Traduzir "attacks will often" para chinês

Mostrando 50 de 50 traduções da frase "attacks will often" de inglês para chinês

Traduções de attacks will often

"attacks will often" em inglês pode ser traduzido nas seguintes palavras/frases chinês:

attacks 攻击

Tradução de inglês para chinês de attacks will often

inglês
chinês

EN Email phishing attacks are among the most common and versatile phishing attacks, and often among the most effective. Email phishing attacks often depend on social engineering to manipulate users into clicking malicious links or downloading malware.

ZH 电子邮件网络钓鱼攻击是最常见、最多样的网络钓鱼攻击之一,而且往往也是最有效的方法之一。电子邮件网络钓鱼攻击通常依赖于社会工程来诱导用户点击恶意链接或下载恶意软件。

Transliteração diàn zi yóu jiàn wǎng luò diào yú gōng jī shì zuì cháng jiàn、 zuì duō yàng de wǎng luò diào yú gōng jī zhī yī, ér qiě wǎng wǎng yě shì zuì yǒu xiào de fāng fǎ zhī yī。diàn zi yóu jiàn wǎng luò diào yú gōng jī tōng cháng yī lài yú shè huì gōng chéng lái yòu dǎo yòng hù diǎn jī è yì liàn jiē huò xià zài è yì ruǎn jiàn。

EN Email phishing attacks are among the most common and versatile phishing attacks, and often among the most effective. Email phishing attacks often depend on social engineering to manipulate users into clicking malicious links or downloading malware.

ZH 电子邮件网络钓鱼攻击是最常见、最多样的网络钓鱼攻击之一,而且往往也是最有效的方法之一。电子邮件网络钓鱼攻击通常依赖于社会工程来诱导用户点击恶意链接或下载恶意软件。

Transliteração diàn zi yóu jiàn wǎng luò diào yú gōng jī shì zuì cháng jiàn、 zuì duō yàng de wǎng luò diào yú gōng jī zhī yī, ér qiě wǎng wǎng yě shì zuì yǒu xiào de fāng fǎ zhī yī。diàn zi yóu jiàn wǎng luò diào yú gōng jī tōng cháng yī lài yú shè huì gōng chéng lái yòu dǎo yòng hù diǎn jī è yì liàn jiē huò xià zài è yì ruǎn jiàn。

EN Brute force attacks don’t just attack passwords, however. In this guide, we’ll cover the fundamentals of brute force attacks, including how to prevent them, the different attacks and password security tips for users of all experience levels.

ZH 然而,暴力攻击不只是攻击密码。在本指南中,我们将介绍暴力攻击的基础知识,包括如何进行防范、不同类型的攻击以及针对各个经验层次用户的密码安全小贴士。

Transliteração rán ér, bào lì gōng jī bù zhǐ shì gōng jī mì mǎ。zài běn zhǐ nán zhōng, wǒ men jiāng jiè shào bào lì gōng jī de jī chǔ zhī shì, bāo kuò rú hé jìn xíng fáng fàn、 bù tóng lèi xíng de gōng jī yǐ jí zhēn duì gè gè jīng yàn céng cì yòng hù de mì mǎ ān quán xiǎo tiē shì。

EN Brute force attacks don’t just attack passwords, however. In this guide, we’ll cover the fundamentals of brute force attacks, including how to prevent them, the different attacks and password security tips for users of all experience levels.

ZH 然而,暴力攻击不只是攻击密码。在本指南中,我们将介绍暴力攻击的基础知识,包括如何进行防范、不同类型的攻击以及针对各个经验层次用户的密码安全小贴士。

Transliteração rán ér, bào lì gōng jī bù zhǐ shì gōng jī mì mǎ。zài běn zhǐ nán zhōng, wǒ men jiāng jiè shào bào lì gōng jī de jī chǔ zhī shì, bāo kuò rú hé jìn xíng fáng fàn、 bù tóng lèi xíng de gōng jī yǐ jí zhēn duì gè gè jīng yàn céng cì yòng hù de mì mǎ ān quán xiǎo tiē shì。

EN Gaming companies are often vulnerable to DDoS attacks. Game platforms that rely on custom TCP and UDP communication protocols require even more resources to secure against DDoS attacks.

ZH 遊戲公司經常容易遭受 DDoS 攻擊。依賴於自訂 TCP 和 UDP 通訊協定的遊戲平台需要更多資源來抵禦 DDoS 攻擊。

Transliteração yóu xì gōng sī jīng cháng róng yì zāo shòu DDoS gōng jī。yī lài yú zì dìng TCP hé UDP tōng xùn xié dìng de yóu xì píng tái xū yào gèng duō zī yuán lái dǐ yù DDoS gōng jī。

inglês chinês
ddos ddos
tcp tcp
udp udp

EN Cybercriminals often target software or application updates as entry points. Software supply chain attacks are incredibly difficult to trace, with cybercriminals often using stolen certificates to “sign” the code to make it look legitimate.

