双语例句
1.
Youmighthaveaddedtheiraddresstoyourwhitelist,butwhatifthespamsenderhasspoofed(faked)e-mailaddressofyourfriend?
您可能已经将他们的地址添加到了您的白名单中,但是如果垃圾邮件发送者盗用(伪造)了您朋友的电子邮件地址,那么情况又会如何呢?
www.ibm.com
2.
MarlinspikesaidthatanhttpspadlocklogocanbespoofedintheURLbar,tofurther lull the userintoa false sense ofsecurity.
Marlinspike称,它还可以在浏览器地址栏中显示https的安全锁logo,使得用户更加相信自己访问的安全性。
www.cnbeta.com
3.
Thismeans that the linkyouseedoesnottakeyoutothataddress but somewhere different,usuallyaspoofedWeb site.
这意味着,您看到的链接不会带您进入实际的地址而是其他地址(通常是一个欺骗网站)。
office.microsoft.com
4.
Anattackconductedthroughaspoofedsessionstateisknownassessionhijacking.
通过冒充的会话状态发起的攻击称为会话劫持。
msdn2.microsoft.com
5.
Surelyfivebillioneurowill not go missing through the useofafewspoofedemails.
当然500亿欧元不会由于几封小小的伪造邮件就不知所终。
www.infoq.com
6.
Strong-namesigning,orstrong-naming,givesasoftwarecomponentagloballyunique identity that cannotbespoofed by someone else.
强名称签名或强命名为软件组件提供他人无法伪造的全局唯一标识。
msdn2.microsoft.com
7.
Despoofisanothersecuritytoolyoucan use in detectingspoofedpackets used to carryyourAjaxapplicationsacrossnetworks.
Despoof是另一种检测欺骗数据包的安全工具,这些欺骗数据包能够跨网络传送Ajax应用程序。
www.ibm.com
8.
The Going Google campaign,firstlaunchedinAugust(andspoofed within a day) with billboardsthatchangedmessagesdaily,isexpanding.
“打开Google”战役,在8月份首次发起,广告牌的信息每天变化,正在演变。
www.elanso.com
9.
Recipients are not abletodifferentiatebetweenauthenticmailandspoofedmail.
收件人无法区别可信邮件和欺骗邮件。
technet.microsoft.com
10.
SpoofedmailstypicallycontainaFrom:addressthatpurports to be from acertainorganization.
欺骗邮件通常包含一个“发件人:”地址,声称来自某个组织。
www.ecd123.com
权威例句
Detecting Spoofed PacketsDETECTING AND BLOCKING SPOOFED WEB LOGIN PAGESDefense Against Spoofed IP Traffic Using Hop-Count FilteringDetection of spoofed GPS signals at code and carrier tracking levelDefending against spoofed DDoS attacks with path fingerprint ☆Hop-count filtering: an effective defense against spoofed DDoS trafficRelative phase information for detecting human speech and spoofed speechEnhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP AddressesFighting Phishing Attacks: A Lightweight Trust Architecture for Detecting Spoofed EmailsA packet filter placement problem with application to defense against spoofed denial of service attacks