botnets
美
英 
- 網(wǎng)絡(luò)僵尸網(wǎng)絡(luò);僵尸網(wǎng)絡(luò)攻擊;自動程序網(wǎng)絡(luò)
例句
Botnets can also be used in identity theft, the FBI warned, urging Internet users not to open Valentine's greetings from unknown genders.
FBI警告:”僵尸網(wǎng)“同樣能被用于身份盜竊,并呼吁用戶不要打開陌生人發(fā)來的電子情人節(jié)卡片。
Initially the FBI said it wanted to track down infected computers in the botnets it had identified and warn their owners.
最初,FBI表示,它希望在僵尸網(wǎng)絡(luò)中追捕到它已確定并警告過其擁有人的那些受感染電腦。
And, he says, the Zeus botnets are not easy to identify.
他還表示,宙斯僵尸網(wǎng)絡(luò)不易識別。
Zeus botnets are positioned all over the world. Mr. Boscovich says they act as command and control centers for the infected computers.
宙斯僵尸網(wǎng)絡(luò)被放置到世界各地。博斯科維克先生說,它們作為受感染計算機(jī)的指揮控制中心。
This list demonstrates that attackers can cause a great deal of harm or criminal activity with the help of botnets.
上面的列表說明了攻擊者在僵尸網(wǎng)絡(luò)的幫助下可以造成巨大的危害或者犯罪活動。
So far I tried to point out that botnets are smaller, more sophisticated, and single-purposed.
我試圖指出僵尸網(wǎng)絡(luò)更小,更老練,且用途單一。
As you can see, Europe, especially Eastern Europe, has become a major hotbed for botnets.
正如你所見,歐洲尤其是東歐,已經(jīng)逐步成為僵尸網(wǎng)絡(luò)的聚合之地。
For a primer on botnets, take a look at this short video from Symantec.
關(guān)于僵尸網(wǎng)絡(luò)的入門介紹,可以看看來自賽門鐵克(Symantec)的一個視頻短片。
DDoS attacks usually rely on botnets, or networks of computers that run malicious software that fire off requests to a web site.
DDoS攻擊通常依靠僵尸網(wǎng)絡(luò),也就是由眾多計算機(jī)組成的網(wǎng)絡(luò),來運(yùn)行惡意軟件進(jìn)而對某個網(wǎng)站發(fā)送大量請求。
it provide a clear example for how smartphones are prime targets to become botnets once connected to a user's personal computer.
這說明一旦智能手機(jī)連到用戶的個人電腦上之后,很容易成為僵尸網(wǎng)絡(luò)的主要攻擊對象。
When filters blocked mail from suspect network addresses, the spammers used botnets (networks of hijacked computers) instead.
而當(dāng)過濾器從可以網(wǎng)絡(luò)地址攔截郵件時,垃圾郵件發(fā)送者們又轉(zhuǎn)向僵尸網(wǎng)絡(luò)(一個被劫持的電腦)。
As botnets evolve from simple vandalism to sophisticated criminality, people take them more seriously.
由于“僵尸網(wǎng)絡(luò)”從簡單的破壞行為演變成成熟的犯罪行為,人們更加認(rèn)真地予以對待。
In response, senders started using botnets (networks of otherwise innocent computers).
作為對策,垃圾郵件發(fā)送者們開始使用僵尸網(wǎng)絡(luò)(由另外一些“無辜”的計算機(jī)構(gòu)成的網(wǎng)絡(luò))。
Botnets continue to proliferate, despite recent botnet takedowns.
雖然近期在拆卸僵尸網(wǎng)絡(luò),但它仍舊繼續(xù)激增。
Such botnets can be created, or simply rented from cyber-criminals.
“僵尸網(wǎng)絡(luò)”可以被創(chuàng)建出來,或者可以直接從網(wǎng)絡(luò)罪犯那里租借過來使用。
Another interesting application was created to identify botnets for email spam.
另外一個有趣的應(yīng)用程序被創(chuàng)建用于識別僵尸網(wǎng)絡(luò)的垃圾郵件。
RICHARD BOSCOVICH: "It's not just one botnet but probably hundreds of different botnets that come from this particular code base. "
這不只是一個僵尸網(wǎng)絡(luò),可能有來自這個特定代碼基地的各種僵尸網(wǎng)絡(luò)。
The main reason for this phenomenon is the emergence of botnets.