ZH 网络犯罪分子通常会将软件或应用更新作为切入点。软件供应链攻击很难追踪,网络犯罪分子经常用被盗的证书对代码进行“签名”,使其看起来合法。

Transliteração wǎng luò fàn zuì fēn zi tōng cháng huì jiāng ruǎn jiàn huò yīng yòng gèng xīn zuò wèi qiè rù diǎn。ruǎn jiàn gōng yīng liàn gōng jī hěn nán zhuī zōng, wǎng luò fàn zuì fēn zi jīng cháng yòng bèi dào de zhèng shū duì dài mǎ jìn xíng “qiān míng”, shǐ qí kàn qǐ lái hé fǎ。

EN "Cloudflare has an incredibly large network and infrastructure to stop really large attacks on the DNS system. We just get clean requests and never have to deal with malicious traffic or attacks on the DNS infrastructure."

ZH 「Cloudflare 的網路和基礎結構大到令人難以置信,能夠阻止 DNS 系統上非常大的攻擊。我們只會收到乾淨的請求,從不需要處理 DNS 基礎結構上的惡意流量或攻擊。」

Transliteração 「Cloudflare de wǎng lù hé jī chǔ jié gòu dà dào lìng rén nán yǐ zhì xìn, néng gòu zǔ zhǐ DNS xì tǒng shàng fēi cháng dà de gōng jī。wǒ men zhǐ huì shōu dào gān jìng de qǐng qiú, cóng bù xū yào chù lǐ DNS jī chǔ jié gòu shàng de è yì liú liàng huò gōng jī。」

inglês chinês
dns dns

EN Our always-on protection identifies and mitigates most attacks in under three seconds. Blocking attacks from the network edge reduces latency, keeping traffic blazing fast.

ZH 我們的全時保護可在三秒內識別並緩解大多數攻擊。從網路邊緣阻止攻擊可減少延遲,使流量保持高速增長。

Transliteração wǒ men de quán shí bǎo hù kě zài sān miǎo nèi shí bié bìng huǎn jiě dà duō shù gōng jī。cóng wǎng lù biān yuán zǔ zhǐ gōng jī kě jiǎn shǎo yán chí, shǐ liú liàng bǎo chí gāo sù zēng zhǎng。

EN AED offers best in class DDoS protection. AED can stop DDoS attacks as large as 40 Gbps and due to its stateless packet processing technology, AED can stop TCP-state exhaustion attacks that target and impact stateful devices such as NGFWs.

ZH AED 提供一流的 DDoS 防护。AED 可拦截高达 40Gbps 的 DDoS 攻击,并且由于其采用无状态数据包处理技术,可阻止针对和影响 NGFW 等有状态设备的 TCP 状态耗尽攻击

Transliteração AED tí gōng yī liú de DDoS fáng hù。AED kě lán jié gāo dá 40Gbps de DDoS gōng jī, bìng qiě yóu yú qí cǎi yòng wú zhuàng tài shù jù bāo chù lǐ jì shù, kě zǔ zhǐ zhēn duì hé yǐng xiǎng NGFW děng yǒu zhuàng tài shè bèi de TCP zhuàng tài hào jǐn gōng jī。

inglês chinês
ddos ddos

EN Because AED can stop all types of DDoS attacks, it should be deployed in front of your firewalls to protect them and the services behind them from DDoS attacks.

ZH AED 可阻止所有类型的 DDoS 攻击,应当部署在防火墙之前,以保护防火墙及后端服务免受 DDoS 攻击

Transliteração AED kě zǔ zhǐ suǒ yǒu lèi xíng de DDoS gōng jī, yīng dāng bù shǔ zài fáng huǒ qiáng zhī qián, yǐ bǎo hù fáng huǒ qiáng jí hòu duān fú wù miǎn shòu DDoS gōng jī。

inglês chinês
ddos ddos

EN Citrix ADC CPX has proven algorithms to manage attacks that exploit weaknesses in TCP, HTTP, and DNS. By using CPX for all app-to-app traffic, you can protect apps from DDoS attacks from the outside and inside.

