×

伪装攻击 meaning in Chinese

impersonation attack

Examples

  1. In order to avoid impersonation attacks , you should ban duplicate names and secure computer names by creator
    为了避免伪装攻击,应禁止重复的名称,创建者应保护计算机名称的安全。
  2. Kerberos is essentially a secure network authentication protocol that employs a system of shared secret keys and is able to provide robust security against impersonation and reply attacks
    Kerberos实际上是一种安全网络认证协议,采用共享密钥的系统,并且能提供健壮的安全性,以防止伪装攻击和恢复攻击。

Related Words

  1. 伪装镜头
  2. 伪装信号
  3. 伪装婚姻
  4. 无线电台伪装
  5. 伪装纪律
  6. 伪装兄弟
  7. 伪装篷布
  8. 伪装自己
  9. 伪装者
  10. 伪装中立
  11. 伪装干扰机
  12. 伪装工事
  13. 伪装功夫
  14. 伪装化品
PC Version

Copyright © 2018 WordTech Co.