网站首页  词典首页

请输入您要查询的英文单词:

 

单词 Spoofing.
释义

Spoofing.

  • v.欺骗;哄骗;开;【计】冒名顶替
  • n.玩笑性的哄骗;幽默的讽刺诗[文章]
  • adj.假的
  • 网络数据欺骗
1.
数据欺骗
一种引起数据丢失的攻击方法是数据欺骗Spoofing.)。数字欺骗指的是有人试图证明自己在现存网络体系中的合法性。
www.eefocus.com

例句

释义:
1.
Known as " spoofing , " the end game is to persuade consumers to reveal their Social Security numbers or other sensitive information.
此诈骗手法称为「窜改来电显示」,骗局的最后一步就是劝诱消费者透露自己的社会保险号码或其他敏感资料。
dictsearch.appspot.com
2.
Spoofing can be interpreted as the network security term used for forging .
电子欺骗可以解释成用于伪造的网络安全术语。
www.bing.com
3.
Only one of the companies being impersonated noticed that spoofing was taking place and tracked down the researchers.
目前只有一家公司注意到了自己被仿冒网域的事实并追查到了仿冒者。
treasure.1x1y.com.cn
4.
It was heavily concerned with jamming, spoofing, and intercepting and analyzing the enemy's radar signals.
常用的伎俩有干扰,拐骗以及截取并分析敌方的雷达旌旗灯号。
ksgaoxin.com
5.
The following attacks should be considered into account: man-in-middle, spoofing , sniffing and Denial of services.
以下袭击,应考虑到:人在中间,欺骗,嗅探和拒绝服务。
dictsearch.appspot.com
6.
As a professional attacking method, network spoofing attack gives austere challenge to the network administrator.
网络欺骗攻击作为一种非常专业化白勺攻击手段,给网络安全管理者带来了严峻白勺考验。
www.lunwenzhiku.com
7.
Form spoofing is when someone makes a post to one of your forms from somewhere you didn't expect.
表单欺骗是指有人把post从某个不恰当的位置发到您的表单中。
www.ibm.com
8.
This process is sometimes referred to as spoofing.
这种过程有时也称为欺骗。
www.ibm.com
9.
The logging framework does not attempt to prevent spoofing.
日志框架本身无法避免日志输出的欺骗行为。
blog.sina.com.cn
10.
Through the addition of out-of-band spoofing from some other source.
通过添加一些其他来源的带外(out-of-band)欺骗。
www.ibm.com
1.
ARP spoofing attack and then analyze the entire implementation process and its principles.
然后分析ARP欺骗攻击的整个实施流程及其原理。
it.zhishi.sohu.com
2.
The paper points out that ARP spoofing prevention is now divided into tow levels.
指出了ARP欺骗防御也分成了两个级别,一个是针对主机安全的主机级防御;
www.qikan.com.cn
3.
XSLT applications that run in a mixed trust environment can result in style sheet spoofing.
运行在混合信任环境中的XSLT应用程序能够导致样式表欺骗。
msdn2.microsoft.com
4.
Spoofing isn't very expensive, and there are a number of companies that specialize in it.
窜改来电显示的费用不高,而且有一些公司专售此类服务。
dictsearch.appspot.com
5.
Spoofing involves the transmission of fake GPS signals that the receives accept as authentic ones.
欺骗手段涉及到发送会被接收装置接受为真实信号的伪造的GPS信号。
dictsearch.appspot.com
6.
It also offers a Selective Availability Anti-Spoofing Module Global Positioning System (SAASM).
它还提供了一个可选择抗欺骗模块全球定位系统(SAASM)。
www.etiri.com.cn
7.
First-time host Hugh Jackman opened the show with a song-and-dance medley spoofing the night's nominated films.
节目一开场,主持人休*杰克曼就以一段混合歌舞将提名的影片恶搞了一番。
dictsearch.appspot.com
8.
Finally, you saw how to extend Ganglia using an in-band script and how to use out-of-band scripts with host spoofing.
最后,您看到了如何使用带内脚本扩展Ganglia以及如何使用带有主机欺骗的带外脚本。
www.ibm.com
9.
At its simplest, spoofing can mean typing in a different user's credentials.
简单讲,电子欺骗可以是指键入其他用户的凭据。
msdn.microsoft.com
10.
This update resolves the "NetBIOS Name Server Protocol Spoofing" security vulnerability in some Windows-based networks.
此更新消除了某些基于Windows的网络中的“NetBIOS名称服务器协议欺骗”安全漏洞。
www.microsoft.com
1.
DNS authentication can be defeated with IP spoofing.
