攻击境外网站_境外 *** 攻击愈发频繁翻译

hacker|
198

“ *** 攻击”用英语怎么说

attack

英[əˈtæk]

美[əˈtæk]

vt.

攻击,进攻,抨击;

n.

攻击;

抨击;

(队员等的)

进攻;

(疾病)

侵袭;

vt.

抨击;

非难;

侵袭;

损害;

[例句]he

publicly

attacked

the

people

who've

been

calling

for

secret

ballot

nominations

他公开抨击了那些主张用不记名投票方式确定任命人选的人。

[其他]

第三人称单数:attacks

复数:attacks

现在分词:attacking过去式:attacked

过去分词:attacked

请英语高手帮我翻译一段有关 *** 攻击的摘要~感激不尽!

(Network attack means that the network aggressor acquires illegal legal power through an illegal means(if break to translate password, electronics beguilement...etc.), and pass usage's these illegal legal powers to make network aggressor can be to the host which is attackstone carry on doing not authorize of operate.Its characteristics mainly includes huge loss;Threaten society and national security;The means is diverse and the skill is concealment;Regard software attack as principle.The familiar attack means have:Make use of network system loophole to carry on an attack;Carry on an attack through an E-mail;Decrypt an attack;The back door software attackstone;Refuse a service attack.Guard against the measure have:The close unnecessary service;The gearing repairs D procedure;The close is useless of even harmful port;Delete Guest numbered account;The restriction unnecessary customer's amount;In time the backup important data;The usage encrypts a mechani *** to deliver a data.)

寻求准确翻译

In the Internet vigorous development today, the network security question more and more is valued people's, but the hacker attack is creates the network security problem the primary cause, along with hacker technology development, network attack method diversification, virtually impossible to guard against, the information and the network security question more and more many receives the various countries' government, the scientific research institution widespread attention.The *** ysis studies the method which the hacker moves and uses the technology, to sharpens the active defense ability, the enhancement network security construction, prevented the network crime has the very good model function, and also has the vital significance in the network security event emergency response research. The network information security is facing the enormous threat and the challenge.The military commander has the word, knows oneself and the other side, is undefeated in many battles, carries on the reasonable appraisal to the network security condition, carries on the full understanding and the perspective research to the network attack behavior is maintains the initiative key in the network attack and defense resistance. The traditional safe protection method firewall, the invasion examination, the security loophole scanned, the hypothesized private network and so on wage the struggle in the same network hacker in the process to play the huge role, but in the network attack which emerged one after another incessantly (unknown attack front these traditional safe defensive measure appears in particular) somewhat lacks the ability to do what one would like, was in the passive region gradually. The present paper from the *** ysis network origin and the development, to the common operating system loophole and the method of attack, as well as Windows aspects and so on Internet server safe disposition practice, narrated the network attack common way as well as the basic guard measure.

0条大神的评论

发表评论