| 1. | Research and design of honeywall in honeynet 改善跨导放大器线性化方法的研究 |
| 2. | Its simplicity allowed us to learn how to run our honeynet 它的简单性让我们学习到怎样运行蜜网。 |
| 3. | Third , there is the risk of disabling honeynet functionality 第三,你还要冒着蜜网某些功能失效的危险。 |
| 4. | This is the technology we choose to initially deploy when we first set up our honeynet 这是我们在初次建立蜜网时所选用的技术。 |
| 5. | Harm is when a honeynet is used to attack or harm other , non - honeynet systems 危害是指当一个蜜网被用来攻击或伤害其他的非蜜网系统是的危害。 |
| 6. | Although this is a simpler version of the honeynet , it still offers the opportunity to learn a lot about the basics concerning honeynets 尽管这是一个简单的版本,但仍然给我们提供了学习蜜网技术基础的机会。 |
| 7. | For example , an attacker may gain access to a honeypot within the honeynet , then disable data capture functionality on the honeypot 举例来说,一个攻击者可能获得蜜网内部一个蜜罐的访问权,然后使其数据捕获能力失效。 |
| 8. | In the end , this article presents a honeynet model - xidiantech honeynet , introduces the structure , implementation and several key technologies of the honeynet 最后给出了一个易于实现的蜜罐系统的解决方案? xidiantechhoneynet ,它的设计、实现和关键技术 |
| 9. | For example , an attacker may break into a honeynet , then launch an outbound attack never seen before , successfully harming or compromising its intended victim 比如说,一个攻击者可能侵入蜜网,然后发起一次对外的以前从来没见过的攻击,成功的损害或攻陷了它的目标主机。 |
| 10. | This paper discusses the components of honeynet technique . a secure and reliable city management and control system based on honeynet technique is put forward according to security conditions 摘要本文简要介绍了蜜网技术的相关内容,在分析城市监控体系存在的安全问题的基础上,提出了一种安全可靠的基于蜜网技术的城市监控体系模型。 |