攻擊用病毒 的英文怎麼說
中文拼音 [gōngjīyòngbìngdú]
攻擊用病毒
英文
challenge virus- 攻 : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
- 用 : Ⅰ動詞1 (使用) use; employ; apply 2 (多用於否定: 需要) need 3 (敬辭: 吃; 喝) eat; drink Ⅱ名...
- 病 : Ⅰ名詞1 (疾病; 失去健康的狀態) illness; sickness; disease; malum; nosema; malady; morbus; vitium...
- 毒 : Ⅰ名詞1 (對生物體有害的性質或物質; 毒物) poison; toxin 2 (毒品) drug; narcotics 3 (姓氏) a s...
- 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
- 病毒 : [醫學] virus; inframicrobe (濾過性)
-
The basic mechanism of viral attack is that the viruses replicate themself using the host ' s ( in this case is " our " ) dna genetic replication system
濾過性病毒攻擊人體的基本機制是病毒能夠通過使用病人身體中的dna基因復制系統來復制自己。Build up your own anti - virus server to protect your lan system from virus
防病毒服務器租用幫助您建立自己的防病毒服務器,免受攻擊The serious issue of computer software security will be explored in this programme. the programme goes on to discuss three forms of software attacks the virus, the trojan horse and the worm and demonstrates how the use of a firewall installed into a computer network can provide a good measure of protection
電腦網路究竟有多安全?本節目會探討電腦軟體安全的嚴重性,以及電腦病毒木馬程式和蠕蟲攻擊軟體的方式。另外,亦會介紹如何利用防火墻保護電腦網路。Police clew, fund investor does business in the bank on the net when, should open virus real time supervisory system, do not visit doubtful website at the same time, download runs doubtful file and program to prevent virus to atttack, input password should use soft keyboard as far as possible
警方提示,基金投資者在網上銀行進行交易時,應開啟病毒實時監控系統,同時不要訪問可疑網站,下載運行可疑的文件和程序防止病毒攻擊,輸入密碼應盡可能使用軟鍵盤。Save to the extent permitted by this agreement and by law, you will not reverse engineer, disassemble or decompile any of our content or transmit software that may cause damage to or failure of our computer equipment or data or that of any other persons, including without limitation using the service to upload a computer virus or any harmful software application or engage in denial of service attacks
除本協議及法例許可者外,閣下或任何人士不得顛倒設計、將吾等之任何內容拆離或解裝或傳送軟體而導致吾等之電腦設備或數據遭受破壞或出現故障,包括但不限於使用服務上載電腦病毒或任何有害軟體應用或參與拒絕服務攻擊之事宜;Using this feature, you can block or allow access for different user groups to certain websites or to sites classified as inappropriate
使用這一個磁盤片,你在能重新開始你的作業系統之後,病毒為懷惡意的物體攻擊而且掃描它。The option of creating a rescue disk has been added. using this disk, you can restart your operating system after a virus attack and scan it for malicious objects
創造一個援救磁盤片的選項已經被增加。使用這一個磁盤片,你在能重新開始你的作業系統之後,病毒為懷惡意的物體攻擊而且掃描它。As the growth of the internet popularize intensity, network traffic anomalies, which are caused by network attacks, worm virus, malicious download, equipment failure, etc, increasingly impact the network performance, some unusual offensive flow disrupts the normal operation of the network order, poses a serious threat to network security. in such situations, how to detect the network traffic anomalies accurately and in time, ensure the normal operation of the network, provide users with a good network environment, become a topic of concern
但是隨著網路的普及程度越來越高,由網路攻擊、蠕蟲病毒、惡意下載、設備異常等因素導致的網路流量異常對網路性能的影響越來越大,某些帶有攻擊性的異常流量干擾了正常的網路運行秩序,對網路安全造成了嚴重威脅。在這種情況下,如何及時而準確的檢測出網路流量異常,保證網路的正常運行,為用戶提供一個良好的網路環境成為一個備受關注的研究課題。Many others come from “ botnets ” ? chains of computers that have been hijacked by viruses totake part in such raids without their owners knowing
而其他一些人則採取「殭屍網路」進行攻擊,這種攻擊能在電腦用戶們毫不知情的情況下讓一連串的電腦被病毒劫持並參與襲擊活動。Sony bmg announced it was recalling millions of music cds with copy protection software that experts said could expose personal computers to viruses and hackers
此前,有專家說該軟體可能使用戶的個人電腦易受電腦病毒和黑客的攻擊。Intranet attack include : information - detector, ip - deceive, dos, password - attack, man - in - the - middle - attack, application layer attack, network reconnaissance, trust exploitation, port redirection, virus. it is helpful to obtain complete and distinct security requirements with intranet security risk analysis. 2
主要包括數據包探測器、 ip電子欺騙、拒絕服務、密碼攻擊、中間人攻擊、應用層攻擊、網路偵察、信任利用、埠重定向、病毒和特洛伊木馬。Jiangmin firewall ( new ) is a solution for individual users of internet security and network security protection design tools, product integration, advanced dynamic network access control technologies, and thoroughly resolve hacker attacks, trojans and viruses and other internet networks dangerous invasion, the comprehensive protection of personal internet security
