有蠕蟲的 的英文怎麼說
中文拼音 [yǒurúchóngde]
有蠕蟲的
英文
wormy-
It can be found in the cell walls of fungi and the exoskeletons of shellfish, plankton and insects, along with insect egg cases and the powerful grinders and rigid walls in the pharynx of worms
同樣見于真菌細胞壁和甲殼類動物、浮游生物和昆蟲的外骨架,多見于昆蟲卵鞘和蠕蟲咽部硬管壁和強有力的研磨器官。Therefore, it became a pressing work to enforce worm containment in large scale networks
如何有效地遏制蠕蟲在大規模網路中的傳播成為非常迫切的問題。They discover that they have a telepathic worm connected to a life support system
他們發現有一個精神感應的蠕蟲依附著生命維持系統在裏面。An epidemic model of friendly worm counter - attacking network worm is proposed based on two - factor model, with the conditions that the machine number of the network is fixed during propagation
這對于基於主動擴散的良性蠕蟲主動對抗惡性蠕蟲具有一定的指導意義。其次,研究基於ascm模型的良性蠕蟲主動擴散演算法。So far, no reports have been received from government departments on the infection of the worm
資訊科技署至今未有接獲政府部門受這蠕蟲感染的報告。The characteristic of anomaly traffics is that it breaks out without any omen and can destroy networks and computers in a short time ( for instance, the outburst of traffic behavior caused by specific attack programs or worm burst ). therefore, to detect anomaly rapidly and accurately is one of the precondition of ensuring the efficient network operation and detection of anomalous traffic has become the attractive and valuable subject in the present academic and industrial circles
異常流量的特點是發作突然,先兆特徵未知,可以在短時間內給網路或網路上的計算機帶來極大的危害(例如由特定的攻擊程序或蠕蟲爆發所引起的突發流量行為) ,因此準確、快速地檢測網路流量的異常行為,並做出合理的響應是保證網路有效運行的前提之一,也是目前學術界和工業界共同關注的前沿課題之一。Battalion : " additional crates of heavy ordinance with radio locators are being dropped. retrieve ordinance and neutralize the worm.
指揮部: 「增加的重武器物資箱正在空投,他們都帶有無線定位器。回收物資並消滅蠕蟲。 」Adding some soil with worms in it can also help
加一些有蠕蟲的土壤也有助於加快速度。The serious issue of computer software security will be explored in this programme. the programme goes on to discuss three forms of software attacks the virus, the trojan horse and the worm and demonstrates how the use of a firewall installed into a computer network can provide a good measure of protection
電腦網路究竟有多安全?本節目會探討電腦軟體安全的嚴重性,以及電腦病毒木馬程式和蠕蟲攻擊軟體的方式。另外,亦會介紹如何利用防火墻保護電腦網路。Something, such as the thread of a screw or the spiral condenser in a still, that resembles a worm in form or appearance
有螺紋狀的物品某物,如螺旋線或蒸餾器的螺旋冷凝器,在構成或外表上像蠕蟲You may also visit hong kong computer emergency response team coordination centre for more details
有關此蠕蟲的更多詳情,請瀏覽香港電腦保安事故協調中心。Therefore, it is consequently reasonable to conclude that the statistics and classification of network access will certainly help the detection of worm efficiently. the behavior of user was analyzed, we proposed a new approach to
因而,對用戶的訪問目的進行統計分類,並建立用戶訪問目的列表,則在蠕蟲發作時則能及時有效的發現蠕蟲。It sends a message with a link to itself to all recipients listed in the outlook contacts folder
它會傳送一段含有蠕蟲程式的電郵至outlook地址薄上所有連絡人。In the united states, internet and e - mail service providers were blocking the worm in record numbers, while others were getting through to an untold number of unprotected computer users
美國的網路和郵件服務商正在過慮記錄在案的蠕蟲病毒,然而有些病毒卻躲過阻擋使不計其數的未受保護計算機受到感染。A deep packet inspection engine will enable the asic to quickly inspect packet payloads to identify potential security threats, such as worms, that would pass through existing firewall solutions unchecked
高級的包偵測引擎將能夠使asic快速偵測包的有效載荷以便識別潛在的安全威脅,例如現在那些將通過防火墻而不能阻止的蠕蟲病毒信息包。W32. badtrans. 13312 @ mm is a mapi worm that replies to all unread mails in the microsoft outlook email message folders, and drops a backdoor trojan
W32 . badtrans . 13312 @ mm是一種mapi蠕蟲,它會回覆所有在microsoftoutlook訊息資料夾內的未閱讀郵件和附加上后門特洛伊木馬程式( trojan ) 。Post or transmit any information or software which contains any virus, trojan horse, worm or other harmful component
發帖或者傳輸含任何病毒、欺騙程序、蠕蟲或者其他有害成分的任何資訊或者軟體;The paper introduces the definition of worm according to the history of worm, analyses the worm ’ s function module, attacking mode, scanning regulation and the typical worm - sasser, then brings forward a worm - detecting algorithm based on packet statistics, by analyzing the detecting algorithm in existence
本文結合蠕蟲發展的歷史提出了蠕蟲的定義,分析了蠕蟲的功能結構,攻擊手段,掃描策略,並對sasser蠕蟲進行了剖析。簡述了現有的蠕蟲檢測演算法,並分析了其優缺點,提出了基於數據包統計的蠕蟲檢測演算法。Analyzing worm ’ s scanning stage, we find that worm ’ s spreading speed is closely related to network scale. the sem is aimed and analyzed deep, based on the model analysis, we do the quarantine work by dividing a large - scale network and perform the quarantine on the border
並以sem ( simpleepidemicmodel )模型為主要對象,對模型進行了深入研究,在此基礎上,提出了對網路進行分割以減小網路規模,在劃分邊界上對蠕蟲進行隔離,從而在大規模網路上有效的抑制蠕蟲的傳播。But one thing should be considered : when the original email server needs the clients to authenticate themselves ( this is called smtp authentication, and it is becoming a must to many of the isps ), the deployment of msg shall not break this authentication session between the client and server
我們採用了郵件網關( msgmailshieldgateway )的方式提供對郵件病毒和蠕蟲的查殺。當原有的郵件服務器需要客戶認證時, msg必需保證原有的郵件服務器和郵件客戶端之間的認證通信不受影響。分享友人