password attack 中文意思是什麼

password attack 解釋
口令攻擊
  • password : (密碼):此項為「 」(加密)說明有密碼,為保密,因此內容不予顯示。如果為
  • attack : vt 1 攻擊 (opp defend)。2 非難,抨擊。3 著手,動手,投入。4 (疾病)侵襲。5 【化學】腐蝕。n 1 ...
  1. A practical efficient one - time password authentication protocol is presented which based on the symmetric algorithm, which conquers common challenge - response protocol weakness and can achieve mutual authentication and avoid replay attack and personating attack

    該方案克服了通常的質詢響應認證方案的弱點,可以用在網路環境下,實現通信雙方的相互認證,防止重放攻擊和冒充攻擊,實現簡單,執行效率高。
  2. 2 ) a new one time password authentication scheme. the original password authentication is vulnerable to guess attack and server personating attack. to overcome the vulnerability of this scheme, this paper designs a simple and efficient password authentication schema. the enhanced schema can improve the system ' s ability to defend all kinds of the attacks without using any cryptosystems

    2 )新的一次性口令認證機制。針對postgresql原有認證機制具有易遭受口令猜測攻擊和服務器端假冒攻擊的缺陷,本文設計了一種簡單而有效的口令認證機制。該認證機制不需要使用任何加密系統,就能有效加強對各種攻擊手段的防範能力。
  3. Hashed passwords stored in a text file cannot be used to regenerate the original password, but they are potentially vulnerable to a dictionary attack

    存儲在文本文件中的哈希密碼不能用於重新生成原始密碼,但它們可能容易受到字典式攻擊。
  4. Article 23 the acts that divulge the secret of commercial password techniques, unlawfully attack the commercial passwords or conduct the activities impairing the security and interest of the state with commercial passwords and constitute a crime in serious cases shall be legally investigated into the criminal responsibility

    第二十三條泄露商用密碼技術秘密、非法攻擊商用密碼或者利用商用密碼從事危害國家的安全和利益的活動,情節嚴重,構成犯罪的,依法追究刑事責任。
  5. Their resolute and determined defense, their swift and sure attack, their indomitable purpose, their complete and decisive victory - always through the bloody haze of their last reverberating shot, the vision of gaunt, ghastly men, reverently following your password of duty, honor, country

    他們堅定和果決的防守,他們快速和確切的攻擊,他們不屈不撓的目標,他們圓滿及果斷的勝利,總是通過他們最後回蕩不已槍響的血腥昏暗、憔悴蒼白男人的眼光、恭敬地遵守你責任、榮耀及國家的口號來達成。
  6. The main work of this thesis include the following aspects : ( 1 ) after deeply analyzing and probing the one - time password authentication technology, aiming for the deficiency of the extant systems of one - time password authentication, this thesis proposes an improved one - time password authentication schenism, which can efficiently resist the small - number attack and replay attack. what ' s more, during implementation the improved authentication mechanism does not require the user in the client end to install any software or to modify any configuration

    本文主要做了以下幾個方面的工作: ( 1 )對一次性口令認證技術進行了深入的分析和探討,針對現存一次性口令認證系統不能抵禦小數攻擊的安全漏洞,提出一種改進的一次性口令認證機制,這種認證機制能夠有效地抵禦小數攻擊和重放攻擊,而且使用時不需要客戶端做任何設置和安裝任何軟體。
  7. A hybrid attack will add numbers or symbols to the filename to successfully crack a password

    混合攻擊將數字和符號添加到文件名以成功破解密碼。
  8. When trying to attach over the internet to the site, the attacker uses a password generator tool, such as l0phtcrack, which launches a brute force attack against the server

    當試圖通過因特網連接到該站點時,攻擊者使用一個密碼發生器工具(如l0phtcrack ) ,它啟動對服務器的蠻力攻擊。
  9. Intranet attack include : information - detector, ip - deceive, dos, password - attack, man - in - the - middle - attack, application layer attack, network reconnaissance, trust exploitation, port redirection, virus. it is helpful to obtain complete and distinct security requirements with intranet security risk analysis. 2

    主要包括數據包探測器、 ip電子欺騙、拒絕服務、密碼攻擊、中間人攻擊、應用層攻擊、網路偵察、信任利用、埠重定向、病毒和特洛伊木馬。
  10. In this type of attack, the attacker, after gaining access to the password file, attempts to guess passwords by using software to iteratively hash all words in a large dictionary and compare the generated hashes to the stored hash

    在這種類型的攻擊中,攻擊者在獲得對密碼文件的訪問權限之後,通過使用軟體對一個大字典中的所有單詞反復進行散列運算並將生成的哈希與存儲的哈希進行比較,試圖猜出密碼。
  11. The first factor is " something you know " such as user id and password. the other factor is " something you have " such as e - cert or security token that can be physically held by a user. the second factor is not transmitted over the internet and thus safe from internet fraudsters attack

    首個認證元素是你知道的資料,如用戶名稱及密碼,而另外一個元素則是你擁有的東西,如電子證書或保安儀器( securitytoken )這些你擁有的實物。
  12. This article elaborated the common password attack technology : gains the password from the main station, intercepts the password on the communication link, explains the password from the far - end system, and introduced the related guard measure

    本文闡述了常見的口令攻擊技術:從用戶主機中獲取口令,在通信線路上截獲口令,從遠端系統中破解口令,並介紹了相關的防範措施。
  13. Prom memory can store the data for over 20 years and the built - in protection circuit can get rid of the outside attack. 5 high privacy : the operator can only operate it with its own password

    該表對用戶購水量有限制,當剩餘水量和已購水量之和大於所設定的限制值時,水表將不讀取用戶卡中的水量
  14. I believe one reason why operating systems restrict access to password checking apis is because any user could call them from any user level program and potentially use a dictionary attack to try to learn a user s password

    )我認為,操作系統限制對密碼檢查api進行訪問的原因是,如果不加限制,任何用戶都可以使用任何用戶級程序調用它們,而且有可能使用字典攻擊來試圖獲取用戶的密碼。
  15. This attack uses password cracking to penetrate the systems that the attacker wants to deface

    這一攻擊使用密碼破解來滲透攻擊者想破壞的系統。
  16. Therefore, if the threshold of 50 is reached, then an attack is fairly likely, and you should expect the customer to be able to provide an actual password

    對生成器隨后的調用採用第一次運行產生的整數,並將它傳給一個函數,以生成0到n之間的一個新整數,然後再將新整數除以n返回。
  17. This attack is made much more difficult by the introduction of random bytes at the end of the password before the key derivation

    在密鑰導出之前在密碼末尾引入隨機位元組將使這種攻擊非常困難。
分享友人