这会使具有恶意的组件也略过验证。
This would allow the malicious assembly to also skip verification.
此外,他们争辩说,被告注册和使用具有恶意争议域名。
Moreover, they contended that the respondent registered and used the disputed domain name in bad faith.
例如,具有这种访问权的黑客可以创建恶意的实例资源和数据请求队列,而提供商无法发现他们在做什么。
As an example, a hacker with this access can create malicious instance resources and queues of data requests without the provider noticing what the hacker is doing.
黑客可以伪装成具有管理控制权的高特权用户,控制虚拟机,然后在虚拟化系统管理程序上执行恶意程序。
A hacker can become a highly privileged user with administrative controls and get out of a virtual machine and then execute malicious programs on the hypervisor.
例如,黑客可以伪装成具有管理访问权的特权用户进入系统并执行恶意操作,而真正的系统管理员不会马上注意到。
For example, a hacker can enter in the guise of a privileged user with administrative access controls and perform malicious activities that a legitimate system administrator did not initially notice.
它也能确定采用近似方法操作的恶意软件的命令串,并产生一种树图现实看上去不同的程序如何具有相近的操作对象。
It can also define clusters of malware that operate in similar ways, and generate a kind of family tree showing how superficially different programs have similar modi operandi.
如果输入字符串具有一些恶意设计的代码,脚本也会被执行。
If the input string had some maliciously designed script, the script is executed.
虽然有迹象表明,一个人无论具有良性或恶意的嫉妒倾向,可能是意向的问题,至少一个人跑步生涯里的良性嫉妒方式是更加理性的。
While there are indications that one's tendency toward benign or malicious envy might be dispositional, at least in one's running life the benign form is the more rational.
实验分析可以看出,算法对各种常用的内容保留操作(重采样、高斯白噪声、压缩等)具有较强的鲁棒性,而对恶意篡改非常敏感。
Experiments show that the algorithm is robust against several operations, such as resampling, white noise addition, compression and so on, and is sensitive to malicious tampering.
嗅探是一种常见的网络数据采集和侦听方式,恶意嗅探对网络安全具有极大的危害。
Sniffing is a common way in gathering and intercepting network data, but malicious sniffing often does great harm to network security.
民事法律调整的社会关系最为广泛,在其范围内探讨恶意软件问题贴近生活,更加具有现实意义。
The legal regulation of civil society is most widely. Within its scope the problem of malicious software is closing to daily life, and more with practical significance.
目前多数信任模型未考虑节点的异构性,不能有效识别具有复杂策略的恶意节点。
Many existed trust models haven't take into account the heterogeneity of peers, and can't identify the malicious peers with complicated strategy.
该方法实现简单,但存在缺陷:由于附加块信息不同于正常通信过程,恶意用户容易察觉通信具有密钥恢复功能,使用数据包过滤方法,就可以完全屏蔽密钥恢复功能。
The implementation is practical but with obvious disadvantage: the illegal user can easily notice the key recovery, and by data package filtering, the key recovery function can be screened.
因此,恶意主机环境下移动代码保护技术的研究具有重要的理论和现实意义并受到极大的重视。
So protection technologies of mobile code in malicious host attract much attention and there are very important theoretical and practical significance.
本课题所研究的内容,是在开发一个具有网络查询录入功能的合成树脂产品数据库系统的基础上,研究如何在网络上保护该系统不被恶意攻击。
This thesis, on the basis of a synthesized resin product database system with functions of query and input from remote host, researches how to protect the system from hostile attacks.
此外,该方案还具有当节点进入P 2 P网络后,如有恶意行为,网络能剔除这些恶意节点等特性。
Furthermore, when a node's malicious actions are found in P2P networks, the malicious nodes would be revoked out from P2P networks.
没有恶意软件保护器具有哪些特性?
密码管理器将密码存储于智能卡芯片上,在芯片上具有密码保护和PIN保护功能,所以不易使恶意插件入侵电脑。
Its password manager stores passwords on the smart card chip, where they are encrypted and PIN-protected, and thus not vulnerable to malware infecting the computer.
弹出式广告:一个弹出式广告可以提供恶意代码一旦观众的屏幕上的广告具有吸引力。
Pop-up ads: A pop-up ad can deliver a malicious payload as soon as the ad appea on the viewer's screen.
尽管邮报在星期日及其后的报道中没有明确肇事者的种族构成,但是很多读者猜测他们是黑人并在线发表了具有种族倾向的恶意评论。
Although the Post's coverage on and after Sunday did not specify the racial makeup of those involved, many readers assumed they were black and offered racially insensitive online comments.
恶意透支不具有诈骗的实质,不宜定信用卡诈骗罪,有必要另立罪名。
Malicious overdraw without swindle essence may not be determined as credit CARDS crime of Swindling and it is necessary to create a new accusation.
提出的组密钥交换协议经过证明具有AKE安全,并且能够抵抗适应性敌手攻击和恶意参与者攻击。
The protocol is proved to be AKE secure and resistant to the attacks of adaptive adversaries and malicious insiders.
RTSP请求的行为分析具有攻击检测功能,可以主动过滤恶意连接;
It also can filter the malicious connections by analyzing the RTSP requests;
扩展本身可能怀有恶意,而如果使用扩展的用户具有足够的权限,扩展还有可能控制受保护的资源。
The extension itself might be malicious and gain control of protected resources if the user who uses the extension has sufficient permissions.
实验结果表明,该模型能有效保护非恶意节点,孤立恶意节点,使网络具有更好的健壮性。
Experimental result shows that the model can better protect non-malicious nodes and isolate bad nodes, so that the network has better robustness.
结果表明,本模型具有较高的的准确性、有效性,且能更好地对抗共谋等恶意行为。
The experimental results show that the proposed trust model outperforms existing models, and can effectively be applied to the online transaction.
恶意的具有或表现出恶意或不良愿望的;
恶意的具有或表现出恶意或不良愿望的;
应用推荐