spoofing 中文意思是什麼

spoofing 解釋
(電子欺騙)任何涉及假扮其他用戶或主機以對目標進行未授權訪問的過程
  1. Vendor fud fear, uncertainty, and doubt spread to sell product aside, there are really not that many attack tools that present a complete one - stop, no - brains - required spoofing solution

    除了供應商fud (擔心、不確定性和懷疑影響產品銷售)外,確實沒有那麼多攻擊工具提供一步到位並且不需動腦的欺騙解決方案。
  2. Dns authentication can be defeated with ip spoofing

    Ip欺騙可以使dns認證失效。
  3. Third, spoofing attacks are difficult to execute

    第三,欺騙攻擊難以執行。
  4. Detecting wireless lan mac address spoofing attack

    地址欺騙攻擊的檢測
  5. So why even worry about ip spoofing

    因此為什麼還要擔心ip欺騙呢?
  6. Spoofing means impersonating someone else to the computer

    欺騙意味著模擬其他用戶訪問計算機。
  7. Windows nt 4. 0 security patch : lpc port spoofing vulnerability also downloaded

    的用戶還同時下載了:
  8. Which ensure name uniqueness and prevent name spoofing, and

    (確保名稱的唯一性並防止名稱欺騙) ,以及
  9. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    安全性是虛擬專用網能否取代傳統專用網的關鍵,本文對mplsvpn體系結構的安全性進行了深入分析,包括地址空間和路由的隔離、隱藏mpls核心結構、抵抗攻擊、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同安全級別的結論。
  10. Spoofing concerning ip is one of the main secure attacks in the computer networks. the principles and implement of arp 、 icmp 、 rip and dns are illustrated and their secure proplems are also reported in this paper. serveral common mechanisms of some spoofings are analyzed and some ideas and methods about combating these spoofings are proposed

    關于ip的欺騙是計算機網路中最主要的安全攻擊之一,本文從闡述arp 、 icmp 、 rip和dns協議的實現原理與過程中,論述了其中存在的安全漏洞,描述並分析了常見的幾種欺騙手法,進一步提出了防止欺騙的思想與方法
  11. These kinds of attacks require the same level of skill as ip spoofing

    這些類型的攻擊需要與ip欺騙同等級別的技巧。
  12. Backed by a ratings - obsessed producer rene russo and coached in the finer points of copdom by a veteran star william shatner, spoofing his t. j

    節目推出后大受觀眾歡迎,而軍火交易幕後黑手正策劃大茶飯,矛頭正指米曹和崔士的生命安全
  13. The new method firstly put forward by this paper : the method of preventing ip embezzlement based arp spoofing, is low cost and easy to implement, and also, it ' s effectual to various kind of ip embezzlement

    本文獨立提出的ip地址防盜用新方法即基於arp偽裝技術的ip地址防盜用解決方案,具有低成本、易實施的特點,而且對各種ip地址盜用的形式都能夠防範。
  14. Then based on the attack tree model, an attack specification language is consmicted and an example of ip - spoofing theck is given

    另外,還使用攻擊樹來對系統安全事前分析,並提出了權重的計算演算法。
  15. Download now to prevent an attacker from attempting identity spoofing using certificates

    立即下載以防止攻擊者試圖使用證書偽造身份標識。
  16. Windows 2000 security patch : certificate validation flaw could enable identity spoofing

    Windows 2000安全修補程序:可以利用證書驗證缺陷來偽造身份標識
  17. Windows xp security patch : certificate validation flaw could enable identity spoofing also downloaded

    Windows 2000安全修補程序:可以利用證書驗證缺陷來偽造身份標識
  18. This update resolves the " certificate validation flaw could enable identity spoofing " vulnerability in windows xp

    此更新解決了windows 2000中的安全漏洞「可以利用證書驗證缺陷來偽造身份標識」 。
  19. Common network attacks such as ip spoofing, source route spoofing, icmp redirect deception and ip hijack are analyzed and protected by filter manage module. ip hijack protection is implemented through injecting a hook function into protocol stack in detail

    針對常見的ip地址欺騙、 ip源路由欺騙、 icmp重定向欺騙、 ip劫持等網路攻擊給予了分析並在過濾管理模塊中給出了防禦的方法,其中ip劫持防禦是用一個鉤子函數注入協議棧中來實現的。
  20. Spoofing can be interpreted as the network security term used for forging

    電子欺騙可以解釋成用於偽造的網路安全術語。
分享友人