ZH Citrix ADC CPX 具有经过验证的算法,可应对利用 TCP、HTTP 和 DNS 中的漏洞实施的攻击。通过对所有应用到应用的流量使用 CPX,您可以保护应用免受来自内外的 DDoS 攻击

Transliteração Citrix ADC CPX jù yǒu jīng guò yàn zhèng de suàn fǎ, kě yīng duì lì yòng TCP、HTTP hé DNS zhōng de lòu dòng shí shī de gōng jī。tōng guò duì suǒ yǒu yīng yòng dào yīng yòng de liú liàng shǐ yòng CPX, nín kě yǐ bǎo hù yīng yòng miǎn shòu lái zì nèi wài de DDoS gōng jī。

inglês chinês
citrix citrix
cpx cpx
tcp tcp
http http
dns dns
ddos ddos

EN Supply chain attacks come in many forms, including software, hardware and firmware attacks.

ZH 供应链攻击有多种形式,包括软件、硬件和固件攻击

Transliteração gōng yīng liàn gōng jī yǒu duō zhǒng xíng shì, bāo kuò ruǎn jiàn、 yìng jiàn hé gù jiàn gōng jī。

EN Preventing man in the middle attacks can save businesses thousands in damages and keep their web and public identities intact. Here are some essential tools to help prevent MITM attacks:

ZH 防范中间人攻击可以为企业节省成千上万的损失,并保持其网络和公众身份完好无损。以下是有助于防范 MITM 攻击的一些重要工具:

Transliteração fáng fàn zhōng jiān rén gōng jī kě yǐ wèi qǐ yè jié shěng chéng qiān shàng wàn de sǔn shī, bìng bǎo chí qí wǎng luò hé gōng zhòng shēn fèn wán hǎo wú sǔn。yǐ xià shì yǒu zhù yú fáng fàn MITM gōng jī de yī xiē zhòng yào gōng jù:

EN Protecting yourself and your business against phishing attacks can mean the difference between financial ruin and better cybersecurity overall. Here are some helpful tips for protecting against these common and effective cyber attacks.

ZH 保护您自己和您的企业免受网络钓鱼攻击可能意味着是财务破产还是整体网络安全改善的区别。以下是一些有用的小贴士,可用于防范这些常见而有效的网络攻击

Transliteração bǎo hù nín zì jǐ hé nín de qǐ yè miǎn shòu wǎng luò diào yú gōng jī kě néng yì wèi zhe shì cái wù pò chǎn hái shì zhěng tǐ wǎng luò ān quán gǎi shàn de qū bié。yǐ xià shì yī xiē yǒu yòng de xiǎo tiē shì, kě yòng yú fáng fàn zhè xiē cháng jiàn ér yǒu xiào de wǎng luò gōng jī。

EN A PUF-based authentication utilizes AES, a key protection for shared secrets and high-quality nonce to achieve a robust authentication. It can protect against the prediction attacks for the nonce and physical attacks for the shared secret.

ZH 利用AES的PUF身份验证,透过对共享机密的密钥保护和高质量的随机数来实现可靠的身份验证。它可以防止针对随机数的预测攻击和针对共享机密的物理攻击

Transliteração lì yòngAES dePUF shēn fèn yàn zhèng, tòu guò duì gòng xiǎng jī mì de mì yào bǎo hù hé gāo zhì liàng de suí jī shù lái shí xiàn kě kào de shēn fèn yàn zhèng。tā kě yǐ fáng zhǐ zhēn duì suí jī shù de yù cè gōng jī hé zhēn duì gòng xiǎng jī mì de wù lǐ gōng jī。

inglês chinês
aes aes

EN Whirlwind deals 25% more damage and now affects your next 4 single-target melee attacks, instead of the next 2 attacks.

ZH 旋風斬造成的傷害提高25%,且現在會影響你下4次的單一目標近戰攻擊,而非下2次的攻擊。

Transliteração xuán fēng zhǎn zào chéng de shāng hài tí gāo25%, qiě xiàn zài huì yǐng xiǎng nǐ xià4cì de dān yī mù biāo jìn zhàn gōng jī, ér fēi xià2cì de gōng jī。

EN DMARC, SPF and DKIM can help you defend your domain against phishing and spoofing attacks, and other forms of online threats. We help you onboard the protocols with ease to bypass these attacks without compromising on deliverability.

