400-688-6148

spoofing

spoofing如何读

英[ˈspuːfɪŋ]美[ˈspuːfɪŋ]

spoofing是什么意思

  • n. 电子欺骗
  • v. (对电影、节目等的)幽默夸张模仿;哄骗,戏弄;电邮欺骗;干扰(无线电或雷达信号)(spoof 的现在分词)

spoofing英英释义

  • n.a composition that imitates somebody's style in a humorous way

spoofing同义词

  • n. 电子欺骗;哄骗
  • bamboozlement, cozenage

  • v. 哄骗;戏弄;嘲讽(spoof的ing形式)
  • coaxing

spoofing 例句

1.So why even worry about IP spoofing?

因此为什么还要担心IP欺骗呢?

2.Out-of-band plug-ins (host spoofing).

带外插件(主机欺骗)。

3.Host spoofing is just the tool we need.

主机欺骗刚好是我们需要的工具。

4.One of the great feature I found was spoofing .

的一大特点,我发现被欺骗。

5.Third, spoofing attacks are difficult to execute.

第三,欺骗攻击难以执行。

6.This process is sometimes referred to as spoofing.

这种过程有时也称为欺骗。

7.IP spoofing is a common but complex attacking method.

IP欺骗是常用的一种攻击手段。

8.The logging framework does not attempt to prevent spoofing.

日志框架本身无法避免日志输出的欺骗行为。

9.This is called email spoofing and is relatively easy to do.

这叫做电子邮件和欺骗是比较容易的事。

10.Through the addition of out-of-band spoofing from some other source.

通过添加一些其他来源的带外(out - of -band)欺骗。

11.These kinds of attacks require the same level of skill as IP spoofing.

这些类型的攻击需要与IP欺骗同等级别的技巧。

12.But, this program can keep spoofing continuously with a periodic time.

但是,这一计划可以继续欺骗不断与定期的时间。

13.Plus, this attack is far easier to launch than the more sophisticated spoofing attacks.

另外,启动这一攻击比启动更复杂的欺骗攻击容易得多。

14.This is not to track everyone's mail, but to prevent bad guys from spoofing good guys.

这个不需要追踪每一封信,但是能够阻止恶意入侵者的欺骗。

15.Only legitimate users can access the services (including the denial of spoofing schemes).

只有合法用户能访问服务(包括拒绝欺诈阴谋)。

16.Web site developers should be wary of anyone spoofing the GET and POST requests sent to them.

网站开发人员应该小心发送给他们的GET和POST请求受到欺骗。

17.This was demonstrated recently at the Chaos Conference in Berlin by spoofing a real certificate.

近日在柏林举办的Chaos会议上,演讲者通过仿冒一份真实的证书演示了这一漏洞。

18.Form spoofing is when someone makes a post to one of your forms from somewhere you didn't expect.

表单欺骗是指有人把post从某个不恰当的位置发到您的表单中。

19.This helps to protect the corporate domain (and the company's reputation) from spoofing and identity forging.

这有助于保护公司域(及声望)不受盗用和身份伪造的侵害。

20.As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.

攻击者使用IP欺骗来隐藏自己的真实地址,因此人们开始研究IP源回溯技术。

21.Finally, you saw how to extend Ganglia using an in-band script and how to use out-of-band scripts with host spoofing.

最后,您看到了如何使用带内脚本扩展Ganglia以及如何使用带有主机欺骗的带外脚本。

22.The Prevention of ARP spoofing which has widely spread in campus network is highly paid attention to by network administrators and users.

如何防范校园网络流行的ARP欺骗攻击,已成为网络管理员与用户高度关注的问题。

23.First discovered in the ‘90s, caller ID spoofing allows an unscrupulous sort to choose whatever number he or she would like for their caller ID.

在九十年代时,人们首次发现,来电身份伪装可以让用户肆无忌惮的选择任意号码作为他们的来电身份。

24.For instance, pseudo-random Numbers are used for process IDs and packet IDs, which makes spoofing significantly more difficult for a would-be attacker.

例如,伪随机数可用于进程ID和包id,这使得那些想要进行攻击的人很难进行欺骗。

25.The DAGR includes a Graphical User Interface (GUI) and incorporates a next-generation security device called the Selective Availability Anti-Spoofing Module.

该DAGR包括一个图形用户界面(GUI),并采用了新一代安全装置称为可选择有效反干扰模块。

26.Because the reverse domain lookup can be anything the owner of the address block wants, the second lookup is necessary to ensure that no spoofing is taking place.

因为反向域名搜索可以由地址块所有者确定,所以要防止ip欺骗的发生,必须进行第二次查找。

2024雅思口语题库
雅思机构

定制机构选择

  • 美国留学
  • 韩国留学
  • 加拿大留学
  • 澳大利亚留学
  • 英国留学
  • 德国留学
  • 其它国家留学
  • 雅思语培机构
  • 托福语培机构

提交需求后,专业顾问会与您详细沟通, 提供多家适合的机构信息,定制化推荐