| 1. | Gen i honeynets - a simpler methodology to employ Gen i蜜网?一个比较简单的方法。 |
| 2. | Research on dct transformation coding technology based on mpeg 蜜网系统中蜜墙的研究与设计 |
| 3. | Its simplicity allowed us to learn how to run our honeynet 它的简单性让我们学习到怎样运行蜜网。 |
| 4. | Third , there is the risk of disabling honeynet functionality 第三,你还要冒着蜜网某些功能失效的危险。 |
| 5. | This is the technology we choose to initially deploy when we first set up our honeynet 这是我们在初次建立蜜网时所选用的技术。 |
| 6. | Initial configuration of the honeywall can be done entirely through the ui 蜜网网关的初始化配置工作完全可以通过用户界面来完成。 |
| 7. | Harm is when a honeynet is used to attack or harm other , non - honeynet systems 危害是指当一个蜜网被用来攻击或伤害其他的非蜜网系统是的危害。 |
| 8. | Once the configuration has been completed the system is rebooted and the honeywall is now active 一旦配置完成,系统将会重启,之后蜜网网关就开始工作了。 |
| 9. | Multiple layers of data control are put in place to make it more difficult for the attacker to cause damage 但是,没有方法可以确保一个蜜网不会被用来攻击或损害其他人。 |
| 10. | Although this is a simpler version of the honeynet , it still offers the opportunity to learn a lot about the basics concerning honeynets 尽管这是一个简单的版本,但仍然给我们提供了学习蜜网技术基础的机会。 |