ZH DMARC、SPF和DKIM可以帮助你保护你的域名免受网络钓鱼和欺骗性攻击,以及其他形式的在线威胁。我们帮助你轻松地加入这些协议,在不影响交付能力的情况下绕过这些攻击

Transliteração DMARC、SPF héDKIM kě yǐ bāng zhù nǐ bǎo hù nǐ de yù míng miǎn shòu wǎng luò diào yú hé qī piàn xìng gōng jī, yǐ jí qí tā xíng shì de zài xiàn wēi xié。wǒ men bāng zhù nǐ qīng sōng de jiā rù zhè xiē xié yì, zài bù yǐng xiǎng jiāo fù néng lì de qíng kuàng xià rào guò zhè xiē gōng jī。

inglês chinês
dmarc dmarc
dkim dkim
and

EN DMARC at the correct policy can protect against domain spoofing attacks, email phishing attacks, and BEC.

ZH 在正确的政策下,DMARC可以防止域名欺骗攻击、电子邮件网络钓鱼攻击和BEC。

Transliteração zài zhèng què de zhèng cè xià,DMARC kě yǐ fáng zhǐ yù míng qī piàn gōng jī、 diàn zi yóu jiàn wǎng luò diào yú gōng jī héBEC。

inglês chinês
dmarc dmarc

EN In this case, while your root domain is protected against spoofing attacks, your subdomains even if you don’t use them to exchange information would still be vulnerable to impersonation attacks.

ZH 在这种情况下,虽然你的根域被保护免受欺骗攻击,但你的子域即使不使用它们来交换信息,仍会受到冒充攻击

Transliteração zài zhè zhǒng qíng kuàng xià, suī rán nǐ de gēn yù bèi bǎo hù miǎn shòu qī piàn gōng jī, dàn nǐ de zi yù jí shǐ bù shǐ yòng tā men lái jiāo huàn xìn xī, réng huì shòu dào mào chōng gōng jī。

EN On-premise protection guards against state-exhausting attacks aimed at security infrastructure. It also helps prevent stealthy attacks that bypass Firewalls and Intrusion Prevention Systems (IPS) and target business-critical applications.

ZH 本地保护可防止针对安全基础架构的状态耗尽型的攻击。它还有助于防止绕过防火墙和入侵防御系统 (IPS) 并针对业务关键型应用的隐蔽攻击

Transliteração běn de bǎo hù kě fáng zhǐ zhēn duì ān quán jī chǔ jià gòu de zhuàng tài hào jǐn xíng de gōng jī。tā hái yǒu zhù yú fáng zhǐ rào guò fáng huǒ qiáng hé rù qīn fáng yù xì tǒng (IPS) bìng zhēn duì yè wù guān jiàn xíng yīng yòng de yǐn bì gōng jī。

inglês chinês
ips ips

EN A PUF-based authentication utilizes AES, a key protection for shared secrets and high-quality nonce to achieve a robust authentication. It can protect against the prediction attacks for the nonce and physical attacks for the shared secret.

ZH 利用AES的PUF身份验证,透过对共享机密的密钥保护和高质量的随机数来实现可靠的身份验证。它可以防止针对随机数的预测攻击和针对共享机密的物理攻击

Transliteração lì yòngAES dePUF shēn fèn yàn zhèng, tòu guò duì gòng xiǎng jī mì de mì yào bǎo hù hé gāo zhì liàng de suí jī shù lái shí xiàn kě kào de shēn fèn yàn zhèng。tā kě yǐ fáng zhǐ zhēn duì suí jī shù de yù cè gōng jī hé zhēn duì gòng xiǎng jī mì de wù lǐ gōng jī。

inglês chinês
aes aes

EN Supply chain attacks come in many forms, including software, hardware and firmware attacks.

ZH 供应链攻击有多种形式,包括软件、硬件和固件攻击

Transliteração gōng yīng liàn gōng jī yǒu duō zhǒng xíng shì, bāo kuò ruǎn jiàn、 yìng jiàn hé gù jiàn gōng jī。

EN Preventing man in the middle attacks can save businesses thousands in damages and keep their web and public identities intact. Here are some essential tools to help prevent MITM attacks:

ZH 防范中间人攻击可以为企业节省成千上万的损失,并保持其网络和公众身份完好无损。以下是有助于防范 MITM 攻击的一些重要工具:

Transliteração fáng fàn zhōng jiān rén gōng jī kě yǐ wèi qǐ yè jié shěng chéng qiān shàng wàn de sǔn shī, bìng bǎo chí qí wǎng luò hé gōng zhòng shēn fèn wán hǎo wú sǔn。yǐ xià shì yǒu zhù yú fáng fàn MITM gōng jī de yī xiē zhòng yào gōng jù:

EN Protecting yourself and your business against phishing attacks can mean the difference between financial ruin and better cybersecurity overall. Here are some helpful tips for protecting against these common and effective cyber attacks.

