• The idea is pretty straightforward: Insert some attack code (for example, code that invokes a shell) somewhere and overwrite the stack in such a way that control gets passed to the attack code.

    这种想法相当直接的︰在某处汇入一些攻击程式例如呼叫shell 的程式码)控制传递给攻击程式码方式堆叠

    youdao

  • Blind SQL injection attacks are a well know and recognized form of code injection attack, but there are many other forms, some not so well documented or understood.

    SQL攻击一种为人熟知代码注入攻击形式但是很多其他形式有些尚未得到很好的记载和了解。

    youdao

  • When researchers look for malware and attack vectors, the tendency is to look for vulnerabilities in portals or code.

    研究人员寻找恶意软件攻击载体时,他们往往寻找接口代码中的漏洞

    youdao

  • Perhaps the most malicious form of injection attack is code injection—placing new code into the memory space of the running process and then directing the running process to execute it.

    恶劣注入攻击形式也许代码注入——代码置入正在运行进程内存空间随后指示正在运行的进程执行这些代码。

    youdao

  • One of the first steps you should take when hardening a machine is to reduce its attack surface. The more code that's running on a machine, the greater the chance that the code will be exploitable.

    进行系统加固应该采取首要步骤之一降低受攻击机器运行代码越多,代码利用机会更越大

    youdao

  • If you are concerned about this type of attack, which is easily prevented through code inspections, you can prevent untrusted clients from connecting to the Web container.

    如果担心这种类型攻击(可以通过代码检查轻松地加以防止),则可以阻止任何不受信任的客户端连接web容器。

    youdao

  • The focus of this article is a specific type of code injection attack: the Blind XPath injection.

    本文主要介绍代码注入攻击一种特殊类型XPath

    youdao

  • The code in Listing 8 tries to attack invulnerable.

    清单8中的代码尝试攻击invulnerable

    youdao

  • Cisco is warning of three vulnerabilities within its Internet Operating System software that could allow a denial-of-service attack or let a hacker run arbitrary code on an affected switch router.

    Cisco已经警告,在InternetOperatingSystem软件具有三个可能引发拒绝服务,运行任意代码系统出错的漏洞. "因为运行IOS的设备跨越数个不同类型的网络,第二轮大型拒绝服务攻击可能因此而起."

    youdao

  • But if the operating system has marked that Internet communications buffer region of memory as only being valid for containing data and NOT code, the hacker's attack will never get started.

    但是如果经营体制标志互联网通信缓冲区记忆因为只有有效遏制数据不是代码黑客攻击不会得开始。

    youdao

  • In this article, the author explains the principle and process of SQL Injection Attack, and introduces a serial interrelated solution to prevent SQL Injection Attack from the aspect of code in detail.

    介绍SQL注入攻击原理,SQL注入攻击过程功能代码本身方面详细介绍了SQL注入攻击的防范措施

    youdao

  • Because the code attempting the attack will always be somewhere in the call stack, it will be unable to exceed its own security permissions.

    因为尝试进行攻击代码总是位于调用堆栈中的某个地方,所以它无法超过自己的安全权限。

    youdao

  • And code in the function that USES these parameters could cause an attack before the function returns and the security check is performed.

    并且使用这些参数函数中的代码可能在函数返回导致攻击执行安全检查

    youdao

  • If the input is passed directly to the server without being validated and if the application inadvertently executes the injected code, then the attack has the potential to damage or destroy data.

    如果未经验证而输入直接传递服务器应用程序无意中执行注入代码攻击可能损坏破坏数据。

    youdao

  • A robust digital audio watermarking algorithm is presented, which can resist desynchronization attack effectively. We embed synchronization code by modifying the mean value of several samples.

    改进了一种抵抗同步攻击数字音频盲水印算法,该算法通过修改多个采样的统计均值嵌入同步,解决了空域嵌入同步码的不稳定性问题。

    youdao

  • To minimize the amount of damage that can occur if an attack succeeds, choose a security context for your code that grants access only to the resources it needs to get its work done and no more.

    要将因攻击成功导致损害降到最低,请代码选择安全上下文以便资源授予完成工作所必需的访问权限

    youdao

  • Next, in order to prevent the discovery and attack by malicious code, we utilize the Hardware Virtualization Technology to design the self-hidden module for LAHF.

    接着为了防止恶意代码发现攻击,本文利用硬件虚拟技术LAHF设计自隐藏模块

    youdao

  • To improve the ability of resisting the linear combination attack, an improved fingerprint scheme based on ACC code is proposed.

    为了提高联合攻击码抵抗线性组合攻击能力,提出一种改进基于ACC指纹编码方案

    youdao

  • ISR (Instruction Set Randomization) is a new, general approach for safeguarding systems against any type of code-injection attack.

    指令随机化(isr)技术一种新型保护系统免遭任何类型注入攻击通用方法

    youdao

  • Directory traversal is another injection-style attack, wherein a malicious user tricks filesystem code into reading and/or writing files that the Web server shouldn't have access to.

    目录遍历另一注入类型攻击,攻击者欺骗文件系统服务器允许操作的文件

    youdao

  • The Financial Times suggests that us officials have tracked the author of the code used to attack the company.

    金融时报》暗示美国官员已经找到编写代码袭击谷歌公司黑客。

    youdao

  • Plugins which allow arbitrary PHP or other code to execute from entries in a database effectively magnify the possibility of damage in the event of a successful attack.

    允许任意PHP或者其它代码数据库中的文章执行插件有效地放大一次成功袭击可能产生损害

    youdao

  • Security officials blamed the attack on "ill-intentioned people", code for red-shirt militants, who were accused of a series of explosions in March and April.

    保安队高层指责此次袭击恶意人群”所为,暗指红衫激进分子,后者三月四月受到一系列爆炸事件指控

    youdao

  • The actual verification shows that attack description language can correspondingly construct suitable embedded code and launch attack automatically.

    实际验证表明,该缓冲区溢出攻击描述语言能够动态地构造植入代码,实现缓冲区溢出攻击的自动化

    youdao

  • Source code was stolen from some of the more than 30 Silicon Valley companies targeted in the attack, sources said.

    源代码是从30多个硅谷攻击目标一些公司被盗,消息人士说。

    youdao

  • The strength of the embedded watermark is image-adaptive according to the wavelets quantization noise, and combined with the error-correct code, it improved the characteristic to anti-attack.

    根据波域量化噪声自适应地确定嵌入强度结合纠错编码提高了抗攻击能力。

    youdao

  • The strength of the embedded watermark is image-adaptive according to the wavelets quantization noise, and combined with the error-correct code, it improved the characteristic to anti-attack.

    根据波域量化噪声自适应地确定嵌入强度结合纠错编码提高了抗攻击能力。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定