spoofing

英 [ˈspuːfɪŋ] 美 [ˈspuːfɪŋ]

网络  欺骗; 假冒; ARP欺骗; 伪装; 网络欺骗

计算机



双语例句

  1. This process is sometimes referred to as spoofing.
    这种过程有时也称为欺骗。
  2. Through the addition of out-of-band spoofing from some other source.
    通过添加一些其他来源的带外(out-of-band)欺骗。
  3. Managing access includes risk mitigation of identity theft or spoofing.
    管理访问可以降低身份盗窃或假冒所带来的风险。
  4. How to use Ganglia host spoofing to monitor IPMI.
    如何使用Ganglia主机欺骗来监视IPMI。
  5. Host spoofing is just the tool we need.
    主机欺骗刚好是我们需要的工具。
  6. For instance, pseudo-random numbers are used for process IDs and packet IDs, which makes spoofing significantly more difficult for a would-be attacker.
    例如,伪随机数可用于进程ID和包ID,这使得那些想要进行攻击的人很难进行欺骗。
  7. The following attacks should be considered into account: man-in-middle, spoofing, sniffing and Denial of services.
    以下袭击,应考虑到:人在中间,欺骗,嗅探和拒绝服务。
  8. LAN ARP Spoofing Attack Strategy Analysis and Safety Precautions
    局域网中ARP欺骗攻击分析及安全防范策略
  9. IP access controller is configured among the local area network, satellite channel and satellite network management device and converts TCP data into request signaling by IP filtering and IP Spoofing.
    IP接入控制器配置在IP网络、卫星信道及网络管理设备之间,通过IP过滤、IP欺骗等方法将TCP数据转化为申请信令。
  10. This prohibition reduces the risk of security attacks such as name spoofing.
    此禁止减少了安全攻击风险,例如名称欺骗。
  11. Prevention and Detection of ARP Spoofing in Campus Network Analysis
    校园网ARP欺骗分析与防范检测技术
  12. New Method of ARP Spoofing Detection in Switched Environment
    交换机环境下ARP欺骗检测的新方法
  13. This was demonstrated recently at the Chaos Conference in Berlin by spoofing a real certificate.
    近日在柏林举办的Chaos会议上,演讲者通过仿冒一份真实的证书演示了这一漏洞。
  14. As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.
    攻击者使用IP欺骗来隐藏自己的真实地址,因此人们开始研究IP源回溯技术。
  15. The logging framework does not attempt to prevent spoofing.
    日志框架本身无法避免日志输出的欺骗行为。
  16. Research of ARP Spoofing Attack Protocol Based on Cache Overtime
    基于缓存超时的ARP欺骗攻击协议的研究
  17. It also ensures that public keys cannot be tampered with, thereby preventing phishing, spoofing, and code-tampering attacks.
    它还保护了公共密钥不能被篡改,从而防止网络欺诈,欺骗,和篡改代码的攻击。
  18. A system architecture against ARP spoofing based on packet filtering
    一种基于报文过滤防御ARP欺骗的系统架构
  19. In general, you can help prevent spoofing by using stringent authentication.
    一般来说,您可以通过使用严格的身份验证防止电子欺骗。
  20. ARP Spoofing Attack Analysis and Defense Measure
    ARP欺骗攻击原理分析与防范措施
  21. Research on ARP Spoofing and Implementation of Security Solution for ARP
    ARP欺骗攻击研究及ARP安全防护的实现
  22. Automatically Detect, Locate and Isolate ARP Spoofing
    ARP欺骗的自动探测、定位和隔离
  23. Research on ARP Spoofing monitoring based on SNMP
    基于SNMP的ARP欺骗监控研究
  24. Solutions of the ARP Spoofing Auto-detection Based on Windows System
    基于Windows系统ARP欺骗的自动检测方案
  25. Spoofing doesn't mean someone fooling you, it means you fooling palladium.
    欺骗不是意味着某人愚弄你,它的意思是你在愚弄钯。
  26. ARP Attacks and Prevention based on the Redirection Route Spoofing
    ARP攻击与基于重定向路由欺骗技术的分析与防范
  27. IP spoofing is one of the commonest attacking means to break through firework.
    IP电子欺骗是网络中突破防火墙系统的一种常见的网络攻击方式。
  28. Analysis and Solutions of ARP Spoofing Attacks in Library LAN
    图书馆局域网ARP欺骗攻击分析与解决方案研究
  29. Analysis shows that this protocol resists spoofing, tracking, eavesdropping impersonation and replay attack and it is low-cost, high-efficiency and good-security.
    分析表明,该协议可以有效抵御非法读取、位置跟踪、窃听、伪装哄骗和重放等不安全问题,具有成本低、效率高、安全性高等特点。
  30. Solution for Problem of A ARP Spoofing Attacks by Using Ruijie Layer 3 Switch
    锐捷三层交换机上防范ARP欺骗攻击的解决方案