ZH 保护您自己和您的企业免受网络钓鱼攻击可能意味着是财务破产还是整体网络安全改善的区别。以下是一些有用的小贴士,可用于防范这些常见而有效的网络攻击

Transliteração bǎo hù nín zì jǐ hé nín de qǐ yè miǎn shòu wǎng luò diào yú gōng jī kě néng yì wèi zhe shì cái wù pò chǎn hái shì zhěng tǐ wǎng luò ān quán gǎi shàn de qū bié。yǐ xià shì yī xiē yǒu yòng de xiǎo tiē shì, kě yòng yú fáng fàn zhè xiē cháng jiàn ér yǒu xiào de wǎng luò gōng jī。

EN On-premise protection guards against state-exhausting attacks aimed at security infrastructure. It also helps prevent stealthy attacks that bypass Firewalls and Intrusion Prevention Systems (IPS) and target business-critical applications.

ZH 本地保护可防止针对安全基础架构的状态耗尽型的攻击。它还有助于防止绕过防火墙和入侵防御系统 (IPS) 并针对业务关键型应用的隐蔽攻击

Transliteração běn de bǎo hù kě fáng zhǐ zhēn duì ān quán jī chǔ jià gòu de zhuàng tài hào jǐn xíng de gōng jī。tā hái yǒu zhù yú fáng zhǐ rào guò fáng huǒ qiáng hé rù qīn fáng yù xì tǒng (IPS) bìng zhēn duì yè wù guān jiàn xíng yīng yòng de yǐn bì gōng jī。

inglês chinês
ips ips

EN AED offers best in class DDoS protection. AED can stop DDoS attacks as large as 40 Gbps and due to its stateless packet processing technology, AED can stop TCP-state exhaustion attacks that target and impact stateful devices such as NGFWs.

ZH AED 提供一流的 DDoS 防护。AED 可拦截高达 40Gbps 的 DDoS 攻击,并且由于其采用无状态数据包处理技术,可阻止针对和影响 NGFW 等有状态设备的 TCP 状态耗尽攻击

Transliteração AED tí gōng yī liú de DDoS fáng hù。AED kě lán jié gāo dá 40Gbps de DDoS gōng jī, bìng qiě yóu yú qí cǎi yòng wú zhuàng tài shù jù bāo chù lǐ jì shù, kě zǔ zhǐ zhēn duì hé yǐng xiǎng NGFW děng yǒu zhuàng tài shè bèi de TCP zhuàng tài hào jǐn gōng jī。

inglês chinês
ddos ddos

EN Because AED can stop all types of DDoS attacks, it should be deployed in front of your firewalls to protect them and the services behind them from DDoS attacks.

ZH AED 可阻止所有类型的 DDoS 攻击,应当部署在防火墙之前,以保护防火墙及后端服务免受 DDoS 攻击

Transliteração AED kě zǔ zhǐ suǒ yǒu lèi xíng de DDoS gōng jī, yīng dāng bù shǔ zài fáng huǒ qiáng zhī qián, yǐ bǎo hù fáng huǒ qiáng jí hòu duān fú wù miǎn shòu DDoS gōng jī。

inglês chinês
ddos ddos

EN “Some DDoS attacks were slowing the portal,” Hersh adds. “Putting Access in front of it helped prevent DDoS attacks and potential downtime, and it also made merchant logins more secure.”

ZH Hersh 补充道,“一些 DDoS 攻击减慢了门户的速度。将 Access 置于其前方,不仅有助于防止 DDoS 攻击和潜在停机时间,还能使商家登录更加安全。”

Transliteração Hersh bǔ chōng dào,“yī xiē DDoS gōng jī jiǎn màn le mén hù de sù dù。jiāng Access zhì yú qí qián fāng, bù jǐn yǒu zhù yú fáng zhǐ DDoS gōng jī hé qián zài tíng jī shí jiān, hái néng shǐ shāng jiā dēng lù gèng jiā ān quán。”

EN • lastminute.com was being overwhelmed by bot attacks. By moving to Cloudflare, it was able to mitigate these attacks in one fell swoop.

ZH • lastminute.com 曾经遭遇过大量的机器人攻击。借助 Cloudflare,我们得以一次性防护这些攻击

Transliteração • lastminute.com céng jīng zāo yù guò dà liàng de jī qì rén gōng jī。jiè zhù Cloudflare, wǒ men dé yǐ yī cì xìng fáng hù zhè xiē gōng jī。

EN The Cloudflare WAF was able to block over 400 attacks to one particular site over the course of a single day, while also improving that site's performance, which led to a more stable user experience and less time wasted dealing with these attacks.

