hijack attack
基本解釋
- [計(jì)算機(jī)科學(xué)技術(shù)]劫持攻擊攔截攻擊
英漢例句
- There is a kind of active attack based on TCP over the Internet, which is called IP Hijack.
儅前,網(wǎng)上出現(xiàn)了一種基於TCP的主動(dòng)攻擊,稱爲(wèi)IP劫持。 - The hijack took place hundreds of kilometers from the coast of Somalia in the middle of the Indian Ocean, an area of sea normally thought to be relatively safe from this kind of attack.
劫持事件發(fā)生在距離索馬裡海岸幾百千米的索馬裡海岸,正常來說,該地區(qū)相對(duì)來說比較安全,不會(huì)遭遇這種襲擊。 - Another kind of attack on DNS systems is a "cache poisoning" attack, where the malicious hacker relies on flaws in some implementations of DNS to "hijack" domain names.
DNS系統(tǒng)上的另一類攻擊是“高速緩存中毒”攻擊,惡意的黑客利用某些DNS實(shí)現(xiàn)中的漏洞來“劫持”域名。 - Domestic and transnational terrorism was ramping up, as illustrated by the 1993 World Trade Center bombing, the 1995 Tokyo subway Sarin attack, the 1995 Oklahoma City bombing, the 1995 "Bojinka" conspiracy to hijack airplanes and crash them into buildings, the 1996 Khobar Towers bombing, the 1996 Summer Olympics bombing, Osama bin Laden's 1996 and 1998 "Declarations of War" on America, the 1998 East African embassy bombings, the 2000 USS Sullivans bombing attempt, the 2000 USS Cole bombing, and the 2000 Millennium bombing plot.
CENTERFORSECURITYPOLICY: Holder's 'disgraceful' history
雙語例句
權(quán)威例句
專業(yè)釋義
- 劫持攻擊
- 攔截攻擊