• 攻击可以利用一点数据验证来攻击程序

    Attackers can use this fact to "slip through" data validators to attack programs.

    youdao

  • 攻击程序使用常见方式之一就是利用这些程序其他程序发出请求的方式。

    And one of the most common ways to attack programs is to exploit how they make requests to other programs.

    youdao

  • 实例一个系统攻击程序。仅供读者学习测试之用,否则后果自负

    This example is to attack a system process. Readers for learning and testing, or else at your peril.

    youdao

  • 如果程序数据浏览器或者编辑器——比如文字处理器或者图像显示器——那么那些数据有可能来自攻击者,所以可信输入

    If your program is a viewer or editor of datasuch as a word processor or an image displayer—that data might be from an attacker, so it's an untrusted input.

    youdao

  • 这种帮助可以帮助攻击创建用于误导程序数据

    This "help" can also aid an attacker to create data to mislead the program.

    youdao

  • 然后收集到的信息可以用来分配资源识别那些可能恶意用户程序攻击机器

    The information harvested can then be used to allocate resources and identify machines that may be vulnerable to attack by rogue users and programs.

    youdao

  • 它们正在攻击程序-准备好了吗?

    They're attacking your programs — are you ready?

    youdao

  • 使用这种模式可以一个已知网络攻击或者病毒程序沿着网络传播期间暂时地锁定电脑

    Use this mode to temporarily lock down computers during a known network attack or when a malicious program is spreading.

    youdao

  • 由于这个事实所有可执行代码转移包含0地址会使得攻击程序困难了。

    Since that's the case, moving all executable code to addresses with a 0 in it makes attacking the program far more difficult.

    youdao

  • SQL注入攻击中,程序会创建一个SQL命令其发送给SQL解释器。

    In an SQL injection attack, a program creates an SQL command and sends it to an SQL interpreter.

    youdao

  • 这个程序允许攻击包括可以修改SQL命令意义字符

    The program allows an attacker to include characters that change the meaning of that SQL command.

    youdao

  • 当天工作时间快要结束时候,公司里的用户打开垃圾邮箱里邮件打开了然后程序攻击开始了。

    At the end of the day, a user within that company opened an email. It went into his spam box, he opened it, and that launched the attack.

    youdao

  • 如果攻击程序系统管理员启动的,那么恶意代码作为原始程序一部分进行执行黑客系统中的管理员特权

    If the attacked program was initiated by a system administrator, the malicious code will then run as a part of the original program, giving the attacker administrator privileges on the system.

    youdao

  • 网站访问量收到了绊倒安全机制觉得这个搜索引擎在受到一个垃圾邮件程序攻击

    The volume of searches the site received tripped safety mechanisms and made the search engine think it was under attack from a spambot.

    youdao

  • 问题如果攻击可以控制程序用到底层,那么攻击者就可以控制整个程序

    The problem is that if an attacker can control the underlying libraries used by a program, the attacker can completely control the program.

    youdao

  • 缓冲区溢出攻击实例程序内部溢出,从而改变程序的运行方式。

    In the instance of a buffer overflow attack, an internal value in a program is overflowed to alter how the program runs.

    youdao

  • 缓冲溢出攻击黑客利用程序执行期间存储分配中的特定计算机程序漏洞

    In a buffer overflow attack, the hacker takes advantage of specific type of computer program bug that involves the allocation of storage during program execution.

    youdao

  • 模糊测试中,随机数据(也称做fuzz)攻击一个程序然后等着观察哪里遭到了破坏

    In fuzz testing, you attack a program with random bad data (aka fuzz), then wait to see what breaks.

    youdao

  • 根据veracodeWysopal所说,搜索gets函数——一个臭名昭著不安全字符串操作——可以揭示可能内存溢出攻击程序

    And, searching for the function "gets" — a notoriously insecure string operationcan reveal programs that are likely vulnerable to a memory overflow, said Veracode's Wysopal.

    youdao

  • 通过这种方式如果程序攻击者利用,访问权限显然最小的。

    That way, if the program is exploited in some way, its access is explicitly minimized.

    youdao

  • 攻击活动包括列出每个应用程序中的模块

    The attack activity can include listing of modules within each application.

    youdao

  • 这样可以攻击控制内部数据甚至控制整个程序

    That will let the attacker control internal data and possibly take over the program.

    youdao

  • 最近爆发几起重大数据失窃事件,就是电子邮件数据系统网络应用程序遭受黑客攻击结果

    Yet, most of the major data breaches in recent news have been the result of attacks on Web apps like email and data systems.

    youdao

  • 从根本上讲所有这些方法都能减轻程序接管攻击拒绝服务攻击缓冲区溢出攻击所带来的破坏

    Fundamentally, all these approaches reduce the damage of a buffer overflow attack from a program-takeover attack into a denial-of-service attack.

    youdao

  • 如果攻击者通过应用程序显示HTML可能就会带来麻烦

    If the attacker has the application display a set of HTML, trouble may creep in.

    youdao

  • 或者FLOSS是否安全因为攻击者获得了更多信息-这会使得进行程序攻击更容易吗?

    Or, will FLOSS be less secure because attackers have more informationmaking it easier to create attacks against the program?

    youdao

  • 不如永久地去除特权好,因为如果攻击可以控制程序攻击者就可以重新启用特权利用

    This isn't as good as permanently dropping the privilege, since if an attacker can take control of your program, the attacker can re-enable the privilege and exploit it.

    youdao

  • 这样做可使SQL更加易于维护可使应用程序免受SQL注入攻击

    Doing so makes the SQL easier to maintain and secures your application from SQL injection attacks.

    youdao

  • 测试额外安全性攻击问题例如所部署应用程序上会间接伤害数据中心其他应用程序恶意攻击

    Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.

    youdao

  • 测试额外安全性攻击问题例如所部署应用程序上会间接伤害数据中心其他应用程序恶意攻击

    Testing for additional security and vulnerability issues; for example, malicious attacks on a deployed application that can indirectly harm other applications in the data center.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定