江民防火墻(新)是一款專為解決個人用戶上網安全而設計的網路安全防護工具,產品融入了先進的網路訪問動態監控技術,徹底解決黑客攻擊、木馬程序及網際網路病毒等各種網路危險的入侵,全面保護個人上網安全。The first so - called " viruses " have already attacked wireless users in spain and also ntt docomo s imode phones in japan
在西班牙,第一個所謂的「病毒」已經攻擊了無線用戶,同樣在日本, ntt docomo的imode手機也受到了攻擊。These include three denial of service vulnerabilities, one of which is exploited by the code red worm, and two vulnerabilities that could enable an attacker with the ability to load low - privilege code on the server to gain higher privileges
這些包含三個拒絕服務弱點,其一是利用紅色警戒病毒,另外兩個弱點則有可能使攻擊者有能力從伺服器中載入低權限的程式碼,藉此獲得較高的權限。In this paper, by studying the feature of the netflow data and the mib status of the network equipments, at the same time, in terms of analyzing the characteristics of network attack, worm spread, virus infection and network misuse behaviors, our work is based on the facts that most of the anomaly traffic in campus network has influences of the netflow data and network equipment status. an approach is present to assess the threats of the traffic in terms of five factors : the traffic bytes distribution, flow number distribution, packets number distribution, equipment cpu utilization and the memory utilization. the weight of each factor is computed and determined by fuzzy relation matrix 。 an prototype system is designed to test the method and the results are analyzed to evaluate the availability of our method
本文研究了netflow流數據的特徵和網路設備運行狀態數據,分析了校園網網路異常攻擊、蠕蟲病毒和網路濫用行為的特點,基於大多數的網路流異常必然反映在網路網路流量數據特徵的變化以及網路設備運行狀態的改變這樣一個事實,提出了一套基於網路流量和網路設備運行狀態的異常威脅評估方法,確定了5種威脅評估因素:網路流帶寬分佈、網路流數量分佈、網路流包數量分佈、網路設備cpu利用率、網路設備內存利用率,並採用模糊關系矩陣方法計算和分配這5種評估因素在評估函數中的權重。Seattle reuters - apple computer inc., long considered to be relatively immune to the security holes and viruses that plague longtime rival microsoft corp. ' s windows, said on friday a security hole in its s vulnerable to attack
一直以來都被認為相對微軟的windows操作系統不會面臨安全漏洞或是受到病毒攻擊的蘋果公司表示,其軟體當中出現的一個安全漏洞使得用戶的電腦很容易受到攻擊。In this text the basic theories and the applied truss of the network monitor and control the system are discussed firstly, the inevitability is also analyzed about monitor and control network facing with the frequent safety threaten. then i research each safety aspect of network remote monitor and control system through academic study, engineering practice and a lot of simulation experiment. at the same time i research deeply and systemically in the popular virus problems and the dangerous hacker ' s attack
本文討論了網路監控系統的基本理論和應用構架,分析了監控網路面臨經常的安全威脅的必然性,然後通過理論研究、工程實踐以及大量的模擬實驗,對網路遠程監控系統安全性問題的各個方面進行了廣泛的研究,對其中最常見的計算機病毒問題以及最可能造成嚴重危害的黑客攻擊問題進行了深入系統的研究。The patches that plug these holes are usually available months before the viruses that exploit them have run rampant, but in a multi - machine environment how can you identify which machines are vulnerable
堵住這些漏洞的補丁程序通常在那些利用漏洞的病毒猖獗運行之前的幾個月就可獲得,但是在一個多機器的環境中,您如何能識別哪些機器易受攻擊呢?Then the problem now is how to make filter in smtp with various filtering engine ( virus engine, keyword engine and rbl, etc. ). this article describes the mechanism of smtp and the process of mail transfer systematically. compare some main popular mail filtering ways from several aspects
因此,要保障郵件的安全傳輸,使你的網路避免通過郵件實現的網路攻擊,就要從smtp入手,使用不同的過濾引擎及過濾策略(如病毒引擎,關鍵字引擎,以及rbl ( realtimeblackholelist )等) ,在smtp中實現過濾,從各個方面保證郵件傳輸的安全性。In this thesis we gave the advisable security requirements to the agent business of the industrial and commercial bank of shijiazhuang through the attack path analysis and the threatening elements analysis. moreover we designed the project of the security protection for the agent business by using the various security equipments such as vpn, firewall, ids, security management center, security kernel, antivirus equipment and so on. by the way, we made some suggestions in the aspect of the security management
筆者通過對石家莊市工商銀行中間業務現狀的分析,採用「安全攻擊路徑分析」和「安全威脅因素分析」方法對該行中間業務的安全威脅進行了詳細的分析,提出了適當的安全需求,採用多種安全設備如vpn設備、防火墻、 ids 、安全管理中心、安全內核、防病毒等,設計出了保護中間業務的技術安全防護方案,並提出了安全管理方面的措施建議,最後,給出了保證中間業務正常運行的安全服務方案。分享友人