ZH Cloudflare WAF 能够在一天的时间内阻止对一个特定站点的 400 多次攻击,同时还能提高该站点的性能,进而带来了更加稳定的用户体验,并减少了处理这些攻击的时间。

Transliteração Cloudflare WAF néng gòu zài yī tiān de shí jiān nèi zǔ zhǐ duì yī gè tè dìng zhàn diǎn de 400 duō cì gōng jī, tóng shí hái néng tí gāo gāi zhàn diǎn de xìng néng, jìn ér dài lái le gèng jiā wěn dìng de yòng hù tǐ yàn, bìng jiǎn shǎo le chù lǐ zhè xiē gōng jī de shí jiān。

EN FortiDDoS defends enterprise data centers against DDoS attacks by leveraging an extensive collection of known DDoS methodologies, creating a multi-layered approach to mitigate attacks.

ZH FortiDDoS 利用一系列已知的 DDoS 方法、建立多層方法來排解攻擊, 從而保護企業資料中心免受 DDoS 攻擊。

Transliteração FortiDDoS lì yòng yī xì liè yǐ zhī de DDoS fāng fǎ、 jiàn lì duō céng fāng fǎ lái pái jiě gōng jī, cóng ér bǎo hù qǐ yè zī liào zhōng xīn miǎn shòu DDoS gōng jī。

inglês chinês
ddos ddos

EN Protects against application layer attacks. Limited protection against volumetric attacks.

ZH 可防止应用层攻击,对容量耗尽攻击防护有限。

Transliteração kě fáng zhǐ yīng yòng céng gōng jī, duì róng liàng hào jǐn gōng jī fáng hù yǒu xiàn。

EN Tags:best ddos tools, ddos attacks tools, DDOS Detection Tools, DDOS Mitigation Tools, DDOS Prevention Tools, ddos tools, tools for ddos attacks

ZH 标签:最佳ddos工具,ddos攻击工具,DDOS检测工具,DDOS缓解工具,DDOS预防工具,ddos工具, ddos攻击工具

Transliteração biāo qiān: zuì jiāddos gōng jù,ddos gōng jī gōng jù,DDOS jiǎn cè gōng jù,DDOS huǎn jiě gōng jù,DDOS yù fáng gōng jù,ddos gōng jù, ddos gōng jī gōng jù

inglês chinês
ddos ddos

EN Because Omnis AED can stop all types of DDoS attacks, it should be deployed in front of your firewalls to protect them and the services behind them from DDoS attacks.

ZH AED 可阻止所有类型的 DDoS 攻击,应当部署在防火墙之前,以保护防火墙及后端服务免受 DDoS 攻击

Transliteração AED kě zǔ zhǐ suǒ yǒu lèi xíng de DDoS gōng jī, yīng dāng bù shǔ zài fáng huǒ qiáng zhī qián, yǐ bǎo hù fáng huǒ qiáng jí hòu duān fú wù miǎn shòu DDoS gōng jī。

inglês chinês
ddos ddos

EN Supply chain attacks target vendors and suppliers instead of directly targeting a specific business. Protect your organization against these attacks with privileged access management.

ZH 供应链攻击针对的是供应商,而不是直接针对特定企业。通过特权访问管理保护您的组织免受这些攻击

Transliteração gōng yīng liàn gōng jī zhēn duì de shì gōng yīng shāng, ér bù shì zhí jiē zhēn duì tè dìng qǐ yè。tōng guò tè quán fǎng wèn guǎn lǐ bǎo hù nín de zǔ zhī miǎn shòu zhè xiē gōng jī。

EN SMS phishing attacks or “smishing” are becoming more and more common. The more you understand about smishing attacks, what they’re capable of and what the potential risks are, the easier it will be to identify and prevent damage from one.

ZH 短信网络钓鱼攻击或“短信钓鱼”变得越来越普遍。您对短信钓鱼攻击了解得越多,明白它们的能力和潜在的风险是什么,就越容易识别并防范攻击造成的损失。

Transliteração duǎn xìn wǎng luò diào yú gōng jī huò “duǎn xìn diào yú” biàn dé yuè lái yuè pǔ biàn。nín duì duǎn xìn diào yú gōng jī le jiě dé yuè duō, míng bái tā men de néng lì hé qián zài de fēng xiǎn shì shén me, jiù yuè róng yì shì bié bìng fáng fàn gōng jī zào chéng de sǔn shī。

EN Brute force password attacks work by using software to “guess” credentials. Through trial and error, brute force attacks will input common dictionary phrases, commonly used passwords or specific letter and number combinations until they get a match.

