history of worm, analyses the worm ’ s function module, attacking mode, scanning regulation and the typical worm - sasser, then brings forward a worm - detecting algorithm based on packet statistics, by analyzing the detecting algorithm in existence
本文結合蠕蟲發展的歷史提出了蠕蟲的定義,分析了蠕蟲的功能結構,攻擊手段,掃描策略,並對sasser蠕蟲進行了剖析。簡述了現有的蠕蟲檢測演算法,並分析了其優缺點,提出了基於數據包統計的蠕蟲檢測演算法。All these observed results submit to software module through pci module as an important parameter to judge whether the host infects worm
這些統計的數據將通過pci模塊上傳給上層軟體作為判斷是否感染蠕蟲的一個重要指標。Analyzing worm ’ s scanning stage, we find that worm ’ s spreading speed is closely related to network scale. the sem is aimed and analyzed deep, based on the model analysis, we do the quarantine work by dividing a large - scale network and perform the quarantine on the border
並以sem ( simpleepidemicmodel )模型為主要對象,對模型進行了深入研究,在此基礎上,提出了對網路進行分割以減小網路規模,在劃分邊界上對蠕蟲進行隔離,從而在大規模網路上有效的抑制蠕蟲的傳播。But one thing should be considered : when the original email server needs the clients to authenticate themselves ( this is called smtp authentication, and it is becoming a must to many of the isps ), the deployment of msg shall not break this authentication session between the client and server
我們採用了郵件網關( msgmailshieldgateway )的方式提供對郵件病毒和蠕蟲的查殺。當原有的郵件服務器需要客戶認證時, msg必需保證原有的郵件服務器和郵件客戶端之間的認證通信不受影響。分享友人