IP欺骗可以使DNS认证失效。
www.ibm.com
2.
One of the drawbacks to spoofing is that the category goes in the no_group metrics group.
欺骗的缺点之一是类别归入no_group度量组。
www.ibm.com
3.
Managing access includes risk mitigation of identity theft or spoofing.
管理访问可以降低身份盗窃或假冒所带来的风险。
www.ibm.com
4.
Spoofing means impersonating someone else to the computer.
欺骗意味着模拟其他用户访问计算机。
msdn2.microsoft.com
5.
Before I go into detail on this attack I should explain the term spoofing.
在深入研究这种攻击的详细信息之前,我应该解释一下术语电子欺骗(spoofing)。
www.ibm.com
6.
This permission allows the session to bypass the sender address spoofing check.
该权限允许会话绕过发件人地址欺骗检查。
technet.microsoft.com
7.
The mechanism of the electronic spoofing is clarified, and some measures to prevent such attack are simultaneously proposed.
讨论了电子欺骗攻击的分类及其攻击机制,并提出了相应的防范措施。
dictsearch.appspot.com
8.
Download now to prevent an attacker from attempting identity spoofing using certificates.
立即下载以防止攻击者试图使用证书伪造身份标识。
www.microsoft.com
9.
In general, you can help prevent spoofing by using stringent authentication.
一般来说,您可以通过使用严格的身份验证防止电子欺骗。
technet.microsoft.com
10.
The invention of caller ID more than 20 years ago also opened up another common avenue for phone hacking: caller ID spoofing.
20年前问世的来电显示也为电话窃听提供了可乘之机:来电身份伪装。
www.bing.com
1.
You can configure the Sender ID agent to take action when the agent detects evidence of domain spoofing or a transient error.
可以将发件人ID代理配置为在检测到域欺骗的现象或暂时性错误时执行操作。
technet.microsoft.com
2.
As a result, any application of IP spoofing requires a significant amount of technical depth.
因此,IP欺骗的任何应用都需要大量技术高深的知识。
www.ibm.com
3.
Web site developers should be wary of anyone spoofing the GET and POST requests sent to them.
网站开发人员应该小心发送给他们的GET和POST请求受到欺骗。
www.ibm.com
4.
Prevent IP spoofing from outside of the subnet.
阻止来自外网的IP欺骗。
aa.shangdu.com
5.
Plus, this attack is far easier to launch than the more sophisticated spoofing attacks.
另外,启动这一攻击比启动更复杂的欺骗攻击容易得多。
www-128.ibm.com
6.
The Prevention of ARP spoofing which has widely spread in campus network is highly paid attention to by network administrators and users.
如何防范校园网络流行的ARP欺骗攻击,已成为网络管理员与用户高度关注的问题。
kns50.chkd.cnki.net
7.
" Spoofing " doesn't mean someone fooling you, it means you fooling palladium.
“欺骗”不是意味着某人愚弄你,它的意思是你在愚弄钯。
dictsearch.appspot.com
8.
You can also help defend against spoofing by keeping credential information safe.
您还可以通过对凭据信息采取安全措施来防止电子欺骗。
msdn.microsoft.com
9.
Third, spoofing attacks are difficult to execute.
第三,欺骗攻击难以执行。
www-128.ibm.com
10.
Used pop-up blocker to mitigate the risk of spoofing.
使用弹出窗口阻止程序,以减轻欺骗的风险。
xjchilli.blog.163.com
1.
The whitelist score is lower, because these are often targets for spammer spoofing.
这个白名单的评分较低,它常常是垃圾邮件发送者假称的地址。
ydirone.blog.163.com
2.
This is not to track everyone's mail, but to prevent bad guys from spoofing good guys.
这个不需要追踪每一封信,但是能够阻止恶意入侵者的欺骗。
dictsearch.appspot.com
3.
Host spoofing is just the tool we need.
主机欺骗刚好是我们需要的工具。
www.ibm.com
4.
This prohibition reduces the risk of security attacks such as name spoofing.
此禁止减少了安全攻击风险,例如名称欺骗。
msdn2.microsoft.com
5.
How to use Ganglia host spoofing to monitor IPMI.
如何使用Ganglia主机欺骗来监视IPMI。
www.ibm.com
6.
These kinds of attacks require the same level of skill as IP spoofing.
