EN The following protocols are used in these attacks: Constrained Application Protocol (CoAP), Web Services Dynamic Discovery (WS-DD), Apple Remote Management Service (ARMS) and Jenkins web-based automation software
EN The following protocols are used in these attacks: Constrained Application Protocol (CoAP), Web Services Dynamic Discovery (WS-DD), Apple Remote Management Service (ARMS) and Jenkins web-based automation software
SV Följande protokoll används i dessa attacker: CoAP (Constrained Application Protocol), WS-DD (Web Services Dynamic Discovery), Apple Remote Management Service (ARMS) och Jenkins webbaserade automatiseringsprogram
inglês | sueco |
---|---|
used | används |
attacks | attacker |
web | web |
remote | remote |
management | management |
jenkins | jenkins |
application | application |
discovery | discovery |
apple | apple |
in | i |
following | följande |
service | service |
and | och |
these | dessa |
protocols | protokoll |
Mostrando 1 de 1 traduções