spoofed 基本解释
v.欺骗;戏弄;开;【计】冒名顶替n.戏弄;幽默的讽刺诗[文章]adj.假的网络欺骗的
变形
复数:spoofs
过去分词:spoofed
现在分词:spoofing
英英释义
spoof[ spu:f ]
n.a composition that imitates somebody's style in a humorous way同义词:parodylampoonsendupmockerytakeoffburlesquetravestycharadepasquinadeput-on
v.make a parody of"The students spoofed the teachers"
同义词:burlesqueparody
spoofed 相关例句
双语例句
1.You
might
haveadded
their
address
to
your
whitelist,
but
what
if
thespam
sender
has
spoofed
(faked)
e-mail
address
of
yourfriend?您可能已经将他们的地址添加到了您的白名单中,但是如果垃圾邮件发送者盗用(伪造)了您朋友的电子邮件地址,那么情况又会如何呢?www.ibm.com2.
Marlinspikesaid
that
anhttps
padlock
logo
can
bespoofedin
theURL
bar,
tofurther
lull the user
intoa
false sense of
security.Marlinspike称,它还可以在浏览器地址栏中显示https的安全锁logo,使得用户更加相信自己访问的安全性。www.cnbeta.com3.This
means
that the link
you
see
doesnot
take
you
to
thataddress
but somewhere different,
usually
a
spoofed
Web site.这意味着,您看到的链接不会带您进入实际的地址而是其他地址(通常是一个欺骗网站)。office.microsoft.com4.
Anattack
conductedthrough
aspoofedsession
state
isknown
as
session
hijacking.通过冒充的会话状态发起的攻击称为会话劫持。msdn2.microsoft.com5.Surely
five
billion
euro
will
not go missing
through the use
ofa
few
spoofed
emails
.当然500亿欧元不会由于几封小小的伪造邮件就不知所终。www.infoq.com6.Strong
-name
signing
,or
strong
-naming
,gives
asoftware
component
aglobally
unique
identity that cannot
bespoofed
by someone else.强名称签名或强命名为软件组件提供他人无法伪造的全局唯一标识。msdn2.microsoft.com7.
Despoofis
another
security
tool
youcan
use in detecting
spoofed
packets
used to carry
yourAjax
applications
across
networks.Despoof是另一种检测欺骗数据包的安全工具,这些欺骗数据包能够跨网络传送Ajax应用程序。www.ibm.com8.
The Going Google campaign,
first
launched
in
August
(andspoofed within a day
) with billboards
thatchanged
messages
daily,
is
expanding.“打开Google”战役,在8月份首次发起,广告牌的信息每天变化,正在演变。www.elanso.com9.Recipients
are not able
todifferentiate
betweenauthentic
mail
and
spoofed
mail.收件人无法区别可信邮件和欺骗邮件。technet.microsoft.com10.Spoofed
mails
typically
contain
a
From
:
address
thatpurports
to be from a
certain
organization
.欺骗邮件通常包含一个“发件人:”地址,声称来自某个组织。www.ecd123.com
权威例句
Detecting Spoofed PacketsDETECTING AND BLOCKING SPOOFED WEB LOGIN PAGESDefense Against Spoofed IP Traffic Using Hop-Count FilteringDetection of spoofed GPS signals at code and carrier tracking levelDefending against spoofed DDoS attacks with path fingerprint ☆Hop-count filtering: an effective defense against spoofed DDoS trafficRelative phase information for detecting human speech and spoofed speechEnhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP AddressesFighting Phishing Attacks: A Lightweight Trust Architecture for Detecting Spoofed EmailsA packet filter placement problem with application to defense against spoofed denial of service attacks