1·The first is the brute force method, which is to look at all of the requests and then filter based on different criteria.
第一个是强力的方法,就是查看所有的请求,然后根据不同的标准进行过滤。
2·These maybe totally innocent attempts at connecting from a local machine within your network or a brute force attempt from an unknown host.
这些可能是来自您的网络中本地机器的完全无恶意的连接尝试,也可能是来自未知主机的强力连接尝试。
3·These changes don't substantially add to the security of your machine, but a common script that just tries brute force attacks at the standard port 22 will fail harmlessly.
这些修改不会显著增强计算机的安全性,但是只尝试强力攻击标准端口22的一般脚本会失败,不会造成损害。
4·Was there a brute force attempt over a password of particular Kerberos principal or service?
是否有人对某个Kerberos主体或服务的密码进行强力尝试。
5·As a result, massive datasets cannot be interactively rendered by brute force methods.
因而,大规模数据集的交互渲染不能通过强力模型进行。