近網攻擊 的英文怎麼說

中文拼音 [jìnwǎnggōng]
近網攻擊 英文
net play
  • : Ⅰ形容詞1 (空間或時間距離短) near; close 2 (接近) approaching; approximately; close to 3 (親...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : Ⅰ動詞1 (攻打) attack; assault; take the offensive 2 (指責別人的過錯; 駁斥別人的議論) accuse; ...
  • 攻擊 : 1 (進攻) attack; assault; launch an offensive 2 (惡意指責) attack; accuse; charge; slander; v...
  1. More and more today, the hackers “ sabotage of choice ” is the e - mail bomb ? an easy way into your computer for wrecking the maximum havoc

    來越來越多的路駭客是以郵件炸彈的方式來個人電腦。
  2. Recently, net attack things often occur. it makes people know the fearfulness that net holes bring and realize the importance of the things that keep away the hackers. in fact, net security risks are in every time

    年來,事件頻頻發生,讓人真正認識到了路漏洞所帶來的安全問題的可怕,並切實體會到了黑客防範和路安全防護的重要性。
  3. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip對我國internet的發展起著決定性作用,重慶電信163 / 169路是國家骨幹在本地的延伸,擁有7個核心節點(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節點,能提供寬帶,窄帶多種接入方式的公眾ip,現擁有20萬用戶,佔全市路用戶四分之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip路的開放性,來自外部的增多,如dos / ddos;所使用的操作系統運行的路協議自身的脆弱性;主機、路設備的配置是否缺乏評估手段;不可避免的內部非法訪問;缺乏必要的審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  4. When you receive a ball at the net that you can be aggressive with, attack the closest opponent to you

    當你接發球接到一個你能積極應對的前球時,就距離最的對手。
  5. The first thing to do on defense therefore is for the woman to get away from the smash ( and the man will likely smash at her because she is so close to the net ) by quickly taking a position cross - court from the shuttle about three feet behind the short service line and half - way between the center line and the inside side line

    對于女選手來說,首先要做的事情就是遠離這樣的殺球(由於女選手的站位靠前所以更容易被男選手) ,快速的斜線後退大概距離發球線三英尺,站在中線和發球線的中間。
  6. In this paper we take a closer look at botnets, common attack techniques, and the individuals involved

    這里,我們對殭屍路,普遍的技術以及涉及到的個人做一個更貼的觀察。
  7. English : yomiuri shinbun : recently the web page of a japanese shinto shrine was subjected to prolonged attacks by hackers, leading to an extended stop of the services

    中文: 《讀賣新聞》 :日本靖國神社的頁最遭到黑客的長時間,導致該神社的頁長時間無法使用。
  8. As the recent denial - of - service attacks on several major internet sites have shown us, no open computer network is immune from intrusions

    正如最路上數個主要的站所遭受的拒絕服務所給我們的啟示,並沒有一個真正公開的路可以免遭入侵。
  9. According to a survey produced by us - based research and advisory company in august 2006, even in the us, nearly half of online adults said that concerns about theft of information, data breaches or internet - based attacks affected their purchasing payment, online transaction or e - mail behaviour

    根據美國的研究咨詢公司2006年8月的一項調查,即便在美國將一半的成人路用戶擔心信息失竊,數據竊取,,這影響他們購買支付,上交易和電子通信行為。
  10. In the last few years, the network attack technology has greatly changed from the scale to method, while the traditional packet - filtering firewall has many limitations to the modern network attack : 1. the traditional packet - filtering firewall filters the data flow according to the rules established beforehand to reject illegal access and accept the legal access

    年來,技術在規模與方法上都發生了較大變化,傳統的包過濾防火墻在應對現代時,卻存在著許多的缺陷: 1 、傳統的包過濾防火墻都是根據一些事先規定好的過濾規則對路的數據流進行過濾,從而阻止不合法的訪問,同時允許合法的訪問順利通過。
  11. Govwifi has put in place appropriate security measures, e. g. peer - to - peer blocking to prevent hacking or attack by neighbour wireless users, and content filtering to guard against unintended access to indecent content

    政府wi - fi無線上設施已採取適當保安措施,例如點對點堵截以防範黑客入侵或鄰無線用戶的,及內容過濾保護以避免無意地瀏覽不雅的內容。
  12. Mr kruck says he knows of three us companies that have recently suffered serious attacks on wireless networks from dissgruntled emplyees or exempllyees

    克魯克說,有3家美國公司的無線遭到了不滿情緒的雇員或前雇員的嚴重
分享友人