hacker attack

美 [ˈhækər əˈtæk]英 [ˈhækə(r) əˈtæk]
  • 网络黑客攻击;黑客的攻击
hacker attackhacker attack
  1. This thesis firstly introduces IDS fundamental , hacker attack principle and common attack methods .

    本文首先介绍了关于入侵检测的基本原理,黑客攻击原理和常用方法。

  2. Principle and Prevention of Hacker Attack Mechanism of DDoS attack and its prevention

    黑客攻击机制与防范分布式拒绝服务攻击(DDoS)原理与防范

  3. Design and Implementation of the Precaution System Against Hacker Attack

    黑客入侵防范体系的设计与实现

  4. Hacker Attack Detection System

    黑客攻击侦测系统

  5. Principle and Prevention of Hacker Attack

    黑客攻击机制与防范

  6. Our website is temporarily down due to hacker attack , will resume later .

    本公司网站因遭黑客入侵破坏,将在短期内恢复运作。

  7. However as hacker attack and network virus emerge in endlessly , the problem of network security has become very serious .

    然而层出不穷的黑客攻击和网络病毒事件使得网络安全问题突显出来。

  8. The purpose of the article is to provide the reference model for the research , design and implementation of the precaution system against hacker attack .

    目的是为我国黑客入侵防范体系的研究、设计与实现提供一个参考模型。

  9. The unprecedented development of computer virus and hacker attack , together with the shortcut of information transmission , leads to increasingly severe network environment .

    计算机病毒、黑客攻击的空前发展以及信息传播的快捷化,使网络安全的现状日益严峻。

  10. How to break through the blockage of security technology and establish a new hacker attack technique or system has been the key direction of today 's research .

    如何突破安全技术的封锁,建立一种全新的黑客攻击技术与体制已经成为当前黑客的主要研究方向。

  11. As malicious code wantonly spreads on the Internet as well as hacker attack events continue to rise , network security problems become increasingly serious .

    随着恶意代码在互联网上的肆意传播以及黑客攻击事件的不断攀升,网络安全问题日益严峻。

  12. The details of a national-level hacker attack targeting China have been disclosed for the first time in a report by an Internet security firm .

    某网络安全公司发布报告,首次披露一起针对中国的国家级黑客攻击细节。

  13. At present constant enlargement in network size and hacker attack means complicated day-by-day , the demands of people for the network security grow with each passing day .

    目前随着网络规模的不断扩大和黑客攻击手段的日益复杂,人们对于网络安全的需求与日俱增。

  14. He said Sony has not received any reports of illegal uses of stolen information , and the company is continuing its probe into the hacker attack .

    他表示,索尼并没有收到关于非法使用被盗信息的报道,该公司正在继续黑客攻击事件的调查。

  15. At present , traditional security scanning softwares are single-pertinent tools that can only detect a certain attack which can 't accord the actual need to deal with Hacker attack .

    目前,传统的安全扫描软件都是具有单一针对性的工具,这与黑客在实践攻击过程中,运用多种技术手段作为工具的实际情况是不符合的。

  16. At the same time , it also explains the theories on hacker attack as usual , including TCP SYN Flooding , Ping Flooding and UDP Flooding and so on .

    文章在介绍相关安全防御的同时对于常见的黑客攻击原理也做了说明,包括TCPSYN湮没攻击、Ping湮没攻击、UDP湮没攻击等。

  17. Due to the popularity of Internet , people can access remote resource on the Internet conveniently . But numerous malicious network events such as computer virus and hacker attack make the network management more difficult .

    由于因特网的盛行,人们可以很方便地透过因特网存取远程的资源,但是大量恶意的网络事件,像是计算机病毒和黑客攻击,使得网络的管理越来越困难。

  18. At the same time , hacker attack , high-tech crime incidence continues to increase , the information system security incidents occur frequently , people for the requirements of safety fund on-line trading system is more and more high .

    与此同时,黑客袭击、高科技犯罪的案发率不断增长,信息系统安全事件频发,人们对于基金网上交易系统的安全性要求越来越高。

  19. Some gamers worry about the long-lasting game world just disappearing because of a financial crisis or hacker attack : the psychological problems , not to mention the loss of zillions of virtual dollars .

    有些玩家则担心这个已运行了很长时间的游戏因为金融危机或者黑客攻击而走向终结:随之产生的心理问题,更不用提数额庞大的虚拟货币流失了。

  20. The network more and more widespread and is important in the human society life , however , the hacker attack events emerge one after another incessantly , the network security problem becomes the key problem gradually which the network service and its application further develops must solve .

    网络在人类社会生活中的应用越来越广泛和重要,但是由于黑客攻击事件层出不穷,网络安全问题逐渐成为网络服务和应用进一步发展所需解决的关键问题。

  21. A good example of this genre would be a standard hacker type attack .

    黑客攻击就是这类攻击手法的典型例子。

  22. Hacker can attack our LAN by maliciously using the Address Resolution Protocol .

    地址转换协议(ARP)如果被恶意利用,会对局域网产生严重威胁。

  23. The Discussion on Anti - hacker - attack

    关于网络中反黑客攻击问题的探讨

  24. This paper , based on Ether network environment , primarily presents design and realization of data packet seize which is one of the measure against the hacker 's attack .

    主要介绍了基于以太网环境下数据包的截获的设计与实现。数据包截获的实现是防范网络黑客攻击的措施之一。

  25. As one of the tcp / ip members , arp also has many security loopholes . Arp spoof monitoring is one of the hacker 's attack methods .

    ARP协议作为TCP/IP协议簇中的一员,同样也存在着安全漏洞,利用ARP协议漏洞进行网络监听是黑客的攻击手段之一。

  26. But if the operating system has marked that Internet communications buffer region of memory as only being valid for containing data and NOT code , the hacker 's attack will never get started .

    但是,如果经营体制,标志着互联网通信缓冲区的记忆,因为只有被有效遏制数据,而不是代码,黑客的攻击将不会得开始。

  27. OS scanning is the prelude of hacker 's attack by using OS vulnerability . Real-time detection of OS scanning is one main measure against hacker 's intrusion using OS vulnerabilities .

    OS扫描是黑客进行OS漏洞攻击的前奏,实时检测OS扫描是防止系统遭受OS漏洞攻击的重要手段。

  28. The E-Mail system should prevent the hacker 's attack , will prevent the junk email from overflowing , avoid the letting out of materials content of the sensitive mail at the same time .

    电子邮件系统既要防止黑客的攻击,还要防止垃圾邮件泛滥,同时要避免敏感邮件资料内容的泄漏。

  29. Because the website needs to be visited by the public exposes on Internet , it is easy to become hacker 's attack goal , therefore needs a special website file protection system to safeguard the security of the website content .

    网站因需要被公众访问而暴露于因特网上,容易成为黑客的攻击目标,因此需要专门的网站文件保护系统来保障网站内容的安全。

  30. This paper figures that commercial banks should maintain its reputation at a higher level to prevent hacker 's attack , and thus let the hacker to believe the profit will less than the average direct cost while making an attack .

    认为商业银行欲避免骇客进攻,需通过媒体将声誉维持在较高水平,使骇客相信对此银行进行攻击,所获得收益低于投入进攻的平均直接成本;