ZH 暴力密码攻击的原理是通过使用软件“猜测”帐密。通过反复试验,暴力攻击可尝试常见的字典短语、常用的密码或特定的字母和数字组合,直到找到匹配项。

Transliteração bào lì mì mǎ gōng jī de yuán lǐ shì tōng guò shǐ yòng ruǎn jiàn “cāi cè” zhàng mì。tōng guò fǎn fù shì yàn, bào lì gōng jī kě cháng shì cháng jiàn de zì diǎn duǎn yǔ、 cháng yòng de mì mǎ huò tè dìng de zì mǔ hé shù zì zǔ hé, zhí dào zhǎo dào pǐ pèi xiàng。

EN Preventing man-in-the-middle attacks can save individuals and businesses thousands in damages and keep their web and public identities intact. Here are some essential tools to help prevent MITM attacks:

ZH 防范中间人攻击可以为个人和企业节省成千上万美元的损失,并保持其网络和公众身份完好无损。以下是有助于防范 MITM 攻击的一些重要工具:

Transliteração fáng fàn zhōng jiān rén gōng jī kě yǐ wèi gè rén hé qǐ yè jié shěng chéng qiān shàng wàn měi yuán de sǔn shī, bìng bǎo chí qí wǎng luò hé gōng zhòng shēn fèn wán hǎo wú sǔn。yǐ xià shì yǒu zhù yú fáng fàn MITM gōng jī de yī xiē zhòng yào gōng jù:

EN Brute force attacks are simple but often effective, especially if the individual or business doesn't have the right protections in place.

ZH 暴力攻击很简单,但往往很有效,尤其是当个人或企业没有适当的保护措施时。

Transliteração bào lì gōng jī hěn jiǎn dān, dàn wǎng wǎng hěn yǒu xiào, yóu qí shì dāng gè rén huò qǐ yè méi yǒu shì dāng de bǎo hù cuò shī shí。

EN Fatal attacks instead reduce you to 7% of your maximum health. For 3 sec afterward, you take 85% reduced damage. Cannot trigger more often than once per 6 min.

ZH 當你受到足以致命的攻擊時,使你的生命力最多降低至生命力上限的7%,並且在後續3秒內受到的傷害降低85%。此效果每6分鐘只能觸發一次。

Transliteração dāng nǐ shòu dào zú yǐ zhì mìng de gōng jī shí, shǐ nǐ de shēng mìng lì zuì duō jiàng dī zhì shēng mìng lì shàng xiàn de7%, bìng qiě zài hòu xù3miǎo nèi shòu dào de shāng hài jiàng dī85%。cǐ xiào guǒ měi6fēn zhōng zhǐ néng chù fā yī cì。

EN Brute force attacks are simple but often effective, especially if the individual or business doesn't have the right protections in place.

ZH 暴力攻击很简单,但往往很有效,尤其是当个人或企业没有适当的保护措施时。

Transliteração bào lì gōng jī hěn jiǎn dān, dàn wǎng wǎng hěn yǒu xiào, yóu qí shì dāng gè rén huò qǐ yè méi yǒu shì dāng de bǎo hù cuò shī shí。

EN Outside of China, we often look at sites like Quora, Twitter, Reddit, Facebook etc. However, most of these sites are either blocked in China or not relevant. Here are a few platforms we often look at when conducting content research in China.

ZH 在中国之外,我们会看 Quora,Twitter,Reddit,Facebook 等网站,但是大部分都被中国封锁了,或者他们的内容并不相关。以下的平台是我们在中国进行内容调研时常常都会参考的:

Transliteração zài zhōng guó zhī wài, wǒ men huì kàn Quora,Twitter,Reddit,Facebook děng wǎng zhàn, dàn shì dà bù fēn dōu bèi zhōng guó fēng suǒ le, huò zhě tā men de nèi róng bìng bù xiāng guān。yǐ xià de píng tái shì wǒ men zài zhōng guó jìn xíng nèi róng diào yán shí cháng cháng dōu huì cān kǎo de:

inglês chinês
twitter twitter
facebook facebook

EN Without it, we often see customers with existing sites facing painful roadblocks to optimization, sometimes requiring expensive remediation work. Unfortunately, this often means optimization is put in the ?too hard? basket.

ZH 如果不做好准备工作,我们经常会看到现有网站的客户在优化方面遇到痛苦的障碍,有时需要进行昂贵的补救工作。 遗憾的是,这通常意味着把优化工作束之高阁。

Transliteração rú guǒ bù zuò hǎo zhǔn bèi gōng zuò, wǒ men jīng cháng huì kàn dào xiàn yǒu wǎng zhàn de kè hù zài yōu huà fāng miàn yù dào tòng kǔ de zhàng ài, yǒu shí xū yào jìn xíng áng guì de bǔ jiù gōng zuò。 yí hàn de shì, zhè tōng cháng yì wèi zhe bǎ yōu huà gōng zuò shù zhī gāo gé。

EN Device usage ? how often is the AV or VTC system used? Which sources are used? How often is the display used (if there?s more than one, are both used)?