这些类型的攻击需要与IP欺骗同等级别的技巧。
www-128.ibm.com
7.
As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.
攻击者使用IP欺骗来隐藏自己的真实地址,因此人们开始研究IP源回溯技术。
www.dictall.com
8.
spoofing is very common on the net, such as FURONG jiejie and XIAOPANG.
网络中恶搞很常见,比如芙蓉姐姐,小胖等。
dictsearch.appspot.com
9.
A Way of Preventing ARP Spoofing and Implementation in Local Area Networks
在局域网中防止ARP欺骗的一种方法及其实现
www.ilib.cn
10.
a cross - site scripting and spoofing vulnerability exists in sharepoint team services from microsoft
microsoft的sharepointteamservices中存在一个跨网站脚本攻击和欺骗漏洞。
www.ichacha.net
1.
Download details: Windows 2000 Security Patch: Certificate Validation Flaw Could Enable Identity Spoofing
下载详细资料:Windows2000安全性修正程式:凭证确认缺陷可能会导致识别欺骗
www.microsoft.com
2.
Certificate validation flaw could permit identity spoofing
证书验证缺陷使标识欺骗成为可能
support.microsoft.com
3.
Address Space Spoofing Using Address Resolution Protocol
利用地址解析协议的地址空间欺骗技术
service.ilib.cn
4.
Windows 2000 Security Patch: Certificate Validation Flaw Could Enable Identity Spoofing
Windows2000安全修补程序:可以利用证书验证缺陷来伪造身份标识
www.microsoft.com
5.
a cross - site scripting and spoofing vulnerability exists in frontpage 2002 server extensions
frontpage2002serverextensions中存在一个跨网站脚本攻击和欺骗漏洞。
www.ichacha.net
6.
Principle of ARP Spoofing-Based Attacks and Defense Instrument
ARP协议攻击原理及其防范措施
www.ilib.cn
7.
Detecting Wireless LAN MAC Address Spoofing Attack
无线局域网MAC地址欺骗攻击的检测
www.ilib.cn
8.
Analysis and Prevention of Attack by Gateway Spoofing
网关欺骗攻击分析及其防范
scholar.ilib.cn
9.
MS05-042: Vulnerabilities in Kerberos could allow denial of service, information disclosure, and spoofing
Kerberos中的漏洞可能允许拒绝服务、信息泄露,和欺骗的05042
support.microsoft.com
10.
An implement of switch network sniffer based ARP spoofing
基于ARP欺骗的交换式网络监听实现
www.ilib.cn
1.
Study on IDN Spoofing Behaviours and Defence Methods
IDN欺骗行为及其防御技术研究
service.ilib.cn
2.
Technical Analysis and Defence Policy of IP Spoofing
IP欺骗的技术分析及防御措施
www.ilib.cn
3.
A new method to actively detect the switch network ARP spoofing
交换网络ARP欺骗的主动检测机制
service.ilib.cn
4.
A Solution to ARP Spoofing in Switching Networks
一种交换式网络内的ARP欺骗的解决方案
www.ilib.cn
5.
Disable spoofing on all interfaces
行使所有电子欺骗界面
www.9976.org
6.
Analysis of Trojan using ARP spoofing
解析一种实施ARP欺骗的木马
www.ilib.cn
7.
Analysis of Principle of ARP Spoofing
ARP协议欺骗原理分析与抵御方法
edairy.cn
8.
A Method of Man-in-the-middle Attack Based On ARP Spoofing
一种基于ARP欺骗的中间人攻击方法及防范
service.ilib.cn
9.
Using Sender ID to Combat Spoofing
使用发件人ID防止欺骗
technet.microsoft.com
10.
MS05-032: Vulnerability in Microsoft agent could allow spoofing
Microsoft代理中漏洞可能允许欺骗05-032
support.microsoft.com
1.
Research of Defending Strategies Based on IP Spoofing
基于IP电子欺骗的防御策略研究
scholar.ilib.cn
2.
Detecting and precaution of network spoofing based on ARP
基于ARP的网络欺骗的检测与防范
ilib.cn
3.
Detect and Precaution Based on Intrusion of ARP Spoofing
ARP欺骗入侵的检测与防范策略
www.ilib.cn
4.
Solution of ARP Spoofing in LAN
一个ARP欺骗问题的分析和解决办法
www.ilib.cn
5.
An Algorithm Against Attacks Based on ARP Spoofing
ARP欺骗原理及一种防范算法
service.ilib.cn
6.
The methods of IP spoofing and it's preventing
IP地址的盗用和防范
www.ilib.cn
7.
The study on protocol spoofing in active sniffing
主动监听中协议欺骗的研究
scholar.ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/8/2 17:56:49