释义 |
WEPCOCA⁹³⁸⁴⁰BNC²³⁶²¹³⁺¹ 基本例句 n.有线等效私密性¹⁰⁰ The paper deal with model checking of WEP protocol via SPIN, not only searching the problem from states, but also analyzing WEP protocol logic from every point. 用 SPIN工具对 WEP认证协议进行模型检测,不仅可以从状态空间上搜索出协议的漏洞,还可以各个角度分析 WEP协议的运行逻辑。 dictall The flaws in WEP as the encrypting algorithm of IEEE802.11 standard are analyzed mainly. 重点分析了802.11标准中的 WEP加密技术所存在的各种缺陷。 cnki “I’ve yet to find a WEP- protected network not susceptible to this kind of attack,” Mr. Kitchen said. “我还没有找到一个不容易受到这类攻击的 WEP保护的网络,”柯奇先生补充道。 yeeyan Apple recommends splitting the bands into two separate networks, naming them differently and making sure that both networks use the same type of security WEP, WPA, or WPA2. 苹果公司建议将两种频段信号分开成为两个命名不同的网络,并且确保使用相同的安全设置 WEP、 WPA或 WPA2。 yeeyan But experts said they were not as fast or effective as the latest free cracking programs, because the devices worked only on WEP- protected networks. 但是,专家说这些设备不如最新的免费破解程序那样神速有效,因为它们只能破解 WEP保护网络。 yeeyan Easy WiFi Radar will only try to connect to secured access points if you provided a WEP- key in the Options Menu. 简易无线雷达只会尝试连接到安全的接入点,如果你的 WEP提供了一个在选项菜单的关键。 xzd.2000y.net Easy WiFi Radar will only try to connect to those if you provided a WEP-key in the Options Menu. 简易无线雷达将只尝试连接到这些,如果你提供一个 WEP,在选项菜单键。 xzd.2000y.net If you provide an incorrect WEP- key, it will not be able to connect. 如果您提供了不正确的 WEP密钥,将无法连接。 xzd.2000y.net If your wireless network is protected by WEP encryption, ensure that you specify your network password when configuring your connection. 如果你的无线网络受 WEP加密保护,那么在设置连接的时候,请确保你的网络密码明确无误。 launchpad In addition, WEP contains numerous bug fixes, leading to a smoother experience using WEP. 此外, WEP包含许多错误修复程序,使得使用 WEP的体验更加顺利。 ibm In this paper, the security problem of WLAN is de-scribed. A measure using LEAP authentication protocol is pro-posed by analyzing the leaks of WEP and802.1X. It makes the WLAN safer. 本文详细阐述了无线局域网存在的安全问题,通过分析 WEP协议存在的安全漏洞,以及802.1 X实现中可能的隐患,提出用 LEAP认证协议解决 WLAN中安全问题的措施与方案,极大地提高了网络的安全性。 cnki In this three part series, we will give you a step by step approach to breaking a WEP key. 在本书三章内容将一步步介绍如何破译 WEP密钥。 yeeyan It is intended to configure WEP keys according to the networks found. 它的用途是根据所找到的网络去配置 WEP键。 ibm Of course, there's a glaring flaw here: We're not using a WEP Wired Equivalent Privacy key. 当然,这里有一个明显的缺陷:我们没有使用 WEP有线对等保密, Wired Equivalent Privacy密钥。 ibm Please refer to the instructions on the next screen carefully on how to enter your WEP key correctly, and try again. 请仔细参考下一个画面里的说明来了解如何正确得输入 WEP密钥,然后再试一次。 launchpad Red squares represent a closed access point, encrypted with a WEP- key. 红色方块代表一个封闭的接入点,以 WEP加密密钥。 xzd.2000y.net Some much older devices may support only the original WEP security scheme, but that has been shown to be relatively insecure. 仍然后很多设备仅支持原始的 WEP加密制式,这样的设备相对来说也比较容易暴露。 user.ccw.com.cn The approach taken will be to standardize as many variables as possible so that you can concentrate on the mechanics of WEP cracking without being hindered by hardware and software bugs. 本次介绍尽可能标准化可变因素,力求读者不被软硬件错误困恼,把精力集中学习在 WEP破译的机制原理上。 yeeyan The analysis and experiment show that this improvement can correct the design flaw of WEP algorithm and significantly improve the security of wireless LAN. 经过分析和实验结果表明,该方法能够排除 WEP算法的安全隐患,提高了无线局域网的数据安全性能。 cnki The dualistic evolutionary model of water resources is established by coupling a distributed hydrological model for large basins WEP- L and a water allocation and regulation model WARM. 首先,将分布式流域水文模型 WEP- L和集总式水资源调配模型 WARM相耦合,建立了流域水资源二元演化模型。 cnki The rapid development of WLAN urges the exposure of the security flaws, resulting in WEP cannot meet the security requirement in WLAN. 随着无线局域网的迅速发展,这些问题逐渐暴露出来,导致 WEP已经无法满足无线局域网中的安全需求。 fabiao The script uses WLAN tools and utilities to configure device driver parameters like WEP keys and SSIDs. 这个脚本使用 WLAN工具和实用程序来配置设备驱动程序参数,例如 WEP关键字和 SSID。 ibm This paper first analyses vulnerabilities of wireless networks and introduces WEP protocol. 分析了无线网络的脆弱性,介绍了 WEP存在的严重缺陷。 cnki Though the early measures as SSID, ACL and WEP have guaranteed the wireless network security in the certain degree. However, these measures are still many leaks. 虽然早期的措施 SSID和 ACL以及 WEP在一定程度上保证了无线网络的安全,但这些安全措施仍然存在许多漏洞。 cnki To help with this, set up the Wired Equivalent Privacy WEP key to detect an access point that you can connect to. 为了帮助实现这一目的,要设置有线等效加密 Wired Equivalent Privacy, WEP键,以检测您可以连接到的接入点。 ibm What WEP key? 什么是 WEP密钥? ibm You will need the WEP key found on the label on the underside of the hub when prompted. 枢纽底部发现标签上出现提示时,您将需要 WEP密钥。 www.right.com.cn WEP uses CRC32 checking code inside the RC4 encipher system to provide message integrity check. WEP通过在 RC4密码系统内部设置 CRC32循环冗余校验的方式来实现报文完整性验证。 cnki |