繁體版 English
登录 注册

恶意使用

"恶意使用"的翻译和解释

例句与用法

  • Because the mail merge function in word can allow an access database to run macro code automatically - with no macro protection warnings turned on - malicious users could entice you to open a specially constructed mail merge word document from an e - mail attachment or a link on a hostile web site that might cause arbitrary code to run on your machine
    因为word的合并列印功能会允许access在没有开启巨集保护警告的情况下,自动执行巨集程式码。恶意使用者可以藉此安全性漏洞引导您从电子邮件附件或网站连结开启特定架构的word合并列印文件,因而导致某种巨集程式码在您的机器上不受控制地执行。
  • Intrusion detection system collects the information from the main part of computer network system , then monitors and controls the computer and network traffic for intrusive and suspicious activities . they detect the intrusion not only from the extranet hacker , but also from the intranet users
    入侵检测( intrusiondetection )就是对计算机网络和计算机系统的关键结点的信息进行收集分析,然后对计算机和网络资源上的恶意使用行为进行识别和响应,检测其中是否有违反安全策略的事件发生或攻击迹象,并通知系统安全管理员。
  • Ids ( intrusion detection system ) is a new type of safety protection technology after traditional security protection method such as firewall , data crypt and so on . it not only detects the intrusion from the extranet hacker but also monitors intranet users . intrusion detection is an active network safety protection technology
    它对计算机和网络资源上的恶意使用行为进行识别和响应,它不仅检测来自外部的入侵行为,同时也监督内部用户的未授权活动,入侵检测技术是一种主动的网络安全防护技术。
  • In order to rule the users ' behaviors in an intranet and prevent them from using the intranet resources maliciously to destroy the order of the communication or steal the sensitive information , deregulation operation of the subject in an intranet was analyzed , and an intranet monitor system was designed and implemented by real time monitoring usage resources of terminal in an intranet
    摘要为了规范内部网络用户的操作行为,防止恶意使用内部网络资源破坏内部网络通信秩序、窃取内部网络敏感信息,分析了内部网络信息系统中主体的违规操作,以内部网络中终端资源为监控对象,设计并实现了内部网络监控系统。
  • 更多例句:  1  2  3
用"恶意使用"造句  
英语→汉语 汉语→英语