引發(fā)這一現(xiàn)象的主要理由是僵尸網(wǎng)絡(luò)的出現(xiàn)。
The honeypot technology has played the very major role in analysising Phishing attacks and tracking BotNets.
蜜罐技術(shù)在追蹤釣魚網(wǎng)絡(luò)、僵尸網(wǎng)絡(luò)等方面發(fā)揮了很大的作用。
They send the spam from "botnets" , networks of hacked personal computers.
他們利用僵尸網(wǎng)絡(luò)(就是被挾持的個人電腦組成的網(wǎng)絡(luò))發(fā)送垃圾郵件。
Symantec estimates that there are approximately 5 million spam-sending botnets worldwide.
美國Symantec公司預(yù)計在世界范圍內(nèi)共有500萬個僵尸網(wǎng)絡(luò)執(zhí)行著投遞垃圾郵件的業(yè)務(wù)。
Old botnets are being brought back online, and new botnets are being created.
老的僵尸網(wǎng)絡(luò)又在網(wǎng)上再現(xiàn),新的僵尸網(wǎng)絡(luò)正在形成。
Akamai also looked at where most of the traffic from botnets and other attack traffic originated from.
Akamai還研究了僵尸網(wǎng)絡(luò)和網(wǎng)絡(luò)攻擊的主要流量來源地。
Of course, once that becomes common, the botnets will follow.
當(dāng)然,當(dāng)它普及了,僵尸網(wǎng)絡(luò)也跟來了。
A partial answer to botnets lies in better defences and detection.
針對“僵尸網(wǎng)絡(luò)”的部分應(yīng)對答案在于更好的防范和檢測。
Rather than using automated botnets, PHP scripts were utilised in crowd-sourced assaults on the government.
不再是使用自動的僵尸,這次來自民眾對政府的攻擊用到了PHP腳本。
It is becoming easier to identify botnets and to spot the clever and scary ones quickly.
識別并進(jìn)而迅速發(fā)現(xiàn)那些既狡猾又令人害怕的“僵尸網(wǎng)絡(luò)”正變得愈加容易。
Statistics show that 8 out of 10 computers connected to the Internet in China have been hacked. 70% of the world's Botnets are in China.
據(jù)統(tǒng)計,中國每10臺接入互聯(lián)網(wǎng)的電腦中有8臺曾受到“黑客”控制。全世界被控制的“僵尸”網(wǎng)絡(luò)有70%在中國。
88% of all spam is sent from botnets (networks of compromised PCs).
88%的垃圾郵件都是從僵尸網(wǎng)絡(luò)中發(fā)出的(僵尸網(wǎng)絡(luò)是未加防護(hù)的網(wǎng)絡(luò))。
Botnets using Web 2. 0 technology via social networks also are on the rise.
而使用Web2.0技術(shù)通過社會化網(wǎng)絡(luò)傳播的僵尸網(wǎng)絡(luò)數(shù)量正不斷增長。
Cybercriminals rent out use of their botnets on the black market.
網(wǎng)絡(luò)罪犯們在黑市上出租他們的僵尸網(wǎng)絡(luò)的使用權(quán)。
As we mentioned above, 88% of all spam is sent from botnets.
正如前面提到的,88%的垃圾郵件都來自于僵尸網(wǎng)絡(luò)。
But investigations traced them only to Russian "hacktivists" and criminal botnets;
但是調(diào)查僅追蹤到了俄羅斯的“黑客積極分子”和犯罪“僵尸網(wǎng)絡(luò)”;
Developing software that shuts down botnets
研發(fā)關(guān)閉僵尸網(wǎng)絡(luò)的軟件
Be aware of the growing threat of botnets
要意識到僵尸網(wǎng)絡(luò)日益增長的威脅
Here's a map of the spam-sending botnets in 2010
以下便是2010年整理的垃圾郵件制造者——僵尸網(wǎng)絡(luò)的分布地圖。