spoofing
美 [spuf]英 [spuːf]
- v.欺骗;哄骗;开;【计】冒名顶替
- n.玩笑性的哄骗;幽默的讽刺诗[文章]
- adj.假的
- 网络电子欺骗;欺骗攻击;假冒
复数:spoofs 现在分词:spoofing 过去式:spoofed
spoofing
spoofing
欺骗
所谓欺骗 (Spoofing),也就是造一个假的源IP地址的数据包,当 另外的主机接收到这个包,会以为包是来自假冒的发 送者,这 …
电子欺骗
计算机专业用语 - NULL - 博客频道 - CSDN.NET ... sniffer 嗅探器 spoofing 电子欺骗 time bomb 时间炸弹 ...
哄骗
通过使用哄骗(spoofing)技术,ISDN路由器模拟一个激活状态, 然而只有存在一个有效的通路时,IOS DDR才变成激活状态触 …
欺骗攻击
...口令猜测(Password Guess) 电子欺骗攻击(spoofing) 木马攻击(Trojan) 后门攻击(backdoor) 针对IIS服务器攻击 常见Windows …
假冒
假冒(spoofing)来电ID信息已经行之有年,假冒VoIP的来电信息又更简单,成本也更低。甚至不需要传统电话线就可以完成。
伪装
译网情深 - 打印文章 - ... spoken message 口头讯息 spoofing 伪装 spread spectrum device 频谱扩展装置 ...
或欺骗
AT&T World ... 网路钓鱼( Phishing) 或欺骗( spoofing) 间谍软体( Spyware) ...
伪装欺骗
读书笔记 : 2009-02 月份简文 - 乐多日志 ... 许可式行销 permission marketing 伪装欺骗 spoofing 动态定价 dynamic pricing ...
1
Known as " spoofing , " the end game is to persuade consumers to reveal their Social Security numbers or other sensitive information.
此诈骗手法称为「窜改来电显示」,骗局的最后一步就是劝诱消费者透露自己的社会保险号码或其他敏感资料。
2
Spoofing can be interpreted as the network security term used for forging .
电子欺骗可以解释成用于伪造的网络安全术语。
3
Only one of the companies being impersonated noticed that spoofing was taking place and tracked down the researchers.
目前只有一家公司注意到了自己被仿冒网域的事实并追查到了仿冒者。
4
It was heavily concerned with jamming, spoofing, and intercepting and analyzing the enemy's radar signals.
常用的伎俩有干扰,拐骗以及截取并分析敌方的雷达旌旗灯号。
5
The following attacks should be considered into account: man-in-middle, spoofing , sniffing and Denial of services.
以下袭击,应考虑到:人在中间,欺骗,嗅探和拒绝服务。
6
As a professional attacking method, network spoofing attack gives austere challenge to the network administrator.
网络欺骗攻击作为一种非常专业化白勺攻击手段,给网络安全管理者带来了严峻白勺考验。
7
Form spoofing is when someone makes a post to one of your forms from somewhere you didn't expect.
表单欺骗是指有人把post从某个不恰当的位置发到您的表单中。
8
This process is sometimes referred to as spoofing.
这种过程有时也称为欺骗。
9
The logging framework does not attempt to prevent spoofing.
日志框架本身无法避免日志输出的欺骗行为。
10
Through the addition of out-of-band spoofing from some other source.
通过添加一些其他来源的带外(out-of-band)欺骗。
11
ARP spoofing attack and then analyze the entire implementation process and its principles.
然后分析ARP欺骗攻击的整个实施流程及其原理。
12
The paper points out that ARP spoofing prevention is now divided into tow levels.
指出了ARP欺骗防御也分成了两个级别,一个是针对主机安全的主机级防御;
13
XSLT applications that run in a mixed trust environment can result in style sheet spoofing.
运行在混合信任环境中的XSLT应用程序能够导致样式表欺骗。
14
Spoofing isn't very expensive, and there are a number of companies that specialize in it.
窜改来电显示的费用不高,而且有一些公司专售此类服务。
15
Spoofing involves the transmission of fake GPS signals that the receives accept as authentic ones.
欺骗手段涉及到发送会被接收装置接受为真实信号的伪造的GPS信号。
16
It also offers a Selective Availability Anti-Spoofing Module Global Positioning System (SAASM).
它还提供了一个可选择抗欺骗模块全球定位系统(SAASM)。
17
First-time host Hugh Jackman opened the show with a song-and-dance medley spoofing the night's nominated films.
节目一开场,主持人休*杰克曼就以一段混合歌舞将提名的影片恶搞了一番。
18
Finally, you saw how to extend Ganglia using an in-band script and how to use out-of-band scripts with host spoofing.
最后,您看到了如何使用带内脚本扩展Ganglia以及如何使用带有主机欺骗的带外脚本。
19
At its simplest, spoofing can mean typing in a different user's credentials.
简单讲,电子欺骗可以是指键入其他用户的凭据。
20
This update resolves the "NetBIOS Name Server Protocol Spoofing" security vulnerability in some Windows-based networks.
此更新消除了某些基于Windows的网络中的“NetBIOS名称服务器协议欺骗”安全漏洞。
21
DNS authentication can be defeated with IP spoofing.
IP欺骗可以使DNS认证失效。
22
One of the drawbacks to spoofing is that the category goes in the no_group metrics group.
欺骗的缺点之一是类别归入no_group度量组。
23
Managing access includes risk mitigation of identity theft or spoofing.
管理访问可以降低身份盗窃或假冒所带来的风险。
24
Spoofing means impersonating someone else to the computer.
欺骗意味着模拟其他用户访问计算机。
25
Before I go into detail on this attack I should explain the term spoofing.
在深入研究这种攻击的详细信息之前,我应该解释一下术语电子欺骗(spoofing)。
26
This permission allows the session to bypass the sender address spoofing check.
该权限允许会话绕过发件人地址欺骗检查。
27
The mechanism of the electronic spoofing is clarified, and some measures to prevent such attack are simultaneously proposed.
讨论了电子欺骗攻击的分类及其攻击机制,并提出了相应的防范措施。
28
Download now to prevent an attacker from attempting identity spoofing using certificates.
立即下载以防止攻击者试图使用证书伪造身份标识。
29
In general, you can help prevent spoofing by using stringent authentication.
一般来说,您可以通过使用严格的身份验证防止电子欺骗。
30
The invention of caller ID more than 20 years ago also opened up another common avenue for phone hacking: caller ID spoofing.
20年前问世的来电显示也为电话窃听提供了可乘之机:来电身份伪装。