訪問破壞 的英文怎麼說

中文拼音 [fǎngwènhuài]
訪問破壞 英文
access violation
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : Ⅰ動詞1 (完整的東西受到損傷) be broken; be damaged 2 (使損壞) break; break down; damage 3 (使...
  • : Ⅰ形容詞1 (不好的; 惡劣的; 使人不滿意的) bad 2 (表示程度深 多用在表示心理狀態的動詞或形容詞後面...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  • 破壞 : 1 (使建築物等損壞) destroy; wreck; ruin 2 (使事物受到損害) do great damage to; do harm to; da...
  1. In this type of threat, an unprivileged user gains privileged access and thereby has sufficient access to compromise or destroy the entire system

    在這種威脅中,無特權的用戶獲得特權,因此可以通過來威脅或整個系統。
  2. Prevention of unauthorized alteration, use, destruction, or release of data during authorized access

    在被授權期間,防止對數據做未經授權的改變、使用、和拋棄。
  3. Applications in the same cell, even with global security and java 2 security enabled, can potentially compromise other applications in the same cell by accessing resources of those applications or altering the cell configuration

    在同一個計算單元中的應用程序(即使啟用了全局安全性和java 2安全性)可能會通過其他應用程序的資源或改變計算單元配置,從而潛在地
  4. On one side, the firewall lets intranet acl users access permitted resources from the outside internet. on the other side, it protects and hides a cluster of computers from cracking attempts and denial of service from the internet

    一方面,它允許intranet的acl用戶從外部的internet許可的資源,另一方面,它又保護並隱藏計算機集群避免來自internet的行為和拒絕服務( dos ) 。
  5. Windows 2000 security patch : smtp rollup windows 2000 security patch : domain account lockout vulnerability

    Windows 2000修補程序:在高系統負載期間軟盤時出現數據
  6. After studying ms - pptp protocol, we think that the security of a vpn is based on the security of its authentication and encryption protocols. if a vpn ' s cryptography is weak, then its security is no better than a non - private virtual network routed over the internet. since companies are relying upon vpns to extend trusted internal permiters to remote offices, breaking the security around such a tunnel is tantamount to defeating all of the security around the internal permiter

    本文對ms - pptp協議實現進行了深入的分析、研究,認為:認證和加密協議的安全決定了vpn的安全性,如果vpn認證和加密手段是脆弱的,那它的安全性並不比在internet上使用非vpn傳輸數據高,因為一個組織依靠vpn擴展其可信的內部邊界,允許外部分支內部網路,隧道的安全性等於了所有內部網路。
  7. In order to ensure that a malicious java program written by the evil dudes of the world could do no damage to the user s system, all mobile code was deemed untrusted and required to possess special access permissions in order to perform even the most benign activity

    為了保證惡意java程序(由世界上惡意者編寫的)不會損用戶的系統,所有移動代碼都視為不受信任的,並且那怕進行最無害的操作也要求具有特殊的權限。
  8. A nicer database secure design can availably protect data, preventing from an illegal interview and breaking

    良好的數據庫安全設計可以有效地對數據進行保護,防止不合法的
  9. As a part of is ( information security ), also one of the standard security services established by iso ( international standard organization ). access control is used to protect important resources, for instance, prohibits illegal user ’ s access to the confidential resources, restricts legal users ’ operation in their permitted set of operation and prevents resources from damages due to carelessness

    作為信息安全體系的一部分,同時也是國際化標準組織定義的五項標準安全服務之一,控制在保護重要資源方面有相當重要的作用,包括防止非法用戶機密信息,限制合法用戶的非法操作,以及由於疏忽所造成的誤操作對資源的
  10. This paper analyzes the architecture of distributed firewalls based on comparing with the traditional firewalls : network firewalls and personal firewalls. it brings forward a new design about the distributed firewalls in which some host firewalls and a control center constitute the whole distributed firewalls with reserving the old network firewalls. a host firewall is a packet - filtering firewall that filters the network packets come from inside the network based on the information of network application program, ip address, tcp or udp port and so on

    本文在與傳統的網路防火墻、個人防火墻技術對比的基礎之上,結合計算機網路安全的本質與要求,對分散式防火墻這一全新的防火墻體系結構進行了分析,提出一種充分利用現有技術和投資的分散式防火墻系統的設計方案,即在保留傳統網路邊界防火墻的同時,設計一種駐留在內部網路終端的主機防火墻及其控制中心,將防火墻延伸到內部網路的終端,從而有效防範來自網路內部的非法與惡意
分享友人