5. One of the great feature I found was spoofing .
的一大特点,我发现被欺骗。
youdao
6. Third, spoofing attacks are difficult to execute.
第三,欺骗攻击难以执行。
youdao
7. This process is sometimes referred to as spoofing.
这种过程有时也称为欺骗。
youdao
8. IP spoofing is a common but complex attacking method.
IP欺骗是常用的一种攻击手段。
youdao
9. The logging framework does not attempt to prevent spoofing.
日志框架本身无法避免日志输出的欺骗行为。
youdao
10. This is called email spoofing and is relatively easy to do.
这叫做电子邮件和欺骗是比较容易的事。
youdao
11. Through the addition of out-of-band spoofing from some other source.
通过添加一些其他来源的带外(out - of -band)欺骗。
youdao
12. Spoofing can be interpreted as the network security term used for forging.
电子欺骗可以解释成用于伪造的网络安全术语。
youdao
13. These kinds of attacks require the same level of skill as IP spoofing.
这些类型的攻击需要与IP欺骗同等级别的技巧。
youdao
14. But, this program can keep spoofing continuously with a periodic time.
但是,这一计划可以继续欺骗不断与定期的时间。
youdao
15. Plus, this attack is far easier to launch than the more sophisticated spoofing attacks.
另外,启动这一攻击比启动更复杂的欺骗攻击容易得多。
youdao
16. This is not to track everyone's mail, but to prevent bad guys from spoofing good guys.
这个不需要追踪每一封信,但是能够阻止恶意入侵者的欺骗。
youdao
17. Only legitimate users can access the services (including the denial of spoofing schemes).
只有合法用户能访问服务(包括拒绝欺诈阴谋)。
youdao
18. Web site developers should be wary of anyone spoofing the GET and POST requests sent to them.
网站开发人员应该小心发送给他们的GET和POST请求受到欺骗。
youdao
19. This was demonstrated recently at the Chaos Conference in Berlin by spoofing a real certificate.
近日在柏林举办的Chaos会议上,演讲者通过仿冒一份真实的证书演示了这一漏洞。
youdao
20. Form spoofing is when someone makes a post to one of your forms from somewhere you didn't expect.
表单欺骗是指有人把post从某个不恰当的位置发到您的表单中。
youdao
21. This helps to protect the corporate domain (and the company's reputation) from spoofing and identity forging.
这有助于保护公司域(及声望)不受盗用和身份伪造的侵害。
youdao
22. The large number of attacking machines and the use of source IP address spoofing make the traceback impossible.
大量的攻击机器且使用源地址欺骗使得现有的跟踪是不可能的。
youdao
23. As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.
攻击者使用IP欺骗来隐藏自己的真实地址,因此人们开始研究IP源回溯技术。
youdao
24. Finally, you saw how to extend Ganglia using an in-band script and how to use out-of-band scripts with host spoofing.
最后,您看到了如何使用带内脚本扩展Ganglia以及如何使用带有主机欺骗的带外脚本。
youdao
25. The Prevention of ARP spoofing which has widely spread in campus network is highly paid attention to by network administrators and users.
如何防范校园网络流行的ARP欺骗攻击,已成为网络管理员与用户高度关注的问题。
youdao
26. First discovered in the ‘90s, caller ID spoofing allows an unscrupulous sort to choose whatever number he or she would like for their caller ID.
在九十年代时,人们首次发现,来电身份伪装可以让用户肆无忌惮的选择任意号码作为他们的来电身份。
youdao
27. For instance, pseudo-random Numbers are used for process IDs and packet IDs, which makes spoofing significantly more difficult for a would-be attacker.
例如,伪随机数可用于进程ID和包id,这使得那些想要进行攻击的人很难进行欺骗。
youdao
28. The DAGR includes a Graphical User Interface (GUI) and incorporates a next-generation security device called the Selective Availability Anti-Spoofing Module.
该DAGR包括一个图形用户界面(GUI),并采用了新一代安全装置称为可选择有效反干扰模块。
youdao
29. Because the reverse domain lookup can be anything the owner of the address block wants, the second lookup is necessary to ensure that no spoofing is taking place.
因为反向域名搜索可以由地址块所有者确定,所以要防止ip欺骗的发生,必须进行第二次查找。
youdao
30. Because the reverse domain lookup can be anything the owner of the address block wants, the second lookup is necessary to ensure that no spoofing is taking place.
因为反向域名搜索可以由地址块所有者确定,所以要防止ip欺骗的发生,必须进行第二次查找。
youdao
用作名词 (n.)
Spoofing can be interpreted as the network security term used for forging. 电子欺骗可以解释成用于伪造的网络安全术语。