ZH 设备使用情况 - 音视频或 VTC 系统的使用频率如何?使用哪些来源?显示器的使用频率如何(如果不止一台显示器,则是否均使用)?

Transliteração shè bèi shǐ yòng qíng kuàng - yīn shì pín huò VTC xì tǒng de shǐ yòng pín lǜ rú hé? shǐ yòng nǎ xiē lái yuán? xiǎn shì qì de shǐ yòng pín lǜ rú hé (rú guǒ bù zhǐ yī tái xiǎn shì qì, zé shì fǒu jūn shǐ yòng)?

EN In the end, individual end-users often get the software at zero cost, while corporate customers are often happy to pay for more support.

ZH 最後,個人終端使用者通常無償取得這些軟體,而企業客戶也樂於為取得更多支援而掏腰包。

Transliteração zuì hòu, gè rén zhōng duān shǐ yòng zhě tōng cháng wú cháng qǔ dé zhè xiē ruǎn tǐ, ér qǐ yè kè hù yě lè yú wèi qǔ dé gèng duō zhī yuán ér tāo yāo bāo。

EN Bulk pharmaceuticals and intermediates are often made by fine chemical companies, which often use Nash liquid ring vacuum pumps and compressors.

ZH 原料药和中间体通常由精细化工公司生产,而这些公司往往会使用 NASH 液环真空泵和压缩机。

Transliteração yuán liào yào hé zhōng jiān tǐ tōng cháng yóu jīng xì huà gōng gōng sī shēng chǎn, ér zhè xiē gōng sī wǎng wǎng huì shǐ yòng NASH yè huán zhēn kōng bèng hé yā suō jī。

EN Outside of China, we often look at sites like Quora, Twitter, Reddit, Facebook etc. However, most of these sites are either blocked in China or not relevant. Here are a few platforms we often look at when conducting content research in China.

ZH 在中国之外,我们会看 Quora,Twitter,Reddit,Facebook 等网站,但是大部分都被中国封锁了,或者他们的内容并不相关。以下的平台是我们在中国进行内容调研时常常都会参考的:

Transliteração zài zhōng guó zhī wài, wǒ men huì kàn Quora,Twitter,Reddit,Facebook děng wǎng zhàn, dàn shì dà bù fēn dōu bèi zhōng guó fēng suǒ le, huò zhě tā men de nèi róng bìng bù xiāng guān。yǐ xià de píng tái shì wǒ men zài zhōng guó jìn xíng nèi róng diào yán shí cháng cháng dōu huì cān kǎo de:

inglês chinês
twitter twitter
facebook facebook

EN HR departments often receive hundreds of applications for a single position. The time it often takes to screen and cull a potential list to interview can be significantly consuming.

ZH 针对同一职位,人力资源部门常常会收到数百份求职申请。他们可能需要耗费大量时间才能筛选出一份候选人面试名单。

Transliteração zhēn duì tóng yī zhí wèi, rén lì zī yuán bù mén cháng cháng huì shōu dào shù bǎi fèn qiú zhí shēn qǐng。tā men kě néng xū yào hào fèi dà liàng shí jiān cái néng shāi xuǎn chū yī fèn hòu xuǎn rén miàn shì míng dān。

EN Device usage ? how often is the AV or VTC system used? Which sources are used? How often is the display used (if there?s more than one, are both used)?

ZH 设备使用情况 - 音视频或 VTC 系统的使用频率如何?使用哪些来源?显示器的使用频率如何(如果不止一台显示器,则是否均使用)?

Transliteração shè bèi shǐ yòng qíng kuàng - yīn shì pín huò VTC xì tǒng de shǐ yòng pín lǜ rú hé? shǐ yòng nǎ xiē lái yuán? xiǎn shì qì de shǐ yòng pín lǜ rú hé (rú guǒ bù zhǐ yī tái xiǎn shì qì, zé shì fǒu jūn shǐ yòng)?

EN Unmetered mitigation of DDoS attacks with up to 100 Tbps capacity

ZH DDoS 攻擊的非計量緩解,高達 100 Tbps 處理能力

Transliteração DDoS gōng jī de fēi jì liàng huǎn jiě, gāo dá 100 Tbps chù lǐ néng lì

inglês chinês
ddos ddos

Mostrando 50 de 50 traduções