• 软件测试技术
  • 软件测试博客
  • 软件测试视频
  • 开源软件测试技术
  • 软件测试论坛
  • 软件测试沙龙
  • 软件测试资料下载
  • 软件测试杂志
  • 软件测试人才招聘
    暂时没有公告

字号: | 推荐给好友 上一篇 | 下一篇

热区和窃用

发布: 2008-2-17 14:25 | 作者: 希赛 | 来源: 希赛网 | 查看: 23次 | 进入软件测试论坛讨论

领测软件测试网 Hot Zone

  A hot zone is a wireless access area created by multiple hot spots located in close proximity to each other. Hot zones usually combine public safety access points with public hot spots. Each hot spot typically provides.network access for distances between 100 and 300 feet; various technologies, such as mesh network topologies and fiber optic backbones, are used in conjunction with the hot spots to create areas of coverage.

  热区

  热区是由多个相互靠得很近的热点组成的无线接入区域。热区通常将公共的安全接入点与公共的热点结合起来。每个热点一般提供 100至300英尺距离的网络接入,可以用不同的技术,如网状网技术和光纤骨干网技术,将热点连接起来形成覆盖区域。

  Snarf

  Initially, in the realm of programming languages, snarf meant to grab a large document or file and use it without the author' s permission. Since the development of UNIX, the UNIX community—since there is not the same sense of proprietary ownership as there is in the commercial computer industry because it is based on an open source idea—uses the term to mean the acquisition of a file or set of files across a network. It is a command line resource grabber, transferring files through the HTTP, gopher, finger and FTP protocols without user interaction.

  窃用

  最初,在编程语言领域,窃用是指未经作者的允许获取一个大文档或文件并加以使用。自从开发 Unix以来,Unix社团就利用本术语表示从网络上获取一个或一组文件。这是由于(在Unix界)没有商业计算机行业中那种专属拥有权,因为Unix是基于开放源码的。它是一种命令行资源抓取程序,无需用户的交互就能通过HTTP、gopher、finger和FTP协议传送文件。

  Bluesnarfing

  Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information — such as the user's calendar, contact list and e-mail and text messages —without leaving any evidence of the attack. Other devices that use Bluetooth, such as laptop computers, may also be vulnerable, although to a lesser extent.

  蓝牙窃用

  蓝牙窃用是指通过蓝牙连接偷窃无线设备上的信息。攻击者利用移动电话实现蓝牙的方法中存在的弱点访问信息,如用户的日程安排、联络表、电子邮件和短信,同时不留任何攻击的痕迹。其他采
用蓝牙的设备,如便携电脑,也可能受攻击,虽然受害程度弱一些。

文章来源于领测软件测试网 https://www.ltesting.net/

TAG: 热区和窃用


关于领测软件测试网 | 领测软件测试网合作伙伴 | 广告服务 | 投稿指南 | 联系我们 | 网站地图 | 友情链接
版权所有(C) 2003-2010 TestAge(领测软件测试网)|领测国际科技(北京)有限公司|软件测试工程师培训网 All Rights Reserved
北京市海淀区中关村南大街9号北京理工科技大厦1402室 京ICP备10010545号-5
技术支持和业务联系:info@testage.com.cn 电话:010-51297073

软件测试 | 领测国际ISTQBISTQB官网TMMiTMMi认证国际软件测试工程师